A research conducted by the Academics from Purdue University and the University of Iowa have revealed new security issues in core protocols which empowers 4G LTE mobile networks all over the world. These flaws in 4G LTE Protocols have created room for the attackers to spy on the victim’s text messages, phone calls, track their locations, etc.
The researchers have listed a total of ten different attacks in a research paper which broke out to be a breaking IT Security news. They developed a testing framework to detect these major vulnerabilities in LTE radios and networks. This research group tested eight out of ten attacks using the SIM cards from the four large US carriers. They demonstrated how to conduct an authentication relay attacks which allows an attacker to bypass the network authentication and portray to be the victim’s device.
Any cybercriminal or an attacker can access the 4G LTE Protocol and portray themselves to be the victim. This research led to the discovery of potential dangers which can exploit these vulnerabilities. An attacker can easily imitate the victim’s device which will deliver misleading results for criminal investigations by manipulating the genuine location information of the victim. This can be used by the crooks to their best advantage to generate fake evidence by way of 4G LTE Protocols attacks.
These vulnerabilities can also be exploited by the attackers by injecting fake warning messages, Amber alerts and emergency notifications in the 4G LTE networks. One of the major factors tested by the researchers is that a major US carrier never uses encryption for Control Panel messages and creates room for the attackers to exploit the network vulnerabilities and spy on the victim’s SMS and other confidential information.
Don’t panic if you are on 4G LTE network because the US carriers have already acknowledged all the persistent flows in the 4G LTE Protocols and have addressed them without any delay. The thing which you really need to know as a user is that an open source 4G LTE Protocol software can be bought by anyone to carry out such attacks.
Subscribe to our newsletter today to receive updates on the Latest News and Threats.
The researchers at Virus Removal Guidelines are dedicated to track down the latest vulnerabilities which may infringe your system security. Our team of expert performs a detailed research about every malware infection before educating our users about the same.
Want to stay informed about the latest threats & malware? Sign up for our newsletter & learn how to get rid of all types of threats from your computer.