• HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
Sunday, January 11, 2026
BIOENGINEER.ORG
No Result
View All Result
  • Login
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
No Result
View All Result
Bioengineer.org
No Result
View All Result
Home NEWS Science News

LTE vulnerability: Attackers can impersonate other mobile phone users

Bioengineer by Bioengineer
February 18, 2020
in Science News
Reading Time: 3 mins read
0
IMAGE
Share on FacebookShare on TwitterShare on LinkedinShare on RedditShare on Telegram

They can thus start a subscription at the expense of others or publish secret company documents under someone else’s identity

IMAGE

Credit: RUB, Kramer

Exploiting a vulnerability in the mobile communication standard LTE, also known as 4G, researchers at Ruhr-Universität Bochum can impersonate mobile phone users. Consequently, they can book fee-based services in their name that are paid for via the mobile phone bill – for example, a subscription to streaming services.

“An attacker can book services, for example stream shows, but the owner of the attacked phone would have to pay for them,” illustrates Professor Thorsten Holz from Horst Görtz Institute for IT Security, who discovered the vulnerability together with David Rupprecht, Dr. Katharina Kohls and Professor Christina Pöpper. The team from Bochum will present the results on 25 February 2020 at the Network Distributed System Security Symposium, NDSS for short, in San Diego, USA. Details of the attacks are also available on the website http://www.imp4gt-attacks.net.

According to the researcher, the vulnerability may also affect investigations of law enforcement agencies because attackers can not only make purchases in the victim’s name, but can also access websites using the victim’s identity. For example, an attacker can upload secret company documents and to network operators or law enforcement authorities, it would look as if the victim is the perpetrator.

Almost all mobile phones and tablets at risk

The discovered vulnerability affects all devices that communicate with LTE, i.e. virtually all mobile phones, tablets, and some connected household appliances. Only changing the hardware design would mitigate the threat. The Bochum-based team is attempting to close the security gap in the latest mobile communication standard 5G, which is currently rolled out. “For a technical perspective this is possible,” explains David Rupprecht. “However, mobile network operators would have to accept higher costs, as the additional protection generates more data during the transmission. In addition, all mobile phones would have to be replaced and the base station expanded. That is something that will not happen in the near future.”

As early as 2018, the group had already drawn attention to security gaps in LTE, through which attackers can redirect users to fake websites and retrieve their passwords (https://news.rub.de/english/press-releases/2018-06-28-it-engineering-security-gaps-identified-lte-mobile-telephony-standard).

Attacker has to be nearby

The problem is the lack of integrity protection: data packets are transmitted encrypted between the mobile phone and the base station, which protects the data against eavesdropping. However, it is possible to modify the exchanged data packets. “We don’t know what is where in the data packet, but we can trigger errors by changing bits from 0 to 1 or from 1 to 0,” as David Rupprecht elaborates. By provoking such errors in the encrypted data packets, the researchers can make a mobile phone and the base station decrypt or encrypt messages. They not only can convert the encrypted data traffic between the mobile phone and the base station into plain text, they can also send commands to the mobile phone, which are then encrypted and forwarded to the provider – such as a purchase command for a subscription.

The researchers from Bochum use so-called software-defined radios for the attacks. These devices enable them to relay the communication between mobile phone and base station. Thus, they trick the mobile phone to assume that the software-defined radio is the benign base station; to the real network, in turn, it looks as if the software-defined radio was the mobile phone. For a successful attack, the attacker must be in the vicinity of the victim’s mobile phone.

###

Media Contact
David Rupprecht
[email protected]
49-234-322-3508

Original Source

https://news.rub.de/english/press-releases/2020-02-17-lte-vulnerability-attackers-can-impersonate-other-mobile-phone-users

Tags: Computer ScienceSystem Security/HackersTechnology/Engineering/Computer ScienceTelecommunications
Share12Tweet8Share2ShareShareShare2

Related Posts

Detecting Mental Stress in Housewives Using Wearable Tech

Detecting Mental Stress in Housewives Using Wearable Tech

January 11, 2026
Trypanosoma cruzi’s Genome Unveils 32 Chromosomes, 3 Compartments

Trypanosoma cruzi’s Genome Unveils 32 Chromosomes, 3 Compartments

January 11, 2026

Revolutionizing Multilayer Plastic Recycling via Microfibrillation

January 11, 2026

Measuring Daily Living Activities in Dementia: A Study

January 11, 2026
Please login to join discussion

POPULAR NEWS

  • Enhancing Spiritual Care Education in Nursing Programs

    154 shares
    Share 62 Tweet 39
  • PTSD, Depression, Anxiety in Childhood Cancer Survivors, Parents

    145 shares
    Share 58 Tweet 36
  • Robotic Ureteral Reconstruction: A Novel Approach

    49 shares
    Share 20 Tweet 12
  • Impact of Vegan Diet and Resistance Exercise on Muscle Volume

    47 shares
    Share 19 Tweet 12

About

BIOENGINEER.ORG

We bring you the latest biotechnology news from best research centers and universities around the world. Check our website.

Follow us

Recent News

Detecting Mental Stress in Housewives Using Wearable Tech

Trypanosoma cruzi’s Genome Unveils 32 Chromosomes, 3 Compartments

Revolutionizing Multilayer Plastic Recycling via Microfibrillation

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 71 other subscribers
  • Contact Us

Bioengineer.org © Copyright 2023 All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Homepages
    • Home Page 1
    • Home Page 2
  • News
  • National
  • Business
  • Health
  • Lifestyle
  • Science

Bioengineer.org © Copyright 2023 All Rights Reserved.