Telecom Providers Partner with Streaming Platforms to Drive 5G Adoption
- time:
- Browse:30131
Aloha Tube - Free Sex Videos(Porn website:777888sex.cc)V9OThe Metaverse: A New Era for Virtual Worlds and Social Interaction
**Tech News - February 25, 12:00 PM (Beijing Time)** TechCrunch reports that a team of researchers has discovered three new vulnerabilities in 4G and 5G technologies. These vulnerabilities allow attackers to intercept phone calls and track the geographical location of mobile users. This discovery is said to be among the first to affect both 4G and 5G standards simultaneously. The researchers also mentioned that they have developed new attack methods capable of bypassing the latest security measures. One of the co-authors of the paper, Syed Rafiul Hussain, stated: "Anyone with a basic understanding of the cellular paging protocol could launch this attack." Hussain, along with Ninghui Li (Purdue University), Elisa Bertino, Mitziu Echeverria (University of Iowa), and Omar Chowdhury, are set to present their findings at the Distributed Systems Security Symposium in San Francisco on Tuesday. The paper explains the attack process in detail: it begins with an exploit of a vulnerability in the paging protocol through an attack called Torpedo (Triggering Paging Messages for Reconnaissance in LTE). This protocol is used by carriers to notify phones of incoming texts and calls. The researchers discovered that making and canceling several incoming calls in quick succession could trigger a paging message without the target device being notified of an incoming call. This loophole enables attackers to track the victim’s location. Torpedo opens the door to two other attacks: one is called Piercer, which researchers claim can allow an attacker to identify the IMSI (International Mobile Subscriber Identity) on a 4G network. The other is an IMSI-cracking attack, which can brute-force encrypted IMSI identifiers on both 4G and 5G networks. As a result, even the latest 5G devices may still be vulnerable to a Stingray, a technology often used by law enforcement to locate someone in real-time and log all phones in their vicinity. Hussain added that more advanced devices could also be capable of intercepting calls and messages. The researchers note that all four major U.S. carriers are vulnerable to the Torpedo attack, and the necessary radio equipment to launch the attack can cost as little as 0. One carrier’s network is also susceptible to Piercer, but the researchers did not disclose the specific identity of the company. None of the four major U.S. carriers have commented on the findings.