LTE vulnerability Attackers can impersonate other mobile phone users

They can thus start a subscription at the expense of others or publish secret company documents under someone else’s identity.

Exploiting a vulnerability in the mobile communication standard LTE, also known as 4G, researchers at Ruhr-Universität Bochum can impersonate mobile phone users. Consequently, they can book fee-based services in their name that are paid for via the mobile phone bill – for example, a subscription to streaming services.

“An attacker can book services, for example stream shows, but the owner of the attacked phone would have to pay for them,” illustrates Professor Thorsten Holz from Horst Görtz Institute for IT Security, who discovered the vulnerability together with David Rupprecht, Dr. Katharina Kohls and Professor Christina Pöpper. The team from Bochum will present the results on 25 February 2020 at the Network Distributed System Security Symposium, NDSS for short, in San Diego, USA. Details of the attacks are also available on the website www.imp4gt-attacks.net.

According to the researcher, the vulnerability may also affect investigations of law enforcement agencies because attackers can not only make purchases in the victim’s name, but can also access websites using the victim’s identity. For example, an attacker can upload secret company documents and to network operators or law enforcement authorities, it would look as if the victim is the perpetrator.

Almost all mobile phones and tablets at risk

The discovered vulnerability affects all devices that communicate with LTE, i.e. virtually all mobile phones, tablets, and some connected household appliances. Only changing the hardware design would mitigate the threat. The Bochum-based team is attempting to close the security gap in the latest mobile communication standard 5G, which is currently rolled out. “For a technical perspective this is possible,” explains David Rupprecht. “However, mobile network operators would have to accept higher costs, as the additional protection generates more data during the transmission. In addition, all mobile phones would have to be replaced and the base station expanded. That is something that will not happen in the near future.”

As early as 2018, the group had already drawn attention to security gaps in LTE, through which attackers can redirect users to fake websites and retrieve their passwords.

Attacker has to be nearby

The problem is the lack of integrity protection: data packets are transmitted encrypted between the mobile phone and the base station, which protects the data against eavesdropping. However, it is possible to modify the exchanged data packets. “We don’t know what is where in the data packet, but we can trigger errors by changing bits from 0 to 1 or from 1 to 0,” as David Rupprecht elaborates. By provoking such errors in the encrypted data packets, the researchers can make a mobile phone and the base station decrypt or encrypt messages. They not only can convert the encrypted data traffic between the mobile phone and the base station into plain text, they can also send commands to the mobile phone, which are then encrypted and forwarded to the provider – such as a purchase command for a subscription.

The researchers from Bochum use so-called software-defined radios for the attacks. These devices enable them to relay the communication between mobile phone and base station. Thus, they trick the mobile phone to assume that the software-defined radio is the benign base station; to the real network, in turn, it looks as if the software-defined radio was the mobile phone. For a successful attack, the attacker must be in the vicinity of the victim’s mobile phone.

Funding

The research was carried out in the Cluster of Excellence Cyber-Security in the Age of Large-scale Adversaries, Casa for short (EXC 2092 – project number 39078197), which has been funded by the German Research Foundation at Ruhr-Universität since 2019. Additional funding was supplied by the Federal Ministry of Education and Research (grant number 16KIS0664).

Original publication

David Rupprecht, Katharina Kohls, Thorsten Holz, Christina Pöpper: IMP4GT: IMPersonation Attacks in 4G NeTworks, Network and Distributed Systems Security (NDSS) Symposium, San Diego, USA, 2020

Press contact

Prof. Dr. Thorsten Holz
Horst Görtz Institute for IT Security
Ruhr-Universität Bochum
Germany
Phone: +49 234 32 25199
Email: thorsten.holz@rub.de

David Rupprecht
Horst Görtz Institute for IT Security
Ruhr-Universität Bochum
Germany
Phone: +49 234 32 23508
Email: david.rupprecht@rub.de

Download high-resolution images
Der Download der gewählten Bilder erfolgt als ZIP-Datei. Bildzeilen und Bildnachweise finden Sie nach dem Entpacken in der enthaltenen HTML-Datei.
Nutzungsbedingungen
Die Verwendung der Bilder ist unter Angabe des entsprechenden Copyrights für die Presse honorarfrei. Die Bilder dürfen ausschließlich für eine Berichterstattung mit Bezug zur Ruhr-Universität Bochum verwendet werden, die sich ausschließlich auf die Inhalte des Artikels bezieht, der den Link zum Bilderdownload enthält. Mit dem Download erhalten Sie ein einfaches Nutzungsrecht zur einmaligen Berichterstattung. Eine weitergehende Bearbeitung, die über das Anpassen an das jeweilige Layout hinausgeht, oder eine Speicherung der Bilder für weitere Zwecke, erfordert eine Erweiterung des Nutzungsrechts. Sollten Sie die Fotos daher auf andere Weise verwenden wollen, kontaktieren Sie bitte redaktion@ruhr-uni-bochum.de

Published

Monday
17 February 2020
12:08 pm

By

Julia Weiler (jwe)

Translated by

Donata Zuber

Share