LTE exploits could let intruders conduct serious attacks

LTE exploits could let intruders conduct serious attacks

Researchers at Purdue and the University of Iowa have released an outline of exploits for the LTE protocols that would allow intruders to conduct ten very serious attacks. These attacks include tracking locations, knocking devices offline, spying on calls and text messages, and even faking emergency alerts.

Once intruders are in, they can take advantage of three key protocols (such as attaching a device to the network and maintaining that connection) to conduct authentication relay attacks. This would not just allow them to connect to the network without credentials, but mask themselves as the victim’s device. The intruder would not only compromise the network, but also frame the victim for the committed crime. Mind you, these aren’t just hypothetical attacks. The researchers tested eight of the ten attacks using SIM cards from four large US carriers.

The problem is with LTE itself, and it is fixable because one of the big US carriers has already fixed it. It’s basically a race against time because you can built the necessary LTE exploit tool for as little as $1,300, so determined intruders could infiltrate a network without needing too many resources.

CategoriesMobile Security
Hamza Khalid

Hamza Khalid is the Lead Editor at The Jolt Journal. You're more than welcome to follow him on Twitter and follow The Jolt Journal on Twitter and Facebook. If you have any questions, concerns, or need to report something in this article, please send our team an email at [email protected]. This story may be updated at any time if new information surfaces.

At The Jolt Journal, no one tells us what to write or how to write it. This is why, in the era of lies and bias, readers turn to an independent source. Rest assured, all information on our website is free of any bias or influence. If you see anything wrong with a story, please don't hesitate to reach out. We do our very best to report on the latest available information.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.