{"id":237649,"date":"2020-08-13T10:00:42","date_gmt":"2020-08-13T08:00:42","guid":{"rendered":"http:\/\/innovationorigins.com\/?p=237649"},"modified":"2020-08-13T10:00:42","modified_gmt":"2020-08-13T08:00:42","slug":"mobile-phones-susceptible-to-eavesdropping-due-to-security-leak-in-4g-network","status":"publish","type":"post","link":"https:\/\/ioplus.nl\/archive\/en\/mobile-phones-susceptible-to-eavesdropping-due-to-security-leak-in-4g-network\/","title":{"rendered":"Mobile phones susceptible to eavesdropping due to security leak in 4G network"},"content":{"rendered":"\n<p>Phonecalls over the 4G network are still susceptible to eavesdropping even though they are encrypted. Researchers from the Horst G\u00f6rtz Institute for IT Security (HGI) at the <a href=\"https:\/\/www.ruhr-uni-bochum.de\/en\">Ruhr University of Bochum<\/a>, Germany, have succeeded in decrypting the content of each phone call when they were on the same radio cell as the victim. They made use of an error in the base stations. The manufacturers have now closed the security leak.<\/p>\n\n\n\n<p>The results were published by the HGI team led by David Rupprecht at the 29th <a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity20\">Usenix Security Symposium,<\/a> which is being held online until tomorrow.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Reused keys identified as vulnerabilities<\/h3>\n\n\n\n<p>The problem occurs when using <em>Voice over LTE<\/em>. This is the global telephone standard for almost all mobile phone calls. When two people call each other, a key is generated that encrypts the phone call.<\/p>\n\n\n\n<p>&#8220;The problem was that the same key was also reused for other phone calls,&#8221; David Rupprecht explains. Therefore, if an attacker would call one of the two people shortly after their call and in the meantime record the encrypted traffic from the same radio cell, they would get hold of the same key that was used to secure the previous call.<\/p>\n\n\n\n<p>\u201cThe attacker has to engage the victim in a conversation,\u201d David Rupprecht goes on to explain. \u201cThe longer the attacker talked to the victim, the more content of the previous conversation he or she was able to decrypt.\u201d To illustrate, if an attacker and the victim spoke for five minutes, the attacker could later decode five minutes of the previous call.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Searching via an app for affected base stations<\/h3>\n\n\n\n<p>In order to determine the extent of the security issue, the IT experts randomly tested base stations throughout Germany. The problem occurred in 80% of the radio cells tested. In the meantime, the manufacturers and mobile phone providers have updated the base station software in order to resolve the problem.<\/p>\n\n\n\n<p>David Rupprecht: \u201cWe subsequently tested several random radio cells all over Germany and haven\u2019t detected any more problems since then,&#8221; he notes. Nevertheless, it has not been ruled out that there are still radio cells somewhere in the world where this issue occurs.<\/p>\n\n\n\n<p>The group from Bochum has developed an app for Android devices in order to track them down. Technically skilled people can use it to help search for radio cells around the world that still have the security bug and report it to the HGI team. The researchers forward the information to the global association of all mobile phone providers &#8211; <a href=\"https:\/\/www.gsma.com\/\">GSMA<\/a> &#8211; which is responsible for ensuring that the base stations are updated. The researchers provide further information about the app on the <a href=\"http:\/\/www.revolte-attack.net\/\">www.revolte-attack.net<\/a> website.<\/p>\n\n\n\n<p>\u201cVoice over LTE has been in use for six years,\u201d David Rupprecht states. \u201cWe\u2019re unable to verify whether attackers have exploited the security gap in the past.\u201d In any event, he is advocating that the new standard for mobile phones should be adapted so that the same problem will no longer recur with the setting up of 5G base stations.<\/p>\n\n\n\n<p><strong>Publication:<\/strong> revolte-attack.net\/media\/revolte_camera_ready.pdf<\/p>\n\n\n\n<p>Use this <a href=\"https:\/\/innovationorigins.com\/?s=5g\">link<\/a> to read other IO articles about 5G networks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phonecalls over the 4G network are still susceptible to eavesdropping even though they are encrypted. Researchers from the Horst G\u00f6rtz Institute for IT Security (HGI) at the Ruhr University of Bochum, Germany, have succeeded in decrypting the content of each phone call when they were on the same radio cell as the victim. They made [&hellip;]<\/p>\n","protected":false},"author":1760,"featured_media":519244,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"categories":[8553],"tags":[25433,49457,53629,53631],"location":[24456],"article_type":[],"serie":[],"archives":[],"internal_archives":[],"reboot-archive":[],"class_list":["post-237649","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digital","tag-5g-en","tag-mobile-phones","tag-security-leaks","tag-voice-over-lte","location-germany"],"blocksy_meta":[],"acf":{"subtitle":"The new standard for mobile telephony needs to be adapted in such a way that the same problem no longer occurs with the setting up of 5G base stations.","text_display_homepage":false},"author_meta":{"display_name":"Arnoud Cornelissen","author_link":"https:\/\/ioplus.nl\/archive\/author\/arnoud-cornelissen\/"},"featured_img":"https:\/\/ioplus.nl\/archive\/wp-content\/uploads\/2020\/08\/2020_08_12_rupprecht_lte_revolte_app_km-300x200.jpg","coauthors":[],"tax_additional":{"categories":{"linked":["<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/digital\/\" class=\"advgb-post-tax-term\">Digital<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">Digital<\/span>"]},"tags":{"linked":["<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/digital\/\" class=\"advgb-post-tax-term\">5G<\/a>","<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/digital\/\" class=\"advgb-post-tax-term\">mobile phones<\/a>","<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/digital\/\" class=\"advgb-post-tax-term\">security leaks<\/a>","<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/digital\/\" class=\"advgb-post-tax-term\">Voice over LTE<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">5G<\/span>","<span class=\"advgb-post-tax-term\">mobile phones<\/span>","<span class=\"advgb-post-tax-term\">security leaks<\/span>","<span class=\"advgb-post-tax-term\">Voice over LTE<\/span>"]}},"comment_count":"0","relative_dates":{"created":"Posted 6 years ago","modified":"Updated 6 years ago"},"absolute_dates":{"created":"Posted on August 13, 2020","modified":"Updated on August 13, 2020"},"absolute_dates_time":{"created":"Posted on August 13, 2020 10:00 am","modified":"Updated on August 13, 2020 10:00 am"},"featured_img_caption":"","series_order":"","_links":{"self":[{"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/posts\/237649","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/users\/1760"}],"replies":[{"embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/comments?post=237649"}],"version-history":[{"count":0,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/posts\/237649\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/media\/519244"}],"wp:attachment":[{"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/media?parent=237649"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/categories?post=237649"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/tags?post=237649"},{"taxonomy":"location","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/location?post=237649"},{"taxonomy":"article_type","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/article_type?post=237649"},{"taxonomy":"serie","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/serie?post=237649"},{"taxonomy":"archives","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/archives?post=237649"},{"taxonomy":"internal_archives","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/internal_archives?post=237649"},{"taxonomy":"reboot-archive","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/reboot-archive?post=237649"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}