"By Exploiting an LTE Vulnerability, Attackers Can Impersonate Mobile Phone Users"

Researchers at Ruhr Universitat Bochum found a vulnerability in the mobile communication standard LTE that could be exploited by attackers to impersonate mobile phone users. The abuse of this vulnerability could allow attackers to book services paid via the mobile phone, such as those that stream shows, using the victim's identity. According to the researchers, the vulnerability could also increase the complexity of investigations conducted by law enforcement agencies as attackers can make purchases, visit websites, and upload documents using different identities. The vulnerability impacts all devices that communicate with LTE, like mobile phones, tablets, and more. The researchers are working to address the security gap in 5G, the fifth generation of mobile technology. This article continues to discuss the exploitation and potential impact of the LTE vulnerability, and the research behind this discovery. 

Help Net Security reports "By Exploiting an LTE Vulnerability, Attackers Can Impersonate Mobile Phone Users"

 

Submitted by Anonymous on