Pesquisadores de segurança descobriram uma nova vulnerabilidade no próximo protocolo de comunicações 5G. Os aparece falha para ser mais grave do que os anteriormente descobertos em 3G e 4G. Para top off, esta nova vulnerabilidade afeta todos os três padrões!
New Vulnerability in 5G Protocol Discovered
The flaw enables surveillance entities with a new exploitation way where new-generation IMSI-catchers (dispositivos internacionais identidade-apanhador de espionagem do assinante móvel) são criados que o trabalho em todos os protocolos de telefonia modernos, researchers said in a relatório intitulado “New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols”.
The 3rd Generation Partnership Project (3GPP) responsible for the world-wide standardization of mobile communication has designed and mandated the use of the AKA protocol to protect the subscribers’ mobile services. Even though privacy was a requirement, numerous subscriber location attacks have been demonstrated against AKA, some of which have been fixed or mitigated in the enhanced AKA protocol designed for 5G.
disse brevemente, the vulnerability affects the AKA (Authentication and Key Agreement) protocolo. AKA is a security protocol typically used in 3G networks. AKA is also used for one-time password generation mechanism for digest access authentication. AKA is a challenge-response based mechanism that uses symmetric cryptography.
Current IMSI-catcher devices target vulnerabilities in this protocol to downgrade AKA to a weaker state that allows the device to intercept mobile phone traffic metadata and track the location of mobile phones, ZDNet points out.
There is an AKA version designed specifically for the 5G protocol, and it is called 5G-AKA. This version was designed to circumvent IMSI-catchers, with a stronger authentication negotiation system in place. Contudo, the recently discovered vulnerability allows surveillance parties to create a new class of IMSI-catchers.
The vulnerability reveals details about a user’s mobile activity (including number of sent and received text messages and calls), which is different than the type of tracking in older IMSI-catchers.
It is also curious to mention that at the end of 2018, David Vignault, Director of the Canadian Security Intelligence Service (CSIS), expressed his concerns that [wplinkpreview url =”https://sensorstechforum.com/5g-technology-cyber-espionage-concerns/”]5G can be deployed to target large organizations for information-stealing purposes. Targets in such “attacks” will have both civilian and military security purposes.
“CSIS has seen a trend of state-sponsored espionage in fields that are crucial to Canada’s ability to build and sustain a prosperous, knowledge-based economy,” the expert added. He believes that areas in Canada such as AI, quantum technology, 5G itself, biopharma, can be affected by such cyber-espionage campaigns.