4G mobile calls still open to eavesdroppers
Armour Communications, a provider of specialist, secure communications platforms explains in a paper published today entitled, Is someone listening in on your confidential calls?, how the latest 4G network fails to solve the problem of electronic eavesdropping. Firms’ intellectual property (IP) and commercially sensitive information can still be listened into by perpetrators using an IMSI catcher, despite new security measures and stronger encryption used by the 4G network. This type of hack can be set up with equipment that is highly portable and costs less than £1000.
A rogue base station attracts mobiles by offering a stronger signal, and once connected forces the mobile back to 2G technology, where encryption is negligible and easily bypassed. This attack was demonstrated recently at the Ruxcon Security Conference, in Melbourne.
Andy Lilly, director and co-founder of Armour Communications commented; “Given the many years of experience and the huge investment in time to develop the specification for the 4G network, it has been assumed that it would be much better at protecting privacy. While it is to some degree, 4G does not solve the issue of potential IMSI catcher style attacks leaving commercial and public sector/government organisations vulnerable.”
4G enforces mutual authentication between handset and network base station, unlike 2G/GSM, but it still requires the mobile to transmit its International Mobile Subscriber Identity (IMSI) at least once in order to connect. Also, because 4G coverage is not ubiquitous, a fraudulent base station can trick handsets into downgrading to 2G, meaning any communication, voice, text or attachment can be compromised.
Andy Lilly added; “There is currently a proliferation of free apps and services that claim to be secure and encrypted, however, organisations should be careful about using such services. These services are not explicit about exactly what is encrypted and therefore there can be gaps that the user is unaware of. Furthermore, companies should not rely on services over which they have no control – for example the carrier service in some countries – in order to protect commercially sensitive information on which the success of their business depends.”
- Top British companies seek cyber solutions from Israel in battle against hackers - September 13, 2017
- Businesses failing to prepare for rise of AI, survey finds - September 11, 2017
- Research into wearable technology set to transform the future of mental healthcare - September 8, 2017
- Government’s digital spend with small businesses rises to over £1bn - August 30, 2017
- Two in three bosses at Britain’s biggest businesses not trained to deal with a cyber attack - August 23, 2017
- Students urged to apply for pioneering Cyber Schools Programme - July 26, 2017
- A UK business will spend more than £1m recovering from a data security breach - July 24, 2017
- Firms urged to apply for groundbreaking cyber startup scheme - July 21, 2017
- IT jobs account for one third of all vacancies in London - July 14, 2017
- Airborne Drones on Patrol – the Answer to Public Safety Policing - July 12, 2017