Start your day with intelligence. Get The OODA Daily Pulse.
Researchers detail new vulnerability in 5G connection process
A team from Singapore University of Technology and Design has revealed a 5G attack method that works without deploying a rogue base station. Their Sni5Gect framework intercepts unencrypted messages during brief reconnection windows, letting attackers inject malicious payloads and potentially crash or track devices. The attack works before network authentication, making it stealthier and easier to execute than past techniques. It was tested successfully on multiple smartphones, and the industry group GSMA has acknowledged the threat.
Read more:
https://www.securityweek.com/novel-5g-attack-bypasses-need-for-malicious-base-station/