Topics

Latest

AI

Amazon

Article image

Image Credits:Costfoto / NurPhoto / Getty Images

Apps

Biotech & Health

Climate

Customers experience Samsung’s new foldable mobile phone Galaxy Z Flip5 at a Samsung sales store in Hangzhou, East China’s Zhejiang province, Aug. 14, 2023.

Image Credits:Costfoto / NurPhoto / Getty Images

Cloud Computing

Commerce

Crypto

Enterprise

EVs

Fintech

fund raise

gizmo

Gaming

Google

Government & Policy

ironware

Instagram

layoff

Media & Entertainment

Meta

Microsoft

Privacy

Robotics

surety

Social

outer space

Startups

TikTok

Transportation

Venture

More from TechCrunch

effect

Startup Battlefield

StrictlyVC

Podcasts

Videos

Partner Content

TechCrunch Brand Studio

Crunchboard

Contact Us

A group of researchers say they have uncovered a series of security system flaw in different 5 G basebands — fundamentally processors used by cell phone to join to mobile networks — which could have allow drudge to stealthily hack on victims and spy on them .

The researchers from Pennsylvania State University presented their findings at theBlack Hatcybersecurity conference in Las Vegas on Wednesday , as well as in an academic newspaper .

Using a custom - made analysis shaft they call 5GBaseChecker , the researcher uncovered baseband vulnerabilities made by Samsung , MediaTek , and Qualcomm , which are used in phones made by Google , OPPO , OnePlus , Motorola , and Samsung .

The researchers are Kai Tu , Yilu Dong , Abdullah Al Ishtiaq , Syed Md Mukit Rashid , Weixuan Wang , Tianwei Wu , and Syed Rafiul Hussain . On Wednesday , they publish 5GBaseChecker on GitHubso that other research worker can use it to hunt for 5 GiB vulnerabilities .

Hussain , an adjunct professor at Penn State , enjoin TechCrunch that he and his students were able-bodied to play a joke on phones with those vulnerable 5 G basebands into connect to a fake floor station — essentially a fake cell phone towboat — and from there launch their attacks .

Tu , one of the students , said that their most critical attack admit them to overwork the speech sound from that faux base station . At that point , Tu articulate , “ the security of 5 one thousand was altogether broken . ”

“ The attack is all silent , ” Tu added .

Tu explained that by taking advantage of the vulnerabilities they found , a malicious hacker could pretend to be one of the dupe ’s friends and post a credible phishing message . Or by directing the dupe ’s headphone to a malicious website , the cyber-terrorist could fob the dupe into providing their credentials on a fake Gmail or Facebook login page , for example .

The investigator were also capable to downgrade a victim from 5 GiB to older protocol like 4 thou or even older ones , making it easier to eavesdrop on the dupe ’s communication , said Tu .

The researchers said that most marketer they contacted have pay back the vulnerabilities .   At the fourth dimension of writing , the researchers describe and got patched 12 vulnerabilities in dissimilar 5 G basebands .

Samsung spokesperson Chris Langlois read in a statement to TechCrunch that the company had “ released software patches to affected smartphone vendors to address and decide this topic , ” while Google spokesperson Matthew Flegal also confirmed that the flaws were now sterilize .

MediaTek and Qualcomm did not respond to a postulation for comment .