Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Proteasome inhibitor combination expands treatment of AML

Maternal PFAS levels are linked to children’s brain development

F5 Breached, Linux Rootkits, Pixnapping Attack, EtherHiding & More

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New sni5gect attack crashes phones without rogue base stations and downgrades from 5g to 4g
Identity

New sni5gect attack crashes phones without rogue base stations and downgrades from 5g to 4g

userBy userAugust 26, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 26, 2025Ravi LakshmananVulnerability/Mobile Security

A team of scholars have devised a new attack that can be used to downgrade 5G connections to low-generations without relying on rogue base stations (GNBs).

According to the Assets (Automatic System Security) Research Group at the Singapore Institute of Technology Design (SUTD), the attack relies on a new open source software toolkit called SNI5GECT (short for “sniffing 5G Injec”).

According to Shijie Luo, Matheus Garbelini, Sudipta Chattopadhyay and Jianying Zhou, the framework can be used to carry out attacks such as UE modem crashes, previous generation networks, fingerprinting, authentication bypassing, and more.

Cybersecurity

“In contrast to the use of rogue base stations that limit the practicality of many 5G attacks, SNI5GECT acts as a third party in communications, quietly sniffing messages and tracks protocol state by decoding sniffing messages during the UE attachment procedure,” the researchers said. “The state information is then used to inject targeted attack payloads into downlink communications.”

The findings were built on previous research from assets in late 2023, and found 14 flaws in firmware implementations of 5G mobile network modems from MediaTek and Qualcomm. This will freeze connections with manual reboots or reduce connectivity to 4G to launch an attack, collectively called 5Ghoul.

The SNI5GECT attack is designed to passively sniff messages during the initial connection process, decoding message content in real time and leveraging the decoded message content to inject target attack payloads.

Specifically, the attack is designed to utilize a phase prior to the authentication procedure, at which point the messages exchanged between GNB and UE are not encrypted. As a result, the threat model does not require knowledge of UE credentials to insert UP-link/downlink traffic or messages.

“To our knowledge, SNI5GECT is the first framework to enhance both air olfactory and stateful injection capabilities for researchers without the need for fraudulent GNB,” the researchers said.

“For example, an attacker can exploit a short UE communication window in the range of the RACH process until the security context of the NAS is established. Such an attacker will actively hear RAR messages from GNB.

This causes threat actors to crash the modems on the victim’s devices, leading targeted devices to fingerprints, and even downgrade connections to 4G.

Identity Security Risk Assessment

In tests on five smartphones, including the OnePlus Nord CE 2, Samsung Galaxy S22, Google Pixel 7, and Huawei P40 Pro, this study achieved 80% accuracy for uplink and downlink sniffing, and injected messages with a success rate of 70-90% (65 feet).

The Mobile Communications Association (GSMA), a nonprofit association that represents mobile network operators around the world and develops new technologies, has recognized multi-stage, downgrade attacks and assigned the identifier CVD-2024-0096.

“SNI5GECT is a fundamental tool for 5G security research, not only enables the use of 5G in 5G, but also allows future research into security enhancements such as packet-level 5G intrusion detection and mitigation, and security of the physical layer of 5G,” concluded.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWaiting time is a little more finished: 2025 Startup Battlefield 200 list drops tomorrow
Next Article Flaws in CITRIX patches of three netterlers confirm aggressive misuse of CVE-2025-7775
user
  • Website

Related Posts

F5 Breached, Linux Rootkits, Pixnapping Attack, EtherHiding & More

October 20, 2025

3 reasons copy/paste attacks cause security breaches

October 20, 2025

131 Chrome extensions found to be hijacking WhatsApp Web in massive spam campaign

October 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Proteasome inhibitor combination expands treatment of AML

Maternal PFAS levels are linked to children’s brain development

F5 Breached, Linux Rootkits, Pixnapping Attack, EtherHiding & More

3 reasons copy/paste attacks cause security breaches

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.