Concerning 5G Security Risks You Need to Know About
Whatsapp Pinterest
Advertisement

5G phones and other devices have already begun to appear in stores. And soon the super-fast 5G will become the new standard for cellular technologies. With a 5G connection you’ll be able to stream high-quality video and play online games on your mobile device more easily.

However, as with any new technology, 5G comes with certain security concerns. Here we’ll explain some of the security risks of 5G so you can be more informed when you purchase or use 5G devices.

1. Optional Security Features in 5G

5G security risks - optional security

Concerns about 5G have been around for some time. US Senator Ron Wyden even wrote to the chairman of the Federal Communications Commission (FCC) in November 2019 to discuss some of these worries.

A major issue Senator Wyden raised in his letter was that some cybersecurity protections against known vulnerabilities are optional in 5G (what is 5G? What Is 5G? Here's How It'll Make Mobile Internet Faster and Better What Is 5G? Here's How It'll Make Mobile Internet Faster and Better Feel your mobile internet is too slow? 5G is the next generation of mobile internet, and will make mobile data faster than ever. Read More ). This includes features like encryption and authentication.

As these are not mandatory, each individual wireless carrier must decide whether to turn on these protections themselves. We can hope that most carriers will choose to do so. However, carriers are not obligated to use these protections.

“For decades, wireless carriers have ignored known cybersecurity vulnerabilities that foreign governments were and are still actively exploiting to target Americans,” Wyden wrote. “The market has failed to incentivize cybersecurity, in part because consumers have no way of comparing the cybersecurity practices of phone companies.”

This is a worry not only for 5G users whose carrier doesn’t take security seriously. It can impact others too. For example, if user A’s carrier is not secure and they send and receive messages from user B, then both users’ data is vulnerable.

In his letter, Senator Wyden raises the issue of foreign governments using these vulnerabilities to target Americans. But users are at risk from spying from their own governments as well.

2. Risks to 5G Hardware and Infrastructure

5G security risks - 5G hardware

A 2019 report by the US’s Cybersecurity and Infrastructure Security Agency (CISA) raises more concerns about 5G. It looked at the security risks currently present in 4G technology. The agency then considered how these risks could apply to 5G.

In particular, the report considers how hardware manufactured by untrustworthy company could compromise security. This is clearly a reference to Chinese companies like Huawei Huawei 5G Hardware as a National Security Risk, Explained Huawei 5G Hardware as a National Security Risk, Explained You've heard how Huawei hardware might represent national security risks, but is the threat from the Chinese technology firm real? Read More , which has been accused of spying on Americans Could Huawei's 2019 Products Spy on Americans? Could Huawei's 2019 Products Spy on Americans? Is Huawei spying on Americans? We don't know. But let us explain the privacy implications of Huawei's 2019 product lineup. Read More .

“Even if US networks are secure, US data that travels overseas through untrusted telecommunication networks is potentially at risk of interception, manipulation, disruption, and destruction,” the report warns.

There is also the issue of the sheer number of components used in 5G, which is higher than previous wireless technologies. Much 5G support will require new physical architecture. That means carriers will need to build more cellular towers as well as more small cells or micro cells. The problem with this is that the more components present in a system, the more ways there are to attack it.

This is especially concerning when you think of the technologies which will be using 5G, such as autonomous cars, remote medical procedures, and Internet of Things devices. These are all vulnerable to cyberattacks and a successful attack could have very serious consequences.

3. A Vulnerability in 5G Authentication Protocol

5G security risks - authentication

As well as these more general threats, researchers have identified specific security issues in 5G. Researchers from SINTEF Digital Norway and the Technical University of Berlin described a vulnerability in the Authentication and Key Agreement (AKA) protocol that 5G uses in a 2019 paper.

The AKA protocol is what devices uses to communicate with the 5G network. A similar protocol is used in 3G and 4G networks too. The AKA protocol generates a one-time password so that devices and cellular networks can send data back and forth, and be sure that the data is not being interfered with.

The new, 5G version of the AKA protocol was designed to be more secure and to protect against a type of attack called a fake base station attack.

However, the new AKA protocol has introduced a weakness of its own. The researchers uncovered a logical vulnerability, which means a problem in the way the system operates as opposed to a weakness in any underlying code. The protocol is supposed to use randomized encryption to protect data. But the researchers were able to get around this. They created a new class of attack which they named an activity monitoring attack.

This means that hackers could steal steal information which is carried over 5G. The researchers have suggested a fix for the vulnerability, but the fix has yet to be adopted.

4. 5G Is Not Safe from IMSI Catchers

5G security risks - IMSI catchers

There’s also a way that governments can spy on users through 5G. Considerable attention has been focused on a security issue raised in 2018. The US Department of Homeland Security announced it had discovered electronic surveillance devices called International Mobile Subscriber Identity (IMSI) catchers in Washington, D.C.

IMSI catchers are devices which pretend to be cell towers 4 Services That Track You Through Your Smartphone 4 Services That Track You Through Your Smartphone Whether you paid for your smartphone outright, or have it on contract, there's a further price to be paid for the conveniences you use. Are you happy to be tracked through your device? Read More , so devices like mobile phones connect to them. But when a device is connected, the owner of the IMSI catcher can intercept phone calls and messages. The FBI has been using similar technology called Stingray devices in order to track cell phone communications since the mid-1990s.

Despite public outcry about Stingray in the last five years, the FBI continues to use the technology. Law enforcement in Canada and the UK also use the devices.

5G was supposed to protect users against IMSI catchers. However, it appears that there are a number of ways attackers can get around the protections in 5G.

One way is using the vulnerability in the AKA protocol described above. Another is an attack called Torpedo. This takes advantage of a weakness in the paging protocol which notifies a phone to be ready when a call or message is about to arrive. Hackers could use Torpedo to spoof Amber alerts or to block incoming messages altogether.

If hackers deployed Torpedo, they could then follow this with a pair of followup attacks called Piercer and IMSI-Cracking. Together, these can access IMSI data on both 4G and 5G networks.

So 5G is not protected against IMSI catchers after all.

Security Issues in 5G

5G technology will bring faster internet speeds and enable new functions like streaming games on mobile devices. However, this new technology will carry some security risks with it as well. Before you jump into 5G, you should consider your devices’ security. And you should consider whether devices could be compromised by being connected to a 5G network.

To learn more about security for your connected devices, check out our list of best security and privacy apps for smartphones and tablets 10 Best Security & Privacy Apps for Smartphones & Tablets 10 Best Security & Privacy Apps for Smartphones & Tablets Security threats to smartphones and tablets are endless. Beyond the internal security options of your device, you should be using a few apps to protect your smartphone - here are some we recommend. Read More .

Image Credit: fotokitas/Depositphotos

Explore more about: 5G, Smartphone Security.

Enjoyed this article? Stay informed by joining our newsletter!

Enter your Email

Leave a Reply

Your email address will not be published. Required fields are marked *

  1. dragonmouth
    November 29, 2019 at 2:07 pm

    "foreign governments using these vulnerabilities to target Americans. But users are at risk from spying from their own governments as well."
    Own governments are not spying, they are just collecting information in the name of "national security". After all, one never knows when terrorists maybe using their smartphones to freely discuss the next 9/11.

    "There’s also a way that governments can spy on users through 5G."
    No. NOT SPY, only listen in the name of "national security".

    "The FBI has been using similar technology called Stingray devices in order to track cell phone communications since the mid-1990s."
    DON'T pay attention to the man behind the curtain!

    Each new technology introduces a new set of vulnerabilities. Landlines may be archaic and not so convenient as mobile phones but they the most secure form of phone communication available to the masses.