Alter Attack : A team of researchers has discovered yesterday that reports three attacks against the 4g network protocol standard LTE (Long-Term Evolution), also known as 4G, that could permit involved hackers to spy on customer ‘ cellular networks data, and also even can re-route them to malicious or phishing websites(a website fingerprinting attack)
LTE is the latest mobile telephony model used by billions of user planned to bring many security changes over the ancestor measure known as (GSM) Global System for Mobile communications.
Know about aLTEr Attack? How aLTEr Attack Targets 4G LTE Networks?
aLTEr because of its intrusive skills, which used in experiments to redirect users to malicious URL by altering DNS spoofing. Here is a demo of an aLTEr attack recorded by researchers.
The team explained how an active attacker could redirect DNS requests and then do a DNS spoofing attack, generating the victim mobile device to use a malicious DNS server that ultimately redirects the victim to a malicious site masquerading as Hotmail.
Also, set up two servers, their DNS server, and an HTTP server, to affect how an attacker can redirect network bonds.
Attack Possible because of weak Long-Term Evolution encryption :
Technical detachments of the three attacks, the three vulnerabilities exist in one of the two LTE layers called the datasheet,
1. That transports the user’s actual data.
2. A layer is the control layer
3. And that’s the one that controls and keeps the user’s 4G connection running.
According to researchers, the vulnerabilities exist because the data layer is not safe, so a hacker can easily intercept, and then transfer the modified packets to the actual cell tower They can do this because 4G data packets are not integrity-protected
That flaws also impact upcoming 5G standard: alter attack
Three researchers researcher from New York University and the Ruhr-University in Bochum, Germany, say they have reported important institutions such as the GSM Association (GSMA), (3Gp)3rd Generation Partnership Project about the issues they discovered. the forthcoming version of the 5G standard in its popular form. researchers stated that the 5G model incorporates supplementary security features to check aLTEr attacks.