
How to protect your conversations and SMS from the vulnerability of 4G/LTE networks?
We all use mobile phones. Someone, just for communicating with friends, others go to their bank accounts. And if the former are not interesting to attackers (although, how to examine), then the latter for them are a tidbit. After all, a hacker can easily intercept information and find out the user password from a personal account in an online banking.
Say, do not overshadow the situation? But, the interception of the traffic, which will be described in this article, will not save even two -factor authentication from access to your finances. The attacker will become available for Pinkodes from your phone number sMS. And to find out the password from your bank cabinet to hackers is even easier than getting access to sMS.
What is the essence of the problem?
In any case, you need to follow your traffic. We already wrote that you should not use public points Wi-Fi for decision to bank operations. But, it is not necessary to use a cellular network for these purposes. Operators assure that our data is well protected. But, this is not so. A month ago this was proved by a cybersecurity specialist Zhang Van Qiao (Zhang Wanqiao) from Qihoo 360. At the conference Ruxcon This Chinese specialist demonstrated the interception of the smartphone.
He was not only able to find out the location of the device, but also managed to get access to the calls and messages of his user. And wherein, Zhang Van Qiao I used the technology and tools that are available to every hacker.
For access to traffic and data, a network security specialist used the vulnerability of cellular networks. At the same time, this vulnerability has been known for mobile operators since 2006. But they cannot close it yet. It is based on a mechanism that provides resistance to failures when overloading one of the towers of a mobile operator. The mechanism should assess the situation and switch traffic to another tower.
But, the fact is that a hacker can create a dummy tower on which the mechanisms of cellular operators will redirect traffic. The technology is not new. For example, it is successfully used by special services, tracking the location of the attacker by a signal connecting his phone with the nearest tower of the cell operator.
Zhang Van Qiao demonstrated the creation of fake towers and interception of traffic in the networks of leading operators of Great Britain, the USA and Australia. At the same time, he emphasizes that such access can be made not only in these countries, but throughout the world.
Can I protect yourself?
Of course, if you have nothing to hide, then you should not be afraid of interception of traffic. But, each of the smartphone today has bank applications, everyone can call their financial organization or their business partner. If these data become available to third parties, then at best you can miss your money. But, there may be more serious consequences.
Is it possible to protect yourself from such "stands". Unfortunately no. Modern technologies do not allow mobile operators to redirect the signal only to real towers. Users can only minimize the risk. That is, do not use compromising or secret information when calls or Internet traffic from your smartphone. You can also encrypt data using important information VPN connection or messaders type Telegram.
For such a “set -in”, expensive and high -tech “iron” or special software is not required. That is why, it is impossible to protect against access to your phone of attackers. And in the near future no one can close this gap in protecting the data of your mobile operator. Be careful.