One of the most well-known security standards in telecommunications and mobile networks is mutual authentication, which allows a smartphone and mobile network to verify their identities. In the Long Term Evolution (LTE) standard, mutual authentication is set at the control plane, with secure authentication and a key agreement protocol. Recently, network security specialists at universities in Germany and the United Arab Emirates demonstrated that it is possible to abuse the lack of user-level integrity protection to deploy some attack variants.
These attack variants known as IMPAGT, focus on exploiting an IP stack operating system reflection mechanism and the lack of user data integrity protection to subsequently complete the attack against third layer, allowing threat actors to impersonate a legitimate user on a network by injecting arbitrary packets.
Impersonation can be done on the uplink or in
the downlink direction:
the uplink attack, a hacker can impersonate a victim to the network and can use
arbitrary IP services (websites) with the identity of the victim. All traffic
generated by the attacker is associated with the victim’s IP address
spoofing allows hackers to establish a TCP/IP connection to the phone that
bypasses any firewall mechanism on the LTE network. Attacker cannot break any
security mechanism above IP layer
Network security specialists deployed multiple
scenarios to verify the behavior of devices with iOS or Android operating
systems in the event of such an attack.
Successful exploitation of this attack would
allow threat actors to impersonate the victim or network at the IP layer, so
they could send and receive IP packets with the impersonated identity. It is
important to note that attackers would not be able to access the victim’s email
accounts or messaging services, make phone calls, or break a website’s TLS
For mobile operators, they rely on mutual
authentication to bill or provide access to some service websites that can only
be accessed with a network layer identifier. According to network security
specialists, IMP4GT attacks allow threat actors to use the identity of victims
to access those services when they do not request additional authorization.
While the potential consequences of an attack
are disastrous, users are at risk of mild to moderate, as exploiting an IMP4GT
attack requires a threat actor with advanced skills, and needs to be in a location
close to potential victims. As if that weren’t enough, some highly specialized
hardware tools and a custom implementation of the LTE protocol stack are
required, not to mention that this analysis was performed in a controlled test
As already mentioned, the attack exploits the
absence of missing integrity protection and the operating system’s reflection
mechanism. Because only the first attack vector is inherent in mobile networks,
this variable is defined by the operating system of the affected device.
Considering the above, and because user data integrity protection is compatible
networks, although not used in cases of dual connectivity, early 5G
implementations are vulnerable to these attacks.
To conclude their report (available here)
network security researchers highlighted the fact that these attacks are based
on a specification failure, so all network providers are vulnerable.
The International Institute of Cyber Security (IICS)
has broadly monitored reports of network attacks exploiting 4G technology;
while it is considered that the transition to the use of 5G networks would
obstruct the deployment of a wide variety of attacks, completing this process
is truly complex, as even in the more developed countries the transition has been
carried out in a leisurely manner and only in regions determined, so it could
take years to achieve the widespread use of 5G technology.