Business Insights
  • Home
  • Crypto
  • Finance Expert
  • Business
  • Invest News
  • Investing
  • Trading
  • Forex
  • Videos
  • Economy
  • Tech
  • Contact

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • August 2023
  • January 2023
  • December 2021
  • July 2021
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019

Categories

  • Business
  • Crypto
  • Economy
  • Finance Expert
  • Forex
  • Invest News
  • Investing
  • Tech
  • Trading
  • Uncategorized
  • Videos
Apply Loan
Money Visa
Advertise Us
Money Visa
  • Home
  • Crypto
  • Finance Expert
  • Business
  • Invest News
  • Investing
  • Trading
  • Forex
  • Videos
  • Economy
  • Tech
  • Contact
Hackers can now crash phones and downgrade 5G to 4G networks with a toolkit exploiting unencrypted pre-authentication messages
  • Tech

Hackers can now crash phones and downgrade 5G to 4G networks with a toolkit exploiting unencrypted pre-authentication messages

  • August 30, 2025
  • Roubens Andy King
Total
0
Shares
0
0
0
Total
0
Shares
Share 0
Tweet 0
Pin it 0


  • 5G phones can be silently downgraded to insecure 4G, leaving the device exposed
  • The exploit works without setting up expensive and complex fake towers
  • Tested smartphones include flagship models from Samsung, Google, Huawei, and OnePlus

In late 2023, researchers uncovered a set of flaws in 5G modem firmware from major chipmakers, including MediaTek and Qualcomm, collectively named 5Ghoul.

A group of academics at the Singapore University of Technology and Design (SUTD) has now shown how 5G phones can be tricked into falling back to 4G networks through a method that avoids the need for a fake base station.

Instead, it targets a vulnerable stage of communication between phone and tower, where critical messages remain unencrypted.


You may like

The SNI5GECT toolkit, short for “Sniffing 5G Inject,” makes use of the tiny time window at the start of a connection attempt.

It targets the pre-authentication phase, when the data passing between the tower and the phone remains unencrypted.

Because of this gap, attackers can intercept and inject messages without needing to know the phone’s private credentials.

During this stage, the system can capture identifiers sent from the tower and use them to read and modify messages.

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

With such access, the attacker can force a modem crash, map a device fingerprint, or trigger a switch from 5G to 4G.

Since 4G carries long-known flaws, the forced downgrade leaves the target open to older tracking or location attacks.

The tests revealed a success rate between 70% and 90% when attempted from around twenty meters away, suggesting the method works in realistic conditions.

The academics tested the framework on several smartphones, including popular models from Samsung, Google, Huawei, and OnePlus.

In these cases, the researchers were able to intercept both uplink and downlink traffic with notable accuracy.

Importantly, the method avoids the complexity of setting up a rogue base station, something that has long limited practical attacks on mobile networks.

The Global System for Mobile Communications Association (GSMA) has since confirmed the issue and assigned it the identifier CVD-2024-0096, marking it as a downgrade risk.

The claim from the team is that their toolkit is not meant for criminal use but for further research into wireless security.

They argue it could help with the development of packet-level detection and new forms of 5G protection.

Still, the ability to crash devices or silently downgrade them raises questions about the resilience of current networks.

While no clear reports exist of real-world abuse so far, the method is public and the software is open source, so the risk remains that skilled actors could adapt it.

Unfortunately, users have few direct options to block such low-level exploits, though broader digital hygiene may help limit downstream risks.

However, running updated antivirus software, securing credentials with a password manager, and enabling an authenticator app for accounts can reduce the impact of secondary attacks that might follow from a network downgrade.

Via The Hacker News

You might also like

Total
0
Shares
Share 0
Tweet 0
Pin it 0
Roubens Andy King

Previous Article
Bitcoin Price Skepticism Will Remain Into The Millions: Analyst
  • Crypto

Bitcoin Price Skepticism Will Remain Into The Millions: Analyst

  • August 30, 2025
  • Roubens Andy King
Read More
Next Article
BYD follows Tesla's radical approach; the results are just as disastrous
  • Trading

BYD follows Tesla's radical approach; the results are just as disastrous

  • August 30, 2025
  • Roubens Andy King
Read More
You May Also Like
Get 50 percent off subscriptions
Read More
  • Tech

Get 50 percent off subscriptions

  • Roubens Andy King
  • August 31, 2025
The fall of EV startup Fisker: A comprehensive timeline
Read More
  • Tech

The fall of EV startup Fisker: A comprehensive timeline

  • Roubens Andy King
  • August 31, 2025
Crypto and tech entrepreneurs are attending Network School, founded by Balaji Srinivasan in Forest City, Malaysia, to test his concepts about the Network State (Ryan Weeks/Bloomberg)
Read More
  • Tech

Crypto and tech entrepreneurs are attending Network School, founded by Balaji Srinivasan in Forest City, Malaysia, to test his concepts about the Network State (Ryan Weeks/Bloomberg)

  • Roubens Andy King
  • August 31, 2025
KPMG built a 100-page monster LLM prompt and now tax advice that once took weeks gets churned out in hours
Read More
  • Tech

KPMG built a 100-page monster LLM prompt and now tax advice that once took weeks gets churned out in hours

  • Roubens Andy King
  • August 31, 2025
AI Lies to You Because It Thinks That’s What You Want
Read More
  • Tech

AI Lies to You Because It Thinks That’s What You Want

  • Roubens Andy King
  • August 31, 2025
This ChatGPT-powered app helps you pick winning stocks
Read More
  • Tech

This ChatGPT-powered app helps you pick winning stocks

  • Roubens Andy King
  • August 31, 2025
The Pixel 10 Pro is cheaper than the Pixel 10, at least for me
Read More
  • Tech

The Pixel 10 Pro is cheaper than the Pixel 10, at least for me

  • Roubens Andy King
  • August 31, 2025
No, a Windows update probably didn’t brick your SSD
Read More
  • Tech

No, a Windows update probably didn’t brick your SSD

  • Roubens Andy King
  • August 31, 2025

Recent Posts

  • Ucore Strikes Rare Earth Offtake Deal With Critical Metals
  • Amazon is selling a $69 stick vacuum for only $30 that's 'small but mighty'
  • Get 50 percent off subscriptions
  • ETH and BTC ETFs Reverse Gains with $291M in Outflows Ahead Of New Week
  • Bitcoin No Longer Plays Gold’s Game
Featured Posts
  • Ucore Strikes Rare Earth Offtake Deal With Critical Metals 1
    Ucore Strikes Rare Earth Offtake Deal With Critical Metals
    • August 31, 2025
  • Amazon is selling a  stick vacuum for only  that's 'small but mighty' 2
    Amazon is selling a $69 stick vacuum for only $30 that's 'small but mighty'
    • August 31, 2025
  • Get 50 percent off subscriptions 3
    Get 50 percent off subscriptions
    • August 31, 2025
  • ETH and BTC ETFs Reverse Gains with 1M in Outflows Ahead Of New Week 4
    ETH and BTC ETFs Reverse Gains with $291M in Outflows Ahead Of New Week
    • August 31, 2025
  • Bitcoin No Longer Plays Gold’s Game 5
    Bitcoin No Longer Plays Gold’s Game
    • August 31, 2025
Recent Posts
  • Government shutdown, CDC fight, Epstein probe, stock trading ban dominate agenda for Congress
    Government shutdown, CDC fight, Epstein probe, stock trading ban dominate agenda for Congress
    • August 31, 2025
  • House-rich, cash-poor homeowners are tapping their record-high equity to cut their debts
    House-rich, cash-poor homeowners are tapping their record-high equity to cut their debts
    • August 31, 2025
  • Want to make a career in Finance? Ft. Soumya Ranjan
    Want to make a career in Finance? Ft. Soumya Ranjan
    • August 31, 2025
Categories
  • Business (1,996)
  • Crypto (1,391)
  • Economy (115)
  • Finance Expert (1,648)
  • Forex (1,389)
  • Invest News (2,283)
  • Investing (1,393)
  • Tech (1,981)
  • Trading (1,966)
  • Uncategorized (2)
  • Videos (805)

Subscribe

Subscribe now to our newsletter

Money Visa
  • Privacy Policy
  • DMCA
  • Terms of Use
Money & Invest Advices

Input your search keywords and press Enter.