• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      Computing Tech Marketing & Innovation Awards
      • Date: 12 Jun 2020
      • TBC, London
      event logo
      AI & Machine Learning Awards 2020

      The Computing AI & Machine Learning Awards recognise the best companies, individuals, and projects in the AI space today. The awards cover every corner of the industry: security, ethics, data analysis, innovation and more, as well as showcasing the movers and shakers: the technology heroes and projects that deserve industry-wide praise. The winners will be announced in London on 1 July 2020. Entries are now open!

      • Date: 01 Jul 2020
      • TBC, London
      Digital Technology Leader Awards

      For too long the limelight has shone exclusively on marketing staff. The Computing Digital Technology Leaders Awards exist to recognise the achievements of the individuals and companies who are really making it happen at the coal face of the digital technology stack: from website design and coding to UX and project management, from scrum masters and product managers, all the way up to the CDO.

      • Date: 08 Jul 2020
      • London TBC, London
      event logo
      Computing DevOps Live 2020
      • Date: 14 Jul 2020
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    •  

       

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 
  • Threats and Risks

Flaws in Diameter signalling protocol make all 4G networks prone to denial-of-service attacks

The protocol is used to authenticate message and information distribution in 4G networks

Flaws in Diameter signalling protocol make all 4G networks prone to denial-of-service attacks
Flaws in Diameter signalling protocol make all 4G networks prone to denial-of-service attacks
  • Dev Kundaliya
  • 27 March 2020
  • Tweet  
  • Facebook  
  • LinkedIn  
  • Send to  
0 Comments

A security assessment of the Diameter signalling protocol performed by the researchers at Positive Technologies shows that all existing 4G networks are susceptible to denial-of-service (DoS) attacks.

According to researchers, this protocol is marred by several architectural flaws, which could allow hackers to launch targeted DoS attacks against 4G subscribers, track their location, and obtain their confidential information.

Diameter signalling protocol is a vital component in 4G networks. It is used to authenticate message and information distribution in 4G networks while also facilitating communication between the network elements of Internet Protocol.

In the current study, researchers attempted to infiltrate 28 telecommunications networks across Europe, Asia, South America, and Africa between 2018 and 2019 and reported success in each of their attempts.

They explored different types of attacks, including denial of service (DoS) attack, attempts to circumvent restrictions imposed by operators to allow fraudulent usage, and intercepting SMS.

DoS was found to be the easiest form of attack, facilitated by architectural flaws existing in the Diameter protocol.

"Every tested network was vulnerable to denial of service," the researchers revealed.

Test attacks resulted in dropped or slower Internet connections and prevented the subscriber from using the Internet. In some cases, the subscriber device was even downgraded to 3G mode.

Other flaws in the protocol allowed testers to track the location of the subscriber (in 89 per cent of the cases).

They also successfully obtained sensitive subscriber information and were able to bypass restriction on mobile services.

"In most cases, the testers successfully accessed subscriber profiles."

That happened because of telecommunication networks not paying attention "to consider the actual location of a subscriber when receiving signalling traffic from an external network".

The researchers caution that these security flaws will continue to exist in upcoming 5G networks, which are built on the top of existing 4G architecture and use the same LTE network core.

Because of the vulnerabilities, the 5G subscribers could see their service downgraded to insecure 3G networks.

"5G networks currently have the non-standalone architecture, which is based on 4G."

"Attempts to implement security as an afterthought at later stages may cost much more: operators will likely need to purchase additional equipment, at best. At worst, operators may be stuck with long-term security vulnerabilities that cannot be fixed later."

  • Tweet  
  • Facebook  
  • LinkedIn  
  • Send to  
  • Topics
  • Threats and Risks
  • Security
  • 4G
  • 5G
  • Diameter signalling protocol
  • 4G networks
  • denial-of-service attacks

More on Threats and Risks

It's not known how much information was compromised in one of the largest China-sourced cyber attacks to date
Surge in attacks from China-linked APT41 targeting unpatched Citrix servers and Cisco routers

APT41 attacks carried out between January and March targeted unsecured Citrix NetScaler servers and Cisco routers

  • Security
  • 25 March 2020
Keeping systems patched as a matter of priority is the first line of defence against ransomware
More ransomware groups threaten to publish data stolen data from non-payers

More and more ransomware groups are starting to steal data before encryption in order to blackmail their victims into paying up

  • Security
  • 25 March 2020
Easy availability of ICS hacking tools poses big threat to industrial sector, researchers warn
Easy availability of ICS hacking tools poses major threat to industrial sector, researchers warn

Most tools are 'vendor agnostic' and can target products from some of the largest ICS original equipment manufacturers, warns FireEye

  • Threats and Risks
  • 24 March 2020
Spanish hospitals have been targeted with coronavirus-themed ransomware
Spanish hospitals targeted with coronavirus-themed phishing lures in Netwalker ransomware attacks

Groups behind Netwalker switched phishing baits to coronavirus last week - as other ransomware groups pledged to avoid medical facilities

  • Security
  • 24 March 2020
Hackers are exploiting two zero-day vulnerabilities in Windows Adobe Type Manager Library
Microsoft: Two zero-day vulnerabilities in Windows Adobe Type Manager Library are actively being exploited

All supported versions of Windows operating system are affected

  • Threats and Risks
  • 24 March 2020
blog comments powered by Disqus
Back to Top

Most read

Working from home, keeping connected: 17 video conferencing and collaboration tools to consider
Working from home, keeping connected: 17 video conferencing and collaboration tools to consider
How Hillarys responded to the coronavirus outbreak
How Hillarys responded to the coronavirus outbreak
Spanish hospitals targeted with coronavirus-themed phishing lures in Netwalker ransomware attacks
Spanish hospitals targeted with coronavirus-themed phishing lures in Netwalker ransomware attacks
South Korean APT uses five zero-day flaws to turn the tables on North Korea
South Korean APT uses five zero-day flaws to turn the tables on North Korea
Microsoft: Two zero-day vulnerabilities in Windows Adobe Type Manager Library are actively being exploited
Microsoft: Two zero-day vulnerabilities in Windows Adobe Type Manager Library are actively being exploited
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017