Security gap enables eavesdropping on mobile phone calls


Tuesday, 25 August, 2020


Security gap enables eavesdropping on mobile phone calls

Researchers have been able to exploit a flaw that some manufacturers had made in implementing base stations.

Calls via the LTE mobile network are encrypted and should therefore be tap-proof. However, researchers from the Horst Görtz Institute for IT Security (HGI) at Ruhr-Universität Bochum, Germany, have shown that this is not always the case. They were able to decrypt the contents of calls if they were in the same radio cell as their target, whose mobile phone they then called immediately following the call they wanted to intercept. They exploit a flaw that some manufacturers had made in implementing the base stations.

The results were published by the HGI team of David Rupprecht, Dr Katharina Kohls and Professor Thorsten Holz from the Chair of Systems Security together with Professor Christina Pöpper from the New York University Abu Dhabi at the 29th Usenix Security Symposium, which took place as an online conference from 12 to 14 August 2020. The providers and manufacturers were contacted prior to the publication; by now the vulnerability should be fixed.

Re-using keys results in security gap

The vulnerability affects Voice over LTE, the telephone standard used for almost all mobile phone calls if they are not made via special messenger services. When two people call each other, a key is generated to encrypt the conversation.

“The problem was that the same key was also re-used for other calls,” Rupprecht said.

Accordingly, if an attacker called one of the two people shortly after their conversation and recorded the encrypted traffic from the same cell, he or she would get the same key that secured the previous conversation.

“The attacker has to engage the victim in a conversation,” Rupprecht explained.

“The longer the attacker talked to the victim, the more content of the previous conversation he or she was able to decrypt.”

For example, if attacker and victim spoke for five minutes, the attacker could later decode five minutes of the previous conversation.

David Rupprecht and Bedran Karakoc standing together in a corridor

David Rupprecht (right) collaborated with Bedran Karakoc (left) who developed the app as part of his Bachelor thesis. Credit: RUB, Marquard.

Identifying relevant base stations via app

In order to determine how widespread the security gap was, the IT experts tested a number of randomly selected radio cells across Germany. The gap affected 80% of the analysed radio cells. By now, the manufacturers and mobile phone providers have updated the software of the base stations to fix the problem.

Rupprecht gives the all-clear: “We then tested several random radio cells all over Germany and haven’t detected any problems since then,” he said.

Still, it can’t be ruled out that there are radio cells somewhere in the world where the vulnerability occurs.

In order to track them down, the Bochum-based group has developed an app for Android devices. Volunteers can use it to help search worldwide for radio cells that still contain the security gap and report them to the HGI team. The researchers forward the information to the GSMA, which ensures that the base stations are updated.

Additional information is available on the website http://www.revolte-attack.net.

“Voice over LTE has been in use for six years,” Rupprecht said. “We’re unable to verify whether attackers have exploited the security gap in the past.”

He is campaigning for the new mobile phone standard to be modified so that the same problem can’t occur again when 5G base stations are set up.

Main image: Using an app, volunteers can help search for radio cells that still contain the security vulnerability. Credit: RUB, Marquard.

Originally published here.

Related Articles

The new wildfire reality: mapping a response

Firefighter-turned-researcher Chris Dunn is helping pioneer data-driven solutions to tackle...

ARCIA update: LMR is not dead yet

Be it mining, rail, public safety, transport or utilities, everyone is embracing new technology...

Towards 1 Tbps throughput using sub-terahertz bands

In order to enable the near-instantaneous communication promised by 6G, ultrahigh data speeds...


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd