Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Novel 5G Attack Bypasses Need for Malicious Base Station

Posted on August 18, 2025August 18, 2025 By CWS

A group of researchers from the Singapore College of Know-how and Design has disclosed the small print of a brand new 5G assault that doesn’t require the usage of a malicious base station.

As a part of the venture, the researchers have launched a framework named Sni5Gect that can be utilized to smell messages and carry out message injection in 5G communications. The assault targets the 5G New Radio (NR) radio entry know-how that powers 5G networks.

Beforehand demonstrated 5G assaults concerned the usage of a rogue base station that the sufferer wants to connect with, which might restrict the practicality of an assault, the researchers stated. 

The Sni5Gect assault, then again, entails an attacker who’s in vary of the sufferer intercepting unencrypted messages exchanged between the bottom station and the focused consumer’s cellphone.

The assault targets the connection earlier than authentication and earlier than the site visitors is protected, which implies the attacker doesn’t want the sufferer gadget’s credentials. This may be achieved by ready for the focused cellphone to lose connection and reinitiate it. 

The researchers identified that it’s not unusual for units to reconnect to the community, together with when the consumer disables airplane mode after a flight, when passing via a tunnel or underground parking storage, or when driving an elevator. 

If the attacker can initialize an assault previous to the connection being secured, they’ll intercept unencrypted messages and inject malicious payloads. This permits the hacker to crash the modem on the sufferer’s gadget, fingerprint and later monitor the focused gadget, and downgrade the connection to 4G, which has recognized vulnerabilities that may be exploited by the attacker. 

The Sni5Gect assault has been examined towards 5 smartphones, together with OnePlus Nord CE 2, Samsung Galaxy S22, Google Pixel 7, and Huawei P40 Professional. Commercial. Scroll to proceed studying.

Throughout their assessments, the researchers achieved 80% accuracy in uplink and downlink sniffing, and managed to inject messages with a hit price of 70-90% from a distance of as much as 20 meters (65 toes). 

“In comparison with prior state-of-the-art works, the Sni5Gect framework doesn’t require rogue gNodeB (gNB) stations when executing over-the-air sniffing and stateful injections. The absence of a rogue gNB is critical because it reduces setup complexities whereas growing stealth,” defined Yee Ching Tok of the SANS Web Storm Heart.

GSMA, the group that represents the pursuits of cell community operators, has acknowledged the findings and assigned the assault the identifier CVD-2024-0096 (CVD somewhat than CVE identifiers are assigned to safety points affecting the cell business). 

The Sni5Gect framework has been made accessible as open supply.

Associated: LTE, 5G Vulnerabilities Might Lower Whole Cities From Mobile Connectivity

Associated: Telecom Big Orange Hit by Cyberattack

Associated: China’s Salt Storm Hackers Goal Canadian Telecom Corporations

Security Week News Tags:Attack, Base, Bypasses, Malicious, Station

Post navigation

Previous Post: Bragg Confirms Cyber Attack – Hackers Accessed Internal IT Systems
Next Post: Intel Websites Exploited to Hack Every Intel Employee and View Confidential Data

Related Posts

US Seeks Forfeiture of $7.74M in Cryptocurrency Tied to North Korean IT Workers Security Week News
No Patch for Flaw Exposing Hundreds of LG Cameras to Remote Hacking Security Week News
VMware Flaws That Earned Hackers $340,000 at Pwn2Own Patched Security Week News
Critical Citrix NetScaler Flaw Exploited as Zero-Day Security Week News
Zero Networks Raises $55 Million for Microsegmentation Solution Security Week News
New ‘SmartAttack’ Steals Air-Gapped Data Using Smartwatches Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Slow and Steady Security: Lessons from the Tortoise and the Hare
  • Lenovo AI Chatbot Vulnerability Let Attackers Run Remote Scripts on Corporate Machines
  • Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts
  • RapperBot Botnet Disrupted, American Administrator Indicted
  • Seemplicity Raises $50 Million for Exposure Management Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Slow and Steady Security: Lessons from the Tortoise and the Hare
  • Lenovo AI Chatbot Vulnerability Let Attackers Run Remote Scripts on Corporate Machines
  • Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts
  • RapperBot Botnet Disrupted, American Administrator Indicted
  • Seemplicity Raises $50 Million for Exposure Management Platform

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News