Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Novel 5G Attack Bypasses Need for Malicious Base Station

Posted on August 18, 2025August 18, 2025 By CWS

A group of researchers from the Singapore College of Know-how and Design has disclosed the small print of a brand new 5G assault that doesn’t require the usage of a malicious base station.

As a part of the venture, the researchers have launched a framework named Sni5Gect that can be utilized to smell messages and carry out message injection in 5G communications. The assault targets the 5G New Radio (NR) radio entry know-how that powers 5G networks.

Beforehand demonstrated 5G assaults concerned the usage of a rogue base station that the sufferer wants to connect with, which might restrict the practicality of an assault, the researchers stated. 

The Sni5Gect assault, then again, entails an attacker who’s in vary of the sufferer intercepting unencrypted messages exchanged between the bottom station and the focused consumer’s cellphone.

The assault targets the connection earlier than authentication and earlier than the site visitors is protected, which implies the attacker doesn’t want the sufferer gadget’s credentials. This may be achieved by ready for the focused cellphone to lose connection and reinitiate it. 

The researchers identified that it’s not unusual for units to reconnect to the community, together with when the consumer disables airplane mode after a flight, when passing via a tunnel or underground parking storage, or when driving an elevator. 

If the attacker can initialize an assault previous to the connection being secured, they’ll intercept unencrypted messages and inject malicious payloads. This permits the hacker to crash the modem on the sufferer’s gadget, fingerprint and later monitor the focused gadget, and downgrade the connection to 4G, which has recognized vulnerabilities that may be exploited by the attacker. 

The Sni5Gect assault has been examined towards 5 smartphones, together with OnePlus Nord CE 2, Samsung Galaxy S22, Google Pixel 7, and Huawei P40 Professional. Commercial. Scroll to proceed studying.

Throughout their assessments, the researchers achieved 80% accuracy in uplink and downlink sniffing, and managed to inject messages with a hit price of 70-90% from a distance of as much as 20 meters (65 toes). 

“In comparison with prior state-of-the-art works, the Sni5Gect framework doesn’t require rogue gNodeB (gNB) stations when executing over-the-air sniffing and stateful injections. The absence of a rogue gNB is critical because it reduces setup complexities whereas growing stealth,” defined Yee Ching Tok of the SANS Web Storm Heart.

GSMA, the group that represents the pursuits of cell community operators, has acknowledged the findings and assigned the assault the identifier CVD-2024-0096 (CVD somewhat than CVE identifiers are assigned to safety points affecting the cell business). 

The Sni5Gect framework has been made accessible as open supply.

Associated: LTE, 5G Vulnerabilities Might Lower Whole Cities From Mobile Connectivity

Associated: Telecom Big Orange Hit by Cyberattack

Associated: China’s Salt Storm Hackers Goal Canadian Telecom Corporations

Security Week News Tags:Attack, Base, Bypasses, Malicious, Station

Post navigation

Previous Post: Bragg Confirms Cyber Attack – Hackers Accessed Internal IT Systems
Next Post: Intel Websites Exploited to Hack Every Intel Employee and View Confidential Data

Related Posts

Microsoft Paid Out $17 Million in Bug Bounties in Past Year Security Week News
French Telecom Firm Bouygues Says Data Breach Affects 6.4M Customers Security Week News
No Patch for Flaw Exposing Hundreds of LG Cameras to Remote Hacking Security Week News
Cyberstarts Launches $300M Liquidity Fund to Help Startups Retain Top Talent Security Week News
Flaw Allowing Website Takeover Found in WordPress Plugin With 400k Installations Security Week News
Tonic Security Launches With $7 Million in Seed Funding Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • North Korea Uses GitHub in Diplomat Cyber Attacks as IT Worker Scheme Hits 320+ Firms
  • High-Severity Vulnerabilities Patched in Chrome, Firefox
  • Intel Employee Data Exposed by Vulnerabilities
  • Chrome High-Severity Vulnerability Let Attackers Crash Browser or Execute Arbitrary Code
  • New Salty 2FA PhaaS platform Attacking Microsoft 365 Users to Steal Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • North Korea Uses GitHub in Diplomat Cyber Attacks as IT Worker Scheme Hits 320+ Firms
  • High-Severity Vulnerabilities Patched in Chrome, Firefox
  • Intel Employee Data Exposed by Vulnerabilities
  • Chrome High-Severity Vulnerability Let Attackers Crash Browser or Execute Arbitrary Code
  • New Salty 2FA PhaaS platform Attacking Microsoft 365 Users to Steal Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News