Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Novel 5G Attack Bypasses Need for Malicious Base Station

Posted on August 18, 2025August 18, 2025 By CWS

A group of researchers from the Singapore College of Know-how and Design has disclosed the small print of a brand new 5G assault that doesn’t require the usage of a malicious base station.

As a part of the venture, the researchers have launched a framework named Sni5Gect that can be utilized to smell messages and carry out message injection in 5G communications. The assault targets the 5G New Radio (NR) radio entry know-how that powers 5G networks.

Beforehand demonstrated 5G assaults concerned the usage of a rogue base station that the sufferer wants to connect with, which might restrict the practicality of an assault, the researchers stated. 

The Sni5Gect assault, then again, entails an attacker who’s in vary of the sufferer intercepting unencrypted messages exchanged between the bottom station and the focused consumer’s cellphone.

The assault targets the connection earlier than authentication and earlier than the site visitors is protected, which implies the attacker doesn’t want the sufferer gadget’s credentials. This may be achieved by ready for the focused cellphone to lose connection and reinitiate it. 

The researchers identified that it’s not unusual for units to reconnect to the community, together with when the consumer disables airplane mode after a flight, when passing via a tunnel or underground parking storage, or when driving an elevator. 

If the attacker can initialize an assault previous to the connection being secured, they’ll intercept unencrypted messages and inject malicious payloads. This permits the hacker to crash the modem on the sufferer’s gadget, fingerprint and later monitor the focused gadget, and downgrade the connection to 4G, which has recognized vulnerabilities that may be exploited by the attacker. 

The Sni5Gect assault has been examined towards 5 smartphones, together with OnePlus Nord CE 2, Samsung Galaxy S22, Google Pixel 7, and Huawei P40 Professional. Commercial. Scroll to proceed studying.

Throughout their assessments, the researchers achieved 80% accuracy in uplink and downlink sniffing, and managed to inject messages with a hit price of 70-90% from a distance of as much as 20 meters (65 toes). 

“In comparison with prior state-of-the-art works, the Sni5Gect framework doesn’t require rogue gNodeB (gNB) stations when executing over-the-air sniffing and stateful injections. The absence of a rogue gNB is critical because it reduces setup complexities whereas growing stealth,” defined Yee Ching Tok of the SANS Web Storm Heart.

GSMA, the group that represents the pursuits of cell community operators, has acknowledged the findings and assigned the assault the identifier CVD-2024-0096 (CVD somewhat than CVE identifiers are assigned to safety points affecting the cell business). 

The Sni5Gect framework has been made accessible as open supply.

Associated: LTE, 5G Vulnerabilities Might Lower Whole Cities From Mobile Connectivity

Associated: Telecom Big Orange Hit by Cyberattack

Associated: China’s Salt Storm Hackers Goal Canadian Telecom Corporations

Security Week News Tags:Attack, Base, Bypasses, Malicious, Station

Post navigation

Previous Post: Bragg Confirms Cyber Attack – Hackers Accessed Internal IT Systems
Next Post: Intel Websites Exploited to Hack Every Intel Employee and View Confidential Data

Related Posts

The Cybersecurity Information Sharing Act Faces Expiration Security Week News
Google Offers Up to $20,000 in New AI Bug Bounty Program Security Week News
FBI Shares IoCs for Recent Salesforce Intrusion Campaigns Security Week News
SonicWall Patches Exploited SMA 1000 Zero-Day Security Week News
Asahi Data Breach Impacts 2 Million Individuals Security Week News
Microsoft Boosts .NET Bounty Program Rewards to $40,000 Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark