Monday, 8 December 2025
27 C
Singapore
23.6 C
Thailand
21.2 C
Indonesia
26.9 C
Philippines

Researchers show how 5G phones can be downgraded to 4G in a new cyberattack

Researchers have revealed a toolkit that can downgrade 5G phones to 4G, exposing them to known security flaws and raising concerns about mobile security.

In late 2023, security researchers identified a series of vulnerabilities in 5G modem firmware produced by major chipmakers, including MediaTek and Qualcomm. The flaws, collectively named 5Ghoul, have since been further investigated by a team of academics at the Singapore University of Technology and Design (SUTD). Their research reveals a novel attack method that can compel modern smartphones to downgrade from 5G to 4G networks without the user’s knowledge, thereby exposing devices to longstanding security vulnerabilities in 4G technology.

Unlike many previous mobile network exploits, this technique does not require attackers to set up a fake base station, which has traditionally been a significant barrier to practical attacks. Instead, it targets an early and vulnerable stage of communication between a phone and a cell tower, where some critical messages are sent without encryption. By exploiting this phase, attackers can manipulate network behaviour and compromise device security.

Exploiting weaknesses with the SNI5GECT toolkit

The researchers developed a proof-of-concept framework known as SNI5GECT, short for Sniffing 5G Inject, which exploits a brief time window at the start of a device’s connection attempt to a network. During this pre-authentication stage, data exchanged between the mobile device and the network tower remains unencrypted, allowing attackers to intercept and inject malicious messages without access to private credentials.

Through this exploit, attackers can crash a modem, map a device fingerprint, or force the device to switch from 5G to 4G. Since 4G networks have long-documented vulnerabilities, the downgrade could allow attackers to conduct location tracking or intercept communications more easily.

Testing showed a success rate of between 70% and 90% when carried out from a distance of around 20 metres, demonstrating its practicality in real-world conditions. The team tested the exploit on a variety of devices, including popular models from Samsung, Google, Huawei, and OnePlus, and successfully intercepted both uplink and downlink traffic with high precision.

The researchers emphasised that this approach reduces the complexity of mobile network attacks because it bypasses the need to set up a rogue base station, making it significantly easier to execute than previous downgrade exploits.

Industry response and security recommendations

The Global System for Mobile Communications Association (GSMA) has acknowledged the vulnerability, assigning it the identifier CVD-2024-0096 and classifying it as a downgrade risk. The researchers have released the toolkit as open-source software, stating that they intend to encourage further study and development of more robust 5G defences, including packet-level detection systems.

Despite their intentions, the ability to silently crash devices or downgrade connections raises concerns about the resilience of mobile networks. Although there have been no confirmed cases of real-world abuse so far, the public availability of the software means skilled attackers could adopt and refine the technique.

Currently, mobile users have limited options to block such low-level exploits directly. However, experts advise improving general digital security to mitigate the risks of downstream attacks. Practices such as keeping antivirus software up to date, storing credentials securely in a password manager, and using multi-factor authentication can help protect sensitive data even if a network-level vulnerability is exploited.

Hot this week

Kyndryl and Microsoft report rising sustainability commitment among Singapore businesses

Most Singapore businesses are expanding sustainability efforts but face challenges with data quality and limited AI adoption.

Sony introduces A7 V with updated sensor, faster processing, and improved stabilisation

Sony launches the A7 V with a new sensor, a faster processor, and upgraded stabilisation, targeting hybrid shooters with enhanced features.

Audio-Technica unveils flagship ATH-ADX7000 open-air headphones

Audio-Technica releases the ATH-ADX7000, a flagship open-air headphone built around a new high-precision driver and lightweight design.

StarHub partners NeutraDC to boost regional quantum-safe connectivity

StarHub and NeutraDC partner to expand quantum-safe and low-latency connectivity between Singapore and Indonesia.

Ulanzi MT-74 review: A compact and versatile tripod for action cameras

The Ulanzi MT-74 is a lightweight magnetic quick-release tripod offering versatility, stability, and seamless vertical-horizontal shooting.

Tech industry overlooks Auracast as momentum quietly builds

Auracast promises major improvements in wireless audio, but limited marketing and slow adoption mean many consumers still don't know it exists.

Kirby Air Riders brings fast, chaotic racing to modern players

Kirby Air Riders offers fast, chaotic racing for quick sessions and modern short-attention-play styles.

Lofree introduces the Flow 2 low-profile mechanical keyboard for Mac users

Lofree’s Flow 2 brings improved low-profile mechanical typing to Mac users, with new POM switches, wireless support, and a solid build.

Google highlights Singapore’s top trending searches in 2025

Google reveals Singapore’s top trending searches for 2025, highlighting SG60 celebrations, elections, pop culture and financial concerns.

Related Articles

Popular Categories