Sunday, 31 August 2025
32.3 C
Singapore
32.4 C
Thailand
28.6 C
Indonesia
27.7 C
Philippines

Researchers show how 5G phones can be downgraded to 4G in a new cyberattack

Researchers have revealed a toolkit that can downgrade 5G phones to 4G, exposing them to known security flaws and raising concerns about mobile security.

In late 2023, security researchers identified a series of vulnerabilities in 5G modem firmware produced by major chipmakers, including MediaTek and Qualcomm. The flaws, collectively named 5Ghoul, have since been further investigated by a team of academics at the Singapore University of Technology and Design (SUTD). Their research reveals a novel attack method that can compel modern smartphones to downgrade from 5G to 4G networks without the user’s knowledge, thereby exposing devices to longstanding security vulnerabilities in 4G technology.

Unlike many previous mobile network exploits, this technique does not require attackers to set up a fake base station, which has traditionally been a significant barrier to practical attacks. Instead, it targets an early and vulnerable stage of communication between a phone and a cell tower, where some critical messages are sent without encryption. By exploiting this phase, attackers can manipulate network behaviour and compromise device security.

Exploiting weaknesses with the SNI5GECT toolkit

The researchers developed a proof-of-concept framework known as SNI5GECT, short for Sniffing 5G Inject, which exploits a brief time window at the start of a device’s connection attempt to a network. During this pre-authentication stage, data exchanged between the mobile device and the network tower remains unencrypted, allowing attackers to intercept and inject malicious messages without access to private credentials.

Through this exploit, attackers can crash a modem, map a device fingerprint, or force the device to switch from 5G to 4G. Since 4G networks have long-documented vulnerabilities, the downgrade could allow attackers to conduct location tracking or intercept communications more easily.

Testing showed a success rate of between 70% and 90% when carried out from a distance of around 20 metres, demonstrating its practicality in real-world conditions. The team tested the exploit on a variety of devices, including popular models from Samsung, Google, Huawei, and OnePlus, and successfully intercepted both uplink and downlink traffic with high precision.

The researchers emphasised that this approach reduces the complexity of mobile network attacks because it bypasses the need to set up a rogue base station, making it significantly easier to execute than previous downgrade exploits.

Industry response and security recommendations

The Global System for Mobile Communications Association (GSMA) has acknowledged the vulnerability, assigning it the identifier CVD-2024-0096 and classifying it as a downgrade risk. The researchers have released the toolkit as open-source software, stating that they intend to encourage further study and development of more robust 5G defences, including packet-level detection systems.

Despite their intentions, the ability to silently crash devices or downgrade connections raises concerns about the resilience of mobile networks. Although there have been no confirmed cases of real-world abuse so far, the public availability of the software means skilled attackers could adopt and refine the technique.

Currently, mobile users have limited options to block such low-level exploits directly. However, experts advise improving general digital security to mitigate the risks of downstream attacks. Practices such as keeping antivirus software up to date, storing credentials securely in a password manager, and using multi-factor authentication can help protect sensitive data even if a network-level vulnerability is exploited.

Hot this week

Nvidia CEO says AI spending boom is only beginning

Nvidia CEO Jensen Huang predicts AI spending could reach US$4 trillion by 2030, rejecting fears of a slowdown in chip demand.

OpenLight raises US$34 million to scale photonics for AI data centres

OpenLight secures US$34M Series A to scale integrated photonics for AI data centres, expanding its PDK and accelerating product innovation.

AI-driven insider threats rising sharply in APJ, Exabeam warns

Exabeam research warns AI-driven insider threats are rising in APJ, with 69% expecting growth and detection capabilities still lagging.

HPE introduces agentic AI innovations for self-driving network operations

HPE enhances its Juniper Mist platform with new agentic AI features, bringing self-driving capabilities to network operations.

Apple’s first foldable iPhone tipped to launch with major design changes

Apple’s first foldable iPhone is expected to debut with an 8-inch foldable screen, eSIM-only support, and a high-quality hinge for its 20th anniversary.

Meta introduces new AI safeguards to protect teens from harmful conversations

Meta is strengthening AI safeguards to prevent teens from discussing self-harm and other sensitive topics with chatbots on Instagram and Facebook.

ChatGPT to introduce parental controls as AI safety concerns rise

OpenAI is introducing parental controls for ChatGPT, addressing growing concerns about the safety of AI chatbots and their impact on young users.

Japan uses an AI simulation of Mount Fuji’s eruption to prepare citizens

Japan uses AI to simulate a Mount Fuji eruption, showing its potential devastation and promoting disaster preparedness.

Anthropic updates Claude chatbot policy to use chat data for AI training

Anthropic will utilise Claude chatbot conversations for AI training starting from 28 September, with opt-out options and a five-year data retention policy.

Related Articles

Popular Categories