Saturday, 18 October 2025
26.8 C
Singapore
28.1 C
Thailand
26 C
Indonesia
28 C
Philippines

Researchers show how 5G phones can be downgraded to 4G in a new cyberattack

Researchers have revealed a toolkit that can downgrade 5G phones to 4G, exposing them to known security flaws and raising concerns about mobile security.

In late 2023, security researchers identified a series of vulnerabilities in 5G modem firmware produced by major chipmakers, including MediaTek and Qualcomm. The flaws, collectively named 5Ghoul, have since been further investigated by a team of academics at the Singapore University of Technology and Design (SUTD). Their research reveals a novel attack method that can compel modern smartphones to downgrade from 5G to 4G networks without the user’s knowledge, thereby exposing devices to longstanding security vulnerabilities in 4G technology.

Unlike many previous mobile network exploits, this technique does not require attackers to set up a fake base station, which has traditionally been a significant barrier to practical attacks. Instead, it targets an early and vulnerable stage of communication between a phone and a cell tower, where some critical messages are sent without encryption. By exploiting this phase, attackers can manipulate network behaviour and compromise device security.

Exploiting weaknesses with the SNI5GECT toolkit

The researchers developed a proof-of-concept framework known as SNI5GECT, short for Sniffing 5G Inject, which exploits a brief time window at the start of a device’s connection attempt to a network. During this pre-authentication stage, data exchanged between the mobile device and the network tower remains unencrypted, allowing attackers to intercept and inject malicious messages without access to private credentials.

Through this exploit, attackers can crash a modem, map a device fingerprint, or force the device to switch from 5G to 4G. Since 4G networks have long-documented vulnerabilities, the downgrade could allow attackers to conduct location tracking or intercept communications more easily.

Testing showed a success rate of between 70% and 90% when carried out from a distance of around 20 metres, demonstrating its practicality in real-world conditions. The team tested the exploit on a variety of devices, including popular models from Samsung, Google, Huawei, and OnePlus, and successfully intercepted both uplink and downlink traffic with high precision.

The researchers emphasised that this approach reduces the complexity of mobile network attacks because it bypasses the need to set up a rogue base station, making it significantly easier to execute than previous downgrade exploits.

Industry response and security recommendations

The Global System for Mobile Communications Association (GSMA) has acknowledged the vulnerability, assigning it the identifier CVD-2024-0096 and classifying it as a downgrade risk. The researchers have released the toolkit as open-source software, stating that they intend to encourage further study and development of more robust 5G defences, including packet-level detection systems.

Despite their intentions, the ability to silently crash devices or downgrade connections raises concerns about the resilience of mobile networks. Although there have been no confirmed cases of real-world abuse so far, the public availability of the software means skilled attackers could adopt and refine the technique.

Currently, mobile users have limited options to block such low-level exploits directly. However, experts advise improving general digital security to mitigate the risks of downstream attacks. Practices such as keeping antivirus software up to date, storing credentials securely in a password manager, and using multi-factor authentication can help protect sensitive data even if a network-level vulnerability is exploited.

Hot this week

Nvidia launches DGX Spark ‘personal AI supercomputer’ on 15 October

Nvidia launches the DGX Spark on 15 October, a compact “personal AI supercomputer” bringing high-performance AI computing to desktops.

Belkin unveils Stage PowerGrip: a magnetic iPhone accessory with built-in power bank

Belkin unveils the Stage PowerGrip, a magnetic iPhone grip that doubles as a multi-device charger with a 9,300mAh battery.

Meta accelerates AI innovation in Singapore with Llama Incubator Program Demo Day

Meta’s Llama Incubator Demo Day highlights its push to support open-source AI innovation and strengthen Singapore’s digital economy.

Singapore Land Transport Authority enhances railway surveillance with Nokia fibre and IP technology

LTA partners with Nokia and Hitachi Rail to upgrade Singapore’s railway CCTV network with fibre Optical LAN and IP solutions.

FLAG enhances undersea network capacity with Ciena’s WaveLogic 6

FLAG upgrades its India Connectivity Mesh with Ciena’s WaveLogic 6, boosting capacity and improving efficiency on key subsea routes.

IPI Singapore: Enabling SMEs to scale through digital transformation and innovation partnerships

IPI Singapore shows how SMEs can scale through innovation, partnerships, and digital transformation to compete globally.

Semperis unveils cyberwar documentary spotlighting global defenders and reformed hackers

Semperis unveils Midnight in the War Room, a documentary revealing the human stories behind the global fight against cyber threats.

TeamViewer integrates AI-driven workplace solutions with Salesforce Agentforce IT Service

TeamViewer integrates AI-powered DEX and remote connectivity with Salesforce Agentforce IT Service to boost IT efficiency and reliability.

New study reveals rise of ‘AI natives’ shaping customer and workplace expectations in Asia Pacific

A Zoom study highlights the rise of ‘AI natives’ in Asia Pacific, revealing their growing impact on customer experience and workplace expectations.

Related Articles