iTnews
  • Home
  • News
  • Technology
  • Security

Researchers devise stealthy phone tracking without fake base stations

By Juha Saarinen on Mar 24, 2022 1:03PM
Researchers devise stealthy phone tracking without fake base stations

Passive attacks work on phones from multiple vendors.

Researchers at the Eidgenössische Technische Hochschule Zürich have built a fully passive mobile phone tracking system for Long Term Evolution (LTE) networks, which does not require the use of fake base stations as with current technology.

The ETH Zurich researchers called their attack LTrack, and it can locate phones within six metres in 90 percent of cases, the researchers said [pdf].

LTrack uses uplink and downlink traffic sniffers devised by the researchers for passive localisation attacks on a large scale.

The uplink and downlink sniffers can also be used to capture a phone's unique 15-digit International Mobile Subscriber Identity (IMSI) number.

The researchers were able to validate the IMSI Extractor's functionality by testing it with 17 newer smartphones from large vendors such as Samsung, Google, Huawei and Xiaomi.

Knowing the IMSI allows surveillance agents to identify specific user devices by setting up fake mobile phone network stations, but these are detectable by law enforcement and operators thanks to the large amount of transmission power they use.

"Instead of relying on fake base stations like existing IMSI Catchers, which are detectable due to their continuous transmission, IMSI Extractor relies on our uplink/downlink sniffer enhanced with surgical message overshadowing," the researchers wrote.

"This makes our IMSI Extractor the stealthiest IMSI Catcher to date."

Hardware for LTrack is cheap, since it uses low-power software defined radios.

The researchers propose countermeasures such as notifying users when their devices receive IMSI identity requests, or a large number of eavesdroppers on operators' networks to detect their IMSI Extractor.

Using the newer 5G protocol also stops IMSI Extractor, as the unqiue identifier is encrypted with the network's public key, and cannot be decoded by attackers.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
4gappleeth zurichgooglehtchuaweiimsiimsi catcheriphoneltenetworkingoneplussamsungsecuritytelco/ispxiaomi

Partner Content

Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
Why Genworth Australia embraced low-code software development
Promoted Content Why Genworth Australia embraced low-code software development
How to turn digital complexity into competitive advantage
Promoted Content How to turn digital complexity into competitive advantage
Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • Micro Focus Information Management & Governance (IM&G) Forum 2022
  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
By Juha Saarinen
Mar 24 2022
1:03PM
0 Comments

Related Articles

  • Apple's "Find My" feature created attack vector, researchers say
  • Apple Safari bug reveals users' internet activity and identities
  • NSO Group used fake GIFs to hack Apple iMessage
  • Smartphone payments for public transport can be abused to make unlimited purchases
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

Service NSW hits digital services goal two years early

Service NSW hits digital services goal two years early

NBN Co taking orders for 'non-premises' connections

NBN Co taking orders for 'non-premises' connections

NSW Police scores $100m to connect body-cams to firearms, tasers

NSW Police scores $100m to connect body-cams to firearms, tasers

Digital Nation

Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
The security threat of quantum computing
The security threat of quantum computing
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.