Each new research conducted by experts from the best ethical hacking Institute and specialists from the International Institute of Cyber Security (IICS) shows new security flaws in communication standards such as LTE, used for high-speed data transmission.
On this occasion, the investigation has thrown 36 new vulnerabilities in LTE that, if exploited, would allow a wide range of variable severity attacks, such as disconnecting a user from the cellular network by listening to data, for example. Experts from the best ethical hacking Institute discovered multiple exploits using a specialized fuzzing tool (a software test technique that involves sending large amounts of random data to look for anomalous behavior).
The researchers added that the problem is rarely consistent. An operator can have different vulnerabilities on two network computers, while a network computer may have drawbacks to two different vendors.
According to the experts from the best ethical hacking institute, the findings of the investigation will be presented next May during a cybersecurity congress, in addition, the researchers put the tools that they used within the reach of the manufacturers of devices of LTE technology to perform better vulnerability analyses and develop the necessary fixes.
It should be noted that the vulnerabilities discovered by this team of researchers are not necessarily exploitable in the wild. However, researchers point out that this kind of research is necessary to remember that this kind of technology is not invulnerable to the actions of the threat actors.
Long Term Evolution (LTE) is a mobile communications standard developed by the 3rd Generation Partnership Project (3GPP), the association that developed and is responsible for the maintenance of GSM and UMTS technology.
LTE Technology was born thinking of covering mainly needs such as the high-speed data connection required by users and the lack of an uncomplicated standard and that helps to reduce costs for the companies manufacturers and telecommunications operators.
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.