New research indicates that there are serious security flaws present in 5G network technologies that could enable hackers to cause significant disruption or even steal an individual’s identity.
Worryingly, vulnerabilities have been discovered in both the existing non-standalone 5G networks and upcoming standalone networks.
A report from cybersecurity firm Positive Technologies explains that most mobile operators are currently offering 5G services running on non-standalone networks that are based on previous-generation 4G LTE infrastructure. However, with these networks at risk from vulnerabilities in the Diameter and GTP protocols, networks are gearing up to switch to standalone 5G network cores.
- Here's our list of the best VPN services right now
- And here's our roundup of the best identity theft protection services
- We've built a list of the best endpoint protection services out there
Unfortunately, as the Positive Technologies report sets out, the new networks remain at risk of attack. Vulnerabilities in the HTTP/2 and PFCP protocols used by standalone 5G networks could potentially allow attackers to steal subscriber profile data, impersonate individuals, and fake subscriber authentication.
“There is a risk that attackers will take advantage of standalone 5G networks while they are being established and operators are getting to grips with potential vulnerabilities,” Dmitry Kurbatov, CTO at Positive Technologies, commented.
“Therefore, security considerations must be addressed by operators from the offset. Subscriber attacks can be both financially and reputationally damaging - especially when vendors are in high competition to launch their 5G networks. With such a diverse surface of attack, robust core network security architecture is by far the safest way to protect users.”
Kurbatov also notes that as 5G standalone networks become more embedded within society, through the Internet of Things and other applications, the potential damage that could be caused by these vulnerabilities will only increase. Potentially, healthcare, transport, utilities, and many other essential areas of our lives could be disrupted.
- Check out our list of the best antivirus services around
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Barclay has been writing about technology for a decade, starting out as a freelancer with ITProPortal covering everything from London’s start-up scene to comparisons of the best cloud storage services. After that, he spent some time as the managing editor of an online outlet focusing on cloud computing, furthering his interest in virtualization, Big Data, and the Internet of Things.