5G Networks Susceptible to Cyberattacks, Warn Papers at DGP Meet



Warning in opposition to the vulnerabilities of the high-speed 5G telecom community, papers submitted at a key safety meet have famous that it may possibly present a superb platform for middlemen and brokers for creating linkages for crimes comparable to drug trafficking, human and organ trafficking, cash laundering and terror financing. The papers, written by some Indian Police Service officers, had been submitted on the just-concluded convention of director generals of police (DGPs) and inspector normal of police (IGPs), attended by Prime Minister Narendra Modi.

The papers famous that the 5G community is constructed on simply accessible and open Web protocols and it inherits all of the vulnerabilities of earlier generations which make it susceptible to cyber-attacks and compromise the safety of your entire system.

The IPS officers who wrote the papers steered {that a} reserved 5G bandwidth and extremely secured gear must be developed proactively for delicate government-related communications and for army utilization and solely authorised and authenticated corporations with the least cyber danger or with most security protocols must be allowed to work in for the federal government companies.

“With cryptocurrencies and decentralised banking systems gaining further popularity using the real-time 5G networks, the linkages and financial trail will be difficult to trace.

“The 5G can present a superb platform for the middlemen and brokers for creating linkages for crimes like drug trafficking, human and organ trafficking, cash laundering, terror financing, and many others.,” the papers said.

Apart from the prime minister, the three-day annual conference was attended by Union Home Minister Amit Shah, National Security Adviser Ajit Doval and about 350 top police officers of the country last weekend.

The 5G network core is built on easily accessible and open Internet protocols such as HTTP and Transport Layer Security (TLS). In a Network-Slicing environment, different sub-networks will have different natures of cyber security.

Keys for radio interface encryption are delivered across unsecured routes. Vulnerabilities such as IDOR (Insecure Direct Object Reference) could arise.

“The Telco cloud is susceptible to cyber-attacks, which might compromise the safety of the community and the information saved within the cloud,” the papers said.

Due to network function virtualisation (NFV), criminals can employ or execute attacks to access and even alter telephone numbers (target lists) to be monitored.

There are several improvements in 5G that support such remote control functions like drones, robotic surgery, etc. but criminals can exploit this aspect too.

Another issue in 5G is the operations of edge computing where processing is done at decentralised inter-communicating nodes close to the user network.

This furthers the problem of data collection for security establishments as there is no central node through which data passes.

The papers said the 5G can support millions of Artificial Intelligence (AI) based Internet of Things (IoTs) and devices per square km thus resulting in a massive increase in attack surface for cybercriminals.

Cyber crimes like mobile network mapping, distributed denial of service, draining battery, service degradation, mobile IMSI capture, malware injection, CnC creation, intercepting communication, DNS spoofing, uplink, and downlink impersonations, etc. may be easier to carry out, the papers said.

“In the course of the preliminary transition section, future 5G networks will inherit all of the vulnerabilities of earlier generations.” There is a chance that end-to-end encryption (E2ER) will be included in the standard during the upcoming standardisation process, which is a challenge for law enforcement agencies.

The IPS officers wrote that the 5G equipment manufacturers will try to sell the valuable data to the marketers for targeted advertising and this should be monitored to make sure it doesn’t fall into the wrong hands.

Holistic cyber security is the only solution to this new 5G-created ecosystem. Starting from core devices to network layers IoTs and users’ mobile or appliances, everything should be seen as a potential attack point.

Suggesting safeguards, the IPS officers noted that consumer education on IoT security is necessary and equipment should be purchased from trusted sources and not from suspicious sources like China.

“The cellular operators have to undertake a hybrid cloud-based strategy the place delicate knowledge is saved domestically and fewer delicate knowledge saved within the cloud. There’s a want for community operators to be alert to the necessity for resilience of their infrastructure to energy outages, pure disasters, misconfiguration and many others.,” the papers said.


Affiliate hyperlinks could also be mechanically generated – see our ethics assertion for particulars.

Leave a Reply

Available for Amazon Prime