Close Menu
GeekBlog

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Massive Recall Doesn’t Affect 15% Leap in Company Share Price

    August 31, 2025

    Today’s NYT Connections: Sports Edition Hints, Answers for Aug. 31 #342

    August 31, 2025

    You can save up to $700 on my favorite Bluetti power stations for Labor Day

    August 31, 2025
    Facebook X (Twitter) Instagram Threads
    GeekBlog
    • Home
    • Mobile
    • Reviews
    • Tech News
    • Deals & Offers
    • Gadgets
      • How-To Guides
    • Laptops & PCs
      • AI & Software
    • Blog
    Facebook X (Twitter) Instagram
    GeekBlog
    Home»Tech News»Hackers can now crash phones and downgrade 5G to 4G networks with a toolkit exploiting unencrypted pre-authentication messages
    Tech News

    Hackers can now crash phones and downgrade 5G to 4G networks with a toolkit exploiting unencrypted pre-authentication messages

    Michael ComaousBy Michael ComaousAugust 30, 2025No Comments3 Mins Read0 Views
    Share Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    A representational concept of a social media network
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link

    • 5G phones can be silently downgraded to insecure 4G, leaving the device exposed
    • The exploit works without setting up expensive and complex fake towers
    • Tested smartphones include flagship models from Samsung, Google, Huawei, and OnePlus

    In late 2023, researchers uncovered a set of flaws in 5G modem firmware from major chipmakers, including MediaTek and Qualcomm, collectively named 5Ghoul.

    A group of academics at the Singapore University of Technology and Design (SUTD) has now shown how 5G phones can be tricked into falling back to 4G networks through a method that avoids the need for a fake base station.

    Instead, it targets a vulnerable stage of communication between phone and tower, where critical messages remain unencrypted.


    You may like

    The SNI5GECT toolkit, short for “Sniffing 5G Inject,” makes use of the tiny time window at the start of a connection attempt.

    It targets the pre-authentication phase, when the data passing between the tower and the phone remains unencrypted.

    Because of this gap, attackers can intercept and inject messages without needing to know the phone’s private credentials.

    During this stage, the system can capture identifiers sent from the tower and use them to read and modify messages.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    With such access, the attacker can force a modem crash, map a device fingerprint, or trigger a switch from 5G to 4G.

    Since 4G carries long-known flaws, the forced downgrade leaves the target open to older tracking or location attacks.

    The tests revealed a success rate between 70% and 90% when attempted from around twenty meters away, suggesting the method works in realistic conditions.

    The academics tested the framework on several smartphones, including popular models from Samsung, Google, Huawei, and OnePlus.

    In these cases, the researchers were able to intercept both uplink and downlink traffic with notable accuracy.

    Importantly, the method avoids the complexity of setting up a rogue base station, something that has long limited practical attacks on mobile networks.

    The Global System for Mobile Communications Association (GSMA) has since confirmed the issue and assigned it the identifier CVD-2024-0096, marking it as a downgrade risk.

    The claim from the team is that their toolkit is not meant for criminal use but for further research into wireless security.

    They argue it could help with the development of packet-level detection and new forms of 5G protection.

    Still, the ability to crash devices or silently downgrade them raises questions about the resilience of current networks.

    While no clear reports exist of real-world abuse so far, the method is public and the software is open source, so the risk remains that skilled actors could adapt it.

    Unfortunately, users have few direct options to block such low-level exploits, though broader digital hygiene may help limit downstream risks.

    However, running updated antivirus software, securing credentials with a password manager, and enabling an authenticator app for accounts can reduce the impact of secondary attacks that might follow from a network downgrade.

    Via The Hacker News

    You might also like

    Crash downgrade exploiting Hackers messages networks phones preauthentication toolkit unencrypted
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email Copy Link
    Previous ArticleThe 59 Best Deals From REI’s 2025 Labor Day Sale
    Next Article My favorite affordable phone cases are BOGO free (including for the new Google Pixel 10 series)
    Michael Comaous
    • Website

    Related Posts

    3 Mins Read

    Massive Recall Doesn’t Affect 15% Leap in Company Share Price

    2 Mins Read

    Today’s NYT Connections: Sports Edition Hints, Answers for Aug. 31 #342

    4 Mins Read

    You can save up to $700 on my favorite Bluetti power stations for Labor Day

    2 Mins Read

    The floppy disk returns as a design concept for SD cards, bridging eras of storage from megabytes to terabytes

    2 Mins Read

    How to Back Up Your Android Phone (2025)

    2 Mins Read

    With new in-house models, Microsoft lays the groundwork for independence from OpenAI

    Top Posts

    8BitDo Pro 3 review: better specs, more customization, minor faults

    August 8, 202512 Views

    WIRED Roundup: ChatGPT Goes Full Demon Mode

    August 2, 202512 Views

    Framework Desktop Review: A Delightful Surprise

    August 7, 202511 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    8BitDo Pro 3 review: better specs, more customization, minor faults

    August 8, 202512 Views

    WIRED Roundup: ChatGPT Goes Full Demon Mode

    August 2, 202512 Views

    Framework Desktop Review: A Delightful Surprise

    August 7, 202511 Views
    Our Picks

    Massive Recall Doesn’t Affect 15% Leap in Company Share Price

    August 31, 2025

    Today’s NYT Connections: Sports Edition Hints, Answers for Aug. 31 #342

    August 31, 2025

    You can save up to $700 on my favorite Bluetti power stations for Labor Day

    August 31, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest Threads
    • About Us
    • Contact us
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    © 2025 geekblog. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.