Advancing UK Aerospace, Defence, Security & Space Solutions Worldwide
  • Home
  • /
  • Security
  • /
  • Securitygen highlights hidden threat to 5G networks from GTP-based cyber attacks

Security

Securitygen highlights hidden threat to 5G networks from GTP-based cyber attacks

Founded last year and based in London's Regent Street, Securitygen Ltd - a provider of security solutions and services for the telecom sector - has today highlighted the need for mobile operators to reassess security vulnerabilities in the key GTP (GPRS Tunnelling Protocol) protocol and bolster GTP security within their networks, as they continue to invest in and roll out 5G.

Image courtesy Securitygen

In its latest report - entitled 'GTP vulnerabilities: A cause for concern in 5G and LTE networks' - which is based on 150 telecom security assessments of 39 live mobile networks during 2022 and 2023, Securitygen has found that nearly 77% of networks had no cyber security measures in place against GTP-based attacks. Only 23% had a high level of cyber-security measures to keep successful GTP-based test attacks to a minimum.

Advertisement
ODU RT

Dmitry Kurbatov (above), co-founder and CTO of SecurityGen said: "Despite its widespread use, the GTP mobile network protocol is not entirely secure and opens up opportunities for attackers to intercept sensitive user data, engage in fraudulent activities, or disrupt network services.

 "As we explored and examined GTP's security vulnerabilities, it became apparent that the protocol requires in-depth consideration and robust mitigation strategies to block the potential threats – more so in the 5G set-up."

The study is based on the results of over 150 telecom security assessments by SecurityGen during the last 12 months involving 39 mobile operators in 24 countries across the SEA, LATAM, and MEA regions. It highlights the most critical GTP-related threats to raise awareness among mobile operators and stakeholders of the hidden vulnerabilities within the protocol.

The SecurityGen assessments found that all of the tested networks exhibited some vulnerabilities in their management of the GTP protocol:

  • In 71% of networks assessed, GTP-based test attacks on subscriber information disclosure were successful. Which can be used to impact subscribers, perform other attacks, target other interfaces, radio interfaces and OS and network vulnerabilities.
  • 62% of networks assessed were vulnerable to fraudulent activity involving the GTP protocol.
  • 85% of networks were susceptible to targeted attacks on subscribers aimed at impeding or completely interrupting the functionality of data transmission services.
  • 46% were vulnerable to network equipment denial-of-service attacks. Using this vulnerability, an attacker can simultaneously hinder network (Internet) connection for individual subscribers and many users via network equipment denial.

User traffic interception was successful in 69% of the networks tested. By exploiting this vulnerability, an attacker can direct all incoming traffic to their equipment by altering the nodes that process the user traffic.

Kurbatov said: "Throughout our assessments, we were surprised that not a single network was protected with a GTP firewall. Even when mobile operators claimed to have a GTP firewall deployed, we could carry out test attacks successfully, as there was no functional GTP firewall in place. This suggests that either the GTP firewall was not actively operational, or its filtering rules were not correctly configured or enabled.

"Some mobile operators employ IP address filtering from non-roaming partners to incoming traffic as a counter-measure – however, our simulated test attacks were still able to bypass this technique. The deployment of a fully functional GTP firewall could significantly improve these statistics and provide more robust protection against potential threats. Adopting advanced GTP firewall solutions undoubtedly enhances the overall security of mobile networks and protects them against multiple GTP attack vectors.

Advertisement
ADS S &P RT

"The interconnected nature of 3G, 4G and now 5G mobile networks across different generations amplifies the risks posed by GTP security vulnerabilities. Our research highlighted a worrying lack of robust security measures across a significant proportion of the mobile networks we examined. Despite ongoing efforts by the GSMA and individual mobile operators since 2017, we found that comprehensive cyber-security measures are still not in place for the most part.

"The increasingly vital role of mobile technology in nearly every aspect of how we live and work means that operators must regard effective cyber-security measures and policies that protect their networks and mobile users as a commercial and operational priority. This includes a comprehensive GTP protection strategy encompassing deployment of functional GTP firewalls, the application of GSMA-recommended protections, the integration of intrusion detection systems, and the regular monitoring of all network communication interfaces.

"The findings of this study should serve as a wake-up call that spurs operators and the wider telecoms industry to take action necessary to secure our interconnected digital future."

The SecurityGen White Paper, 'GTP vulnerabilities: A cause for concern in 5G and LTE networks', is available to download here: https://secgen.com/SecurityGen-whitepaper-gtp-firewall.pdf

 

 


 

Advertisement
Northrop Grumman Northrop Grumman
Home Secretary announces major policing reforms

Security Events

Home Secretary announces major policing reforms

21 November 2024

An ambitious programme of reform to policing has been unveiled by the UK's Home Secretary, marking the start of a new partnership between government and policing.

Recruitment bias preventing STEM professionals returning to work

Aerospace Defence Security Space

Recruitment bias preventing STEM professionals returning to work

21 November 2024

Bias in the recruitment system is still preventing talented STEM professionals on a career break from returning to employment, according to a new survey by STEM Returners.

Base Materials

Defence Security

Base Materials' Subtec 11500 first with DNV TAC

20 November 2024

Leicester based Base Materials has become the first syntactic foam subsea buoyancy manufacturer to receive DNV type approval (TAC) on its Subtec 11500 material and Approval of Manufacture (AoM) for the complete range of Subtec materials.

TEKEVER gets €70m funding boost

Defence Security

TEKEVER gets €70m funding boost

20 November 2024

Provider of AI-centric Unmanned Aerial Systems (UAS), TEKEVER, has raised €70 million in a funding round led by Baillie Gifford, the investment manager and early backer of Airbnb, Spotify and SpaceX and the NATO Innovation Fund (NIF), a standalone venture capital fund, backed by 24 NATO allies, that deploys €1 billion in deep tech to advance ...

Advertisement
ODU RT
Allen-Vanguard and Metis Aerospace to deliver advanced counter-drone capabilities

Defence Security

Allen-Vanguard and Metis Aerospace to deliver advanced counter-drone capabilities

18 November 2024

Allen-Vanguard, a provider of customised solutions for defeating Radio Frequency (RF) based terrorist and extremist threats, has entered a strategic collaboration with domain knowledge experts in passive RF detection, Metis Aerospace.

UK and allies warn of cyber attack vulnerabilities

Defence Security

UK and allies warn of cyber attack vulnerabilities

13 November 2024

The UK and international allies issued an alert yesterday, showing an increase in cyber attackers initially exploiting previously unknown vulnerabilities to compromise enterprise networks.

Advertisement
ADS S &P RT