Attacks against 3G mobile networks
There are a variety of attacks that may be launched against mobile networks, and they are two types i.e.
- Out of the mobile network: public net, private networks, other networks and,
- Inside mobile network : Smart phones, laptops, and pcs linked to the 3G network.
Attacks against 3G mobile networks are :
1. Malwares, viruses and worms –
Since many users still are shifting from 2G, 2.5G, and 3G to 3G, there is an increasing need to raise awareness about the risks that exist when using mobiles. Here’s a few instances of malwares that target mobile phones:
- Skull Trojan –
It is designed to infect Series 60 phones running the Symbian mobile operating system.
- Cabir worm –
It is the initial known worm in phones; It attacks mobiles which then scans remaining devices for its replica to starting mobile which detects using Bluetooth.
- Mosquito Trojan –
Mosquito Trojan is a corrupted variant of the Mosquitos mobile game targeting series 60 phones.
- Brador Trojan –
Infects the Windows Mobile operating system by making the svchost.exe file in the startup file of windows, which gives you full access to phones. Standard worm transmission vectors, including email attachments, are compatible with this executable.
- Lasco Worm –
It was initially published in 2005 and was designed to attack Symbian-based PDAs and cell phones. Lasco is built on Cabir’s code and uses a Bluetooth technology to duplicate.
2. DDoS (Distributed Denial-of-Service) :
The overall purpose of this assault is to ensure that the system inaccessible to the targeted users. A distributed denial-of-service (DDoS)attack is currently one of the main prevalent cyber-security risks to wired ISPs. It assaults are a type of DoS attack. A DDoS assault entails the deployment of a bot, and that is a collection of associated gadgets that are utilised to flood a targeted system using bogus traffic.
3. Overbilling attack :
An attacker hijacks an user’s IP address and then uses it to begin non-free transfers or just for own reasons. In any scenario, the transaction is charged to the real user. Whenever a lawful user’s IP address is restored to a IP pool, an hacker can intercept this and take ownership. After that, the hacker takes advantage of an user’s Cellular/mobile network services.
4. Spoofed policy development process (PDP) :
This will attack when there are flaws in GTP. Spoofing occurs when hacker pretends to be a legitimate system or client in case of theft information, install malicious, or get around security measures.
5. Signaling-level attacks :
VoIP services in IMS networks are provided using signaling by Session Initiation Protocol (SIP) . SIP-based VoIP systems have a number of security flaws.