Search papers, labs, and topics across Lattice.
This paper investigates the potential for undetectable command and control (C2) channels within compromised 5G core network components. It demonstrates how these hidden channels can be chained together to orchestrate attacks against subscriber security and privacy. The research highlights the lack of effective countermeasures against such attacks, raising significant security concerns for 5G infrastructure.
Compromised 5G networks can be weaponized with chained, undetectable command and control channels, enabling attacks that bypass existing security measures.
Mobile networks are essential for modern societies. The most recent generation of mobile networks will be even more ubiquitous than previous ones. Therefore, the security of these networks as part of the critical infrastructure with essential communication services is of the uttermost importance. However, these systems are still vulnerable to being compromised, as showcased in the recent discussion on supply chain security and other challenges. This work addresses problems arising from compromised 5G core network components. The investigations reveal how attacks based on command and control communication can be designed so that they cannot be detected or prevented. This way, various attacks against the security and privacy of subscribers can be performed for which no effective countermeasures are available.