VoLTE phone security may not be as tough as we all thought

Man Calling while looking at Email
(Image credit: David Hahn / Unsplash)

The security of Voice over LTE (VoLTE) phone calls may not be as tough as previously thought, after researchers devised a way to grab call metadata and even caller identities in some cases. 

A team of researchers, comprising scientists from the Beijing University of Posts and Telecommunications (Zishuai Cheng and Baojiang Cui), and scientists from the University of Birmingham (Mihai Ordean, Flavio Garcia, and Dominik Rys) came up with a way to access VoLTE activity logs such as call times, call durations, and call directions (who is calling whom). 

They published their findings in a whitepaper called "Watching your call: Breaking VoLTE Privacy in LTE/5G Networks," in which they also showed how they used this data to identify people’s phone numbers. 

Grabbing the data

VoLTE call systems have three systems working to anonymize people on the network - TMSI (Temporary Mobile Subscriber Identity), GUTI (Globally Unique Temporary Identity), and SUCI (Subscription Concealed Identifier). 

However, with some network parameters being static, these systems are arguably inadequate. Cyberattackers would still be able to come to some conclusions about the interaction between the participants. 

Furthermore, by building a mobile-relay adversarial node, the researchers were able to capture a lot of network traffic per carrier.

"Targeting VoLTE traffic specifically, for any reason, including recording, should not be possible when using EEA2 encryption algorithms which rely on non-deterministic encryption schemes such as AES-CTR," the report states. 

"This however is not the case. By looking at the non-encrypted MAC sub-header at our mobile relay, the attacker can learn the Logical Channel ID (LCID) of the sub-PDU (Protocol Data Unit). Because VoLTE traffic uses specific LCID 4 and LCID 5 it can be directly targeted by the adversary."

After obtaining a person’s anonymized identity (SUCI and GUTI), the attackers would simply need to make a VoLTE call to the victim to tie it to their real-life identity. 

Both attacks allegedly worked quite well, with the researchers saying they mapped VoLTE operations 83% of the time.

Via: The Register

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
A smartphone on a sofa showing the WhatsApp, Telegram and Signal apps
RCS encryption is still months away following major US telecomms breach
Kaspersky Report on Stalkerware
Security flaw in popular stalkerware apps is exposing phone data of millions
Data leak
This top security camera streaming app may have been putting thousands of users at risk
The flag of the United States fluttering in the wind against a blue sky background.
Are US cellphones at risk? A new bill is coming to stop another Salt Typhoon attack
Photograph of a hand holding a smartphone with two googly eyes
Every tap, every message – how to stop your smartphone spying on you
A woman holding a mobile phone in front of the Signal logo displayed on a computer screen
Salt Typhoon: US cybersecurity watchdog urges switch to Signal-like messaging apps
Latest in Security
Webex by Cisco banner on a Chromebook
Cisco warns some Webex users of worrying security flaw, so patch now
Red padlock open on electric circuits network dark red background
AI-powered cyber threats are becoming the biggest worry for businesses everywhere
Woman using iMessage on iPhone
Apple to take legal action against British Government over backdoor request
Red padlock open on electric circuits network dark red background
Aviaton firms hit by devious new polyglot malware
A laptop with a red screen with a white skull on it with the message: "RANSOMWARE. All your files are encrypted."
Major ransomware attack sees Tata Technologies hit - 1.4TB dataset with over 730,000 files allegedly stolen
Image of laptop infected with malware
Ransomware criminals are now sending their demands...by snail mail?
Latest in News
A hand holding a phone showing the Android Find My Device network
Android 's Find My Device can now let you track your friends – and I can't decide if that's cool or creepy
Insta360 X4 360 degree camera without lens protector
Leaked DJI Osmo 360 image suggests GoPro and Insta360 should be worried – here's why
A YouTube Premium promo on a laptop screen
A cheaper YouTube Premium Lite plan just rolled out in the US – but you’ll miss out on these 4 features
Viaim RecDot AI true wireless earbuds
These AI-powered earbuds can also act as a dictaphone with transcription when left in their case
The socket interface of the Intel Core Ultra processor
Intel unveils its most powerful AI PCs yet - new Intel Core Ultra Series 2 processors pack in vPro for lightweight laptops and high-performance workstations alike
An Nvidia GeForce RTX 5070
Nvidia confirms that an RTX 5070 Founders Edition is coming... just not on launch day