Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Uncategorized

Security Flaw Found in 2G Mobile Data Encryption Standard

Cybersecurity researchers in Europe say they have discovered a flaw in an encryption algorithm used by cellphones that may have allowed attackers to eavesdrop on some data traffic for more than two decades.

In a paper published Wednesday, researchers from Germany, France and Norway said the flaw affects the GPRS – or 2G – mobile data standard.

Cybersecurity researchers in Europe say they have discovered a flaw in an encryption algorithm used by cellphones that may have allowed attackers to eavesdrop on some data traffic for more than two decades.

In a paper published Wednesday, researchers from Germany, France and Norway said the flaw affects the GPRS – or 2G – mobile data standard.

While most phones now use 4G or even 5G standards, GPRS remains a fallback for data connections in some countries.

The vulnerability in the GEA-1 algorithm is unlikely to have been an accident, the researchers said. Instead, it was probably created intentionally to provide law enforcement agencies with a “backdoor” and comply with laws restricting the export of strong encryption tools.

“According to our experimental analysis, having six correct numbers in the German lottery twice in a row is about as likely as having these properties of the key occur by chance,” Christof Beierle of the Ruhr University Bochum in Germany, a co-author of the paper, said.

The GEA-1 algorithm was meant to be phased out from cellphones as early as 2013, but the researchers said they found it in current Android and iOS smartphones.

Cellphone manufacturers and standards organizations have been notified to fix the flaw, they said.

Advertisement. Scroll to continue reading.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Management & Strategy

Anna Tutt, CMO of Oort, shares her experiences and perspectives on how we can accelerate growth of women in cybersecurity.

Cyberwarfare

The UK’s NCSC has issued a security advisory to warn about spearphishing campaigns conducted by two unrelated Russian and Iranian hacker groups.

Ransomware

A new CISA pilot program to warn critical infrastructure organizations if their systems are unpatched against vulnerabilities exploited in ransomware attacks.

Cybersecurity Funding

B2B payment security provider NsKnox raised $17 million in a new funding round that brings the total raised by the company to $35.6 million.

Uncategorized

Privacy experts have said they fear pregnancies could be surveilled and the data shared with police or sold to vigilantes.

Uncategorized

Google has suspended the Chinese shopping app Pinduoduo on its app store after malware was discovered in versions of the app from other sources.

Uncategorized

Five Eyes agencies have issued joint cybersecurity guidance and best practices for smart cities.

Uncategorized

An Italy-based firm's hacking tools were used to spy on Apple and Android smartphones in Italy and Kazakhstan, Google said Thursday, casting a light...