Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

New Sni5Gect Attack Unveiled: A Devastating Blow to 5G Security



A new attack has been discovered that can downgrade 5G connections without relying on rogue base stations, compromising the security of mobile devices worldwide.

  • The Sni5Gect attack downgrades a 5G connection to a lower generation without relying on a rogue base station.
  • The attack relies on a new open-source software toolkit that sniffs unencrypted messages sent between the base station and user equipment (UE).
  • The framework can be used to carry out attacks such as crashing the UE modem, fingerprinting, or authentication bypass.
  • The attack mechanism involves passive sniffing of messages before authentication procedures are initiated.
  • The study achieved an 80% accuracy rate in uplink and downlink sniffing, with a success rate of 70-90% from a distance of up to 20 meters.



  • THN Exclusive: A team of academics has made a groundbreaking discovery that sheds light on a novel attack that can be used to downgrade a 5G connection to a lower generation without relying on a rogue base station. The attack, dubbed "Sni5Gect," relies on a new open-source software toolkit designed to sniff unencrypted messages sent between the base station and the user equipment (UE), such as a phone.

    According to the ASSET Research Group at the Singapore University of Technology and Design (SUTD), the Sni5Gect framework can be used to carry out attacks such as crashing the UE modem, downgrading to earlier generations of networks, fingerprinting, or authentication bypass. The researchers' findings have significant implications for 5G security, as it highlights the vulnerability of the network infrastructure to exploitation.

    The attack mechanism relies on a third-party in the communication chain, silently sniffs messages, and tracks the protocol state by decoding the sniffed messages during the UE attach procedure. The state information is then used to inject a targeted attack payload in downlink communication. This approach allows for passive sniffing of messages before authentication procedures are initiated, eliminating the need for knowledge of the UE's credentials.

    The researchers conducted tests against five smartphones, including OnePlus Nord CE 2, Samsung Galaxy S22, Google Pixel 7, and Huawei P40 Pro. The study achieved an 80% accuracy rate in uplink and downlink sniffing, with a success rate of 70-90% from a distance of up to 20 meters (65 feet). These findings indicate the feasibility of this attack, which has been assigned the identifier CVD-2024-0096 by the Global System for Mobile Communications Association (GSMA).

    The discovery of Sni5Gect serves as a stark reminder of the need for robust security measures in the 5G ecosystem. As the use of 5G networks expands globally, it is crucial to acknowledge and address these vulnerabilities proactively. The researchers' work provides valuable insights into the capabilities of this attack and underscores the importance of ongoing research into 5G security.

    In light of these findings, experts are urging mobile network operators and device manufacturers to implement immediate countermeasures to protect their users from this novel threat. As the use of 5G continues to grow, it is essential to prioritize the development of comprehensive security solutions that can prevent or mitigate such attacks in the future.

    The implications of Sni5Gect extend beyond the realm of 5G security, as they highlight the need for robust security measures in various aspects of our digital lives. As technology advances at an unprecedented pace, it is essential to remain vigilant and proactive in addressing emerging threats and vulnerabilities.

    In conclusion, the discovery of Sni5Gect serves as a wake-up call for the global community to take 5G security seriously. By acknowledging these vulnerabilities and working towards comprehensive solutions, we can ensure that future generations of mobile networks are secure, reliable, and protected from exploitation.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/New-Sni5Gect-Attack-Unveiled-A-Devastating-Blow-to-5G-Security-ehn.shtml

  • https://thehackernews.com/2025/08/new-sni5gect-attack-crashes-phones-and.html

  • https://cybersecuritynews.com/sni5gect-5g-attack/

  • https://isc.sans.edu/diary/32202

  • https://www.socinvestigation.com/comprehensive-list-of-apt-threat-groups-motives-and-attack-methods/

  • https://security.muni.cz/en/articles/hacker-elites-how-the-most-dangerous-apt-groups-operate


  • Published: Tue Aug 26 13:24:10 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us