Cyber security of 5G networks

The EU’s cyber security agency ENISA has published “ENISA threat landscape for 5G Networks” report that draws an initial threat landscape and presents an overview of the challenges in the security of 5G networks.

It presents 5G architecture, the identification of important assets, the assessment of threats affecting 5G, the identification of asset exposure and an initial assessment of threat agent motives.

You can download the document from this page:

https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-5g-networks

There is also a 5G Cybersecurity Hackathon starting in Oulu Finland

https://ultrahack.org/5gcyberhack

Here is my news article on both of those in Finnish
https://www.uusiteknologia.fi/2019/11/29/5g-verkkojen-tietoturvariskit-listattu-oulu-testaa-ongelmat/

9 Comments

  1. Tomi Engdahl says:

    “Economic Minister Peter Altmaier says risk of Huawei transmitting data to Chinese intelligence agencies is no greater than what ‘unreliable’ US has already done”

    German minister and US envoy clash over Huawei’s possible participation in Germany’s 5G network
    https://www.scmp.com/news/world/europe/article/3039320/german-minister-and-us-envoy-clash-over-huaweis-possible

    Reply
  2. Tomi Engdahl says:

    5G hackers: These eight groups will try to break into the networks of tomorrow
    https://www.zdnet.com/article/5g-hackers-these-six-groups-will-try-to-break-into-the-networks-of-tomorrow/

    Organised cybercrime, rogue insiders and nation-state-backed hackers are among the groups that could soon be targeting 5G networks. But there are a few surprises on the list, too.

    Reply
  3. Tomi Engdahl says:

    EU gets a bit STRESSED out about 5G: With great economic benefits come
    great security risks
    https://www.theregister.co.uk/2019/12/04/council_of_eu_5g_risks/
    The Council of the European Union has warned member states that the
    introduction of 5G networks poses increased security risks while also
    bringing economic and infrastructure benefits.

    Reply
  4. Tomi Engdahl says:

    How we turned 5G into 5k
    https://medium.com/sensorfu/how-we-turned-5g-into-5k-a8636b549248
    Hacking is a good way to learn and hackathons are a great place to
    learn with other like-minded people. And that was exactly what we had
    in mind when we invited our friends and signed in as a team to the
    first 5G hackathon in the world. We had no preparation or idea what we
    were going to do. After we conquered a table for ourselves to set up
    our base in we quickly found us split between two different
    challenges. Myself and Jukka (with initial help from Jani) took on to
    investigate the cylindrical device Nokia has brought into event.
    Meanwhile Mikko, Ossi and Jani challenged themselves with University
    of Oulu’s 5G hospital

    Reply
  5. Tomi Engdahl says:

    5G Security
    https://www.schneier.com/blog/archives/2020/01/china_isnt_the_.html
    The security risks inherent in Chinese-made 5G networking equipment
    are easy to understand. Because the companies that make the equipment
    are subservient to the Chinese government, they could be forced to
    include backdoors in the hardware or software to give Beijing remote
    access. Eavesdropping is also a risk, although efforts to listen in
    would almost certainly be detectable. More insidious is the

    Reply
  6. Tomi Engdahl says:

    “Chinese, Iranians, North Koreans, and Russians have been breaking into U.S. networks for years without having any control over the hardware, the software, or the companies that produce the devices. (And the U.S. National Security Agency, or NSA, has been breaking into foreign networks for years without having to coerce companies into deliberately adding backdoors.) Nothing in 5G prevents these activities from continuing, even increasing, in the future.”

    5G Security
    https://www.schneier.com/blog/archives/2020/01/china_isnt_the_.html

    Reply
  7. Tomi Engdahl says:

    From SIMjacking to Bad Decisions
    5G Security Threats to Non-Public Networks
    https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/from-esim-jacking-to-fake-news-threats-to-5g-and-security-recommendations?utm_source=trendmicroresearch&utm_medium=smk&utm_campaign=1119_5g

    Our latest research explored threats to 5G connectivity — from SIMjacking, identity fraud, fake news, and poisoning machine learning rules to manipulating business decisions — and found that they can be addressed through an identity-based approach to security.

    Risks and Threats to 5G Non-Public Networks (NPN)
    Our latest research explored threats to 5G connectivity — from SIMjacking, IoT identity fraud, false decision engine data and logs, and poisoning machine learning rules for the manipulation of business decisions. We also looked at how these risks and threats can be mitigated and addressed through an identity-based approach to security.

    Reply
  8. Tomi Engdahl says:

    Tässä oli aika hyvin tosta 5G:n turvallisuudesta, Mikko Hyppönen esim varoitti aiemmin IoT-laitteiden turvallisuudesta. ”The same [happened](https://www.wired.com/story/5g-more-secure-4g-except-when-not/) with 4G; operators even ignored security features defined as mandatory in the standard because implementing them was expensive. But even worse, for 5G, development, performance, cost, and time to market were all prioritized over security, which was treated as an afterthought.” https://foreignpolicy.com/2020/01/10/5g-china-backdoor-security-problems-united-states-surveillance/

    Reply
  9. Tomi Engdahl says:

    China Isn’t the Only Problem With 5G
    https://foreignpolicy.com/2020/01/10/5g-china-backdoor-security-problems-united-states-surveillance/?fbclid=IwAR1Hxr9o6fW4ExxzWAcZYRnpL7wcMQvPcLmJqUawT6EUtVHGBwdfXe_zoIA

    The network has plenty of other security weaknesses, including ones the United States doesn’t want to fix since they help its own surveillance efforts.

    Reply

Leave a Comment

Your email address will not be published. Required fields are marked *

*

*