{"id":63,"date":"2021-09-27T17:06:51","date_gmt":"2021-09-27T21:06:51","guid":{"rendered":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/?p=63"},"modified":"2021-10-19T13:48:39","modified_gmt":"2021-10-19T17:48:39","slug":"new-techniques-taking-advantage-of-mac-layer-to-enable-long-range-communication-using-other-peoples-networks","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/2021\/09\/27\/new-techniques-taking-advantage-of-mac-layer-to-enable-long-range-communication-using-other-peoples-networks\/","title":{"rendered":"New techniques taking advantage of MAC layer to enable long-range communication using other people&#8217;s networks."},"content":{"rendered":"<p>Article: <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/our-eye-is-on-the-sparrow?_mc=NL_DR_EDT_DR_daily_20210927&amp;cid=NL_DR_EDT_DR_daily_20210927&amp;elq_mid=106505&amp;elq_cid=34768184\">Our Eye Is on the SPARROW<\/a><br \/>\nAuthor: Reza Soosahabi<br \/>\nPublished: September 24, 2021<br \/>\nSite: DARKReading.com<\/p>\n<p>This weeks news: there&#8217;s a new way to enable long range communication leveraging other people&#8217;s networks by taking advantage of a vulnerability found in MAC layer protocols in 5G and LTE.<br \/>\nUsing the cell coverage network, anonymous messages can be sent via short distances that link to enable longer trail of the communication. The vulnerability allows the establishment of these link prior to authenticating the user therefor allowing for anonymity. Specifically the MAC  layer (L2) of &#8220;wireless access infrastructure&#8221; is impacted rather than the physical disruption of the L1 layer of using the other layers of the infrastructure stack (L3-L7). <\/p>\n<p>It&#8217;s important to note that &#8220;Since commercial wireless signals are available virtually everywhere, exploiting them for data exfiltration can circumvent all existing preventive measures.&#8221; Rendering this a rather critical vulnerability. <\/p>\n<p>3 reasons for major concern:<br \/>\n&#8211; Max Anonymity<br \/>\n&#8211; More distance coverage<br \/>\n&#8211; Low power and low complexity<\/p>\n<p>Exploits<br \/>\n&#8211; data exfiltration &#8211; can serve as a vehicle to known data exfiltration techniques<br \/>\n&#8211; command and control &#8211; remote control of IoT to trigger events<br \/>\n&#8211; clandestine ops &#8211; attackers can communicate without detection<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Article: Our Eye Is on the SPARROW Author: Reza Soosahabi Published: September 24, 2021 Site: DARKReading.com This weeks news: there&#8217;s a new way to enable long range communication leveraging other people&#8217;s networks by taking advantage of a vulnerability found in MAC layer protocols in 5G and LTE. Using the cell coverage network, anonymous messages can [&hellip;]<\/p>\n","protected":false},"author":15777,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[79],"tags":[79],"class_list":{"0":"post-63","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-5","7":"tag-week-5","8":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/posts\/63","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/users\/15777"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/comments?post=63"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/posts\/63\/revisions"}],"predecessor-version":[{"id":65,"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/posts\/63\/revisions\/65"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/media?parent=63"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/categories?post=63"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/tags?post=63"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}