Hackers could crash 5G networks and steal your data — what you need to know

5G Network
(Image credit: Shutterstock)

New research into 5G network architecture has revealed some significant security vulnerabilities that could let attackers crash networks, steal data such as a user's location, and possibly even take over vital network functions.

The flaws are not in the 5G protocol itself, but in the way the 5g architecture distributes different functions to different network "slices" and how those slices interact with older 4G networks.

"We outlined several ways, within the slicing model, how information might potentially be exposed, how services could be misused and how Denial of Service attacks could be executed against network elements," states a new report from Dublin-based AdaptiveMobile Security.

The flaws leave 5G vulnerable to denial-of-service (DoS) attacks and data access misuse between the many network slices that run on any given 5G network, leaving customers’ sensitive information exposed to cybercrime.

One slice for you, another slice for me

To maximize efficient use of speed, timeliness and bandwidth, core 5G mobile networks can be divided into "slices", separate virtual network blocks with differing characteristics. 

Mobile operators can then effectively slice up their resources to provide separate pieces of their core 5G offering to different verticals. 

For example, a slice devoted to video streaming could prioritize bandwidth over timeliness or speed; a slice devoted to automotive functions could prioritize timeliness over bandwidth or speed; and a slice devoted to gaming could prioritize all three.

Yet while 5G slicing is safe in theory, all these different slices have got to talk to each other securely. This is complicated by the fact is that many of these slices will be using some 4G technologies during the transition period to 5G, which is expected to last several years.

Network slicing looks set to balloon over the next few years, driving the growth of 5G by enabling the formation of private wireless networks. There’s a lot at stake: 5G network slicing is predicted to generate revenue of anywhere up to $20bn by 2026, according to a study from ABI Research.

Slicing in the core network

(Image credit: AdaptiveMobile)

Unfortunately, where there's an opportunity, crooks usually aren't too far behind. AdaptiveMobile lifted the hood on the threat to 5G network slicing last month (Feb. 4), sharing its findings with the GSM Association (GSMA)

Despite the threat to 5G remaining low at the moment because of the scarcity of mobile operators with several live network slices on their own networks, AdaptiveMobile has warned that the problem could spiral into significant security risks and wreck mobile operators’ efforts to open up fresh streams of 5G revenue if left unchecked and able to grow alongside the inevitable surge in 5G over the next few years. 

The new research underscores 5G core networks that boast both dedicated and shared functions as being vulnerable. 

The analysis claims that such "hybrid" traits that support several network slices could spur a disconnect between the application and transport layers’ identities. The resulting mapping failure leaves opportunities for cyber attackers to launch DoS attacks and grab data.

A large-scale threat

AdaptiveMobile Security rigorously tested whether existing 5G standards' security measures can stop an attack in its official whitepaper, uncovering three attack vectors based on the flaws.  The answer is no, and the attack scenarios identified can't be prevented with current technology.

The attacks covered exploit the edge network function connected to the mobile operator's infrastructure: an attacker can exploit the mapping weaknesses to give themselves access to operators’ core networks, plus the network slices for different enterprises. To put it lightly, it's worryingly far-reaching.

Silke Holtmanns, AdaptiveMobile Security's head of 5G security research, laid bare the scale of the problem, explaining: “Currently, the impact on real-world applications of this network-slicing attack is only limited by the number of live slices in 5G networks globally".

But that threat will grow as the best 5G phones become cheaper. More affordability means greater adoption and, therefore, a larger set of attack avenues and slices. 

Holtmanns is cognizant of this, adding: "We are glad to be working with the mobile network operators and standards communities to highlight these vulnerabilities and promote best practice going forward.”

It's a rather somber tone for such innovative 5G technology, but it's a stark reminder that new technology brings new opportunities to the industry — and with it — new avenues for crooks to prize open your sensitive data and skim away the benefits of these innovative network features before they have a chance to truly bed in.  

More: Fleeceware apps bilking iOS and Android users out of millions — what to do

TOPICS
Luke Wilson

Luke is a Trainee News Writer at T3 and contributor to Tom's Guide, having graduated from the DMU/Channel 4 Journalism School with an MA in Investigative Journalism. Before switching careers, he worked for Mindshare WW. When not indoors messing around with gadgets, he's a disc golf enthusiast, keen jogger, and fond of all things outdoors.

Read more
Graphic of fibre optic cables attacking code
An estimated 46,000 VPN servers are vulnerable to being hijacked
Find My iPhone
Apple Find My hack turns any Bluetooth device into a secret AirTag — what we know
Google Pixel 9 held in the hand.
Google just fixed a zero-day kernel flaw used by hackers and 47 other vulnerabilities — update your Android phone right now
Malware
The top cyber threats to watch out for in 2025
A padlock resting next to the Apple logo on the lid of a gold-colored Apple laptop.
Mac and iPhone users beware — Apple processors can be exploited to steal sensitive information
DeepSeek logo on smartphone in front of merging US and Chinese flags
DeepSeek’s app contains serious privacy and security vulnerabilities that you should know about
Latest in Online Security
23andME box
23andMe has declared bankruptcy — here's how to delete your data now
A magnifying glass on top of the Steam logo in a web browser
Valve just pulled a malicious game demo spreading info-stealing malware from Steam
A man filing his taxes electronically on a laptop
AI-powered tax scams are here - how to stay safe from deepfakes, phishing and more this tax season
MacBook Pro 2023
New Mac attack is tricking users into thinking their computer is locked — how to stay safe
Hacker using a stolen social security card
Your Social Security number is a literal gold mine for scammers and identity thieves — here’s how to keep it safe
An open lock depicting a data breach
Half a million teachers hit in major data breach with SSNs, financial data and more exposed — what to do now
Latest in News
Bill Gates in 2019
Bill Gates just predicted the death of every job thanks to AI — except for these three
NYTimes Connections
NYT Connections today hints and answers — Wednesday, March 26 (#654)
Gemini screenshot image
Google unveils Gemini 2.5 — claims AI breakthrough with enhanced reasoning and multimodal power
Samsung Galaxy Z Flip 6 review.
Samsung Galaxy Z Flip 7 design just teased in new cases leak — and the outer display is huge
Google Chrome
Chrome failed to install on Windows PCs, but Google has issued a fix — here's what happened
nyc spring day AI image
OpenAI just unveiled enhanced image generator within ChatGPT-4o — here's what you can do now