CyberNews Briefs

ReVoLTE Attack Allows Hackers to Listen in on Mobile Calls

An attack on the Voice over LTE (VoLTE) mobile communications protocol consisted of threat actors breaking encryption codes and listening in on phone calls. The rare attack on cellular protocol leverages an encryption implementation bug at base stations. The attack has been named ReVoLTE by the researchers investigating it. The cyberattack consists of attackers exploiting an implementation flaw in LTE cellular protocol.

The attackers then used keystream reuse to recover the contents of encrypted VoLTE calls. Researchers claim that the keystream reuse allows the threat actors to decrypt phone calls without sophisticated technology or resources. Attacks of this nature are not frequent due to legwork involved.

Read More: ReVoLTE Attack Allows Hackers to Listen in on Mobile Calls

OODA Analyst

OODA Analyst

OODA is comprised of a unique team of international experts capable of providing advanced intelligence and analysis, strategy and planning support, risk and threat management, training, decision support, crisis response, and security services to global corporations and governments.