2GAndroidcybersecurityDataGoogleNewssecuritytechnologytelecom

Google Advises Android Users To Switch Off Insecure 2G Connections And This Is Why

Tech giant Google just rolled out a new warning against 2G connections for Android users and why switching them off is the best way to remain safe in dangerous situations.

For those who might not be aware, the company has used the term SMS Blasters for a group of Stingrays, False Base Stations, and cell-site simulators which nefarious parties use to entice mobile phones into establishing connections. This gives rise to fake text messages.

One way to combat the ordeal has to do with turning them off or pressing on the option that disables them. Such insecure 2G connections on the device are really worrisome, security experts add.

The latest news comes from the FASG which rolled out a new briefing paper for members to gather the right kind of awareness relating to SMS blaster fraud and also guidelines for carriers and mitigation recommendations to any stakeholders involved.s

The latest paper that’s accessible to GSMA members refers to certain specific recommendations belonging to Android, alongside a host of features which could offer greater protection with such malicious attempts.

As per Google, the false messages are only available to 2G users and would give rise to more incidents of fraud. Today, there are greater reports of global incidents taking place in recent times.

Attackers may simply fake that figure that make it seem like it belongs to a well-reputed business when in reality, that’s not the case. Meanwhile, some reports spoke about how it’s used to supply malware such as scenarios where phishing texts are injected with certain URLs for downloading payloads.

SMS Blasters end up exposing any false 5G networks that roll out single functionalities. This entails downgrades in connection to 2G protocols. Similar devices also highlight any false 2G connections that are known to entice nearby devices to connect to them.

There are points where attackers are seen abusing the well-reputed missing mutual authentication found in 2G connections and forcing links to become unencrypted. Hence, what you end up with is a whole PitM position for injecting SMS payloads.

Interestingly such SMS Blasters are portable and sold on the web. They don’t need a lot of tech experience to use. When compared to incidents linked to SMS phishing seen today, such systems for direct delivery bypass networks and anti-fraud or anti-spam filters. In the end, you’re left with the reassurance that all texts will reach victims.

Google has been seen rolling out the option to disable 2G connectivity since the Android 12 device. Pixel phones were first adopted in this regard, followed by Google rolling out another feature for ‘Allow 2G’ switched off with emergency calls still being allowed.

When used in the right manner, it protects against the mighty risk that SMS Blasters bring forward.

Android also has options to deactivate all null ciphers as another protective mechanism as it’s necessary for 2G to configure the null cipher in terms of injecting SMS payloads. This was rolled out with Android 14 and therefore forces devices to include radio HAL 2.0 and beyond.

Read next: Google Launches New ‘School Time’ Parental Control Features For Android

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Back to top button

Adblock Detected

Block the adblockers from browsing the site, till they turn off the Ad Blocker.