


{"id":122,"date":"2021-07-08T10:17:55","date_gmt":"2021-07-08T10:17:55","guid":{"rendered":"http:\/\/ec2-3-238-44-160.compute-1.amazonaws.com\/?p=122"},"modified":"2021-08-20T11:57:18","modified_gmt":"2021-08-20T11:57:18","slug":"new-attack-allows-hackers-to-spy-on-your-phone","status":"publish","type":"post","link":"https:\/\/hellovpn.app\/blog\/new-attack-allows-hackers-to-spy-on-your-phone\/","title":{"rendered":"New Attack allows hackers to spy on your phone"},"content":{"rendered":"\n<p class=\"has-text-align-left\">&nbsp;A team of researchers (David Rupprecht, Katharina Kohls, Thorsten Holz, and Christina P\u00f6pper) presented a new attack, which is called \u2018ReVoLTE\u2019. The attack might allow remote hackers to break the encrypted connection between targeted phone calls.<br><br><strong><a href=\"https:\/\/hellovpn.onelink.me\/ba95\/73b872f5\" target=\"_blank\" rel=\"noreferrer noopener\">Get the best overall VPN 2021<\/a><\/strong><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/hellovpn.onelink.me\/ba95\/73b872f5\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/ec2-3-238-44-160.compute-1.amazonaws.com\/wp-content\/uploads\/2021\/07\/andreas-dress-qHv9W48aZ8g-unsplash-684x1024.jpeg\" alt=\"\" class=\"wp-image-124\" width=\"338\" height=\"506\" srcset=\"https:\/\/hellovpn.app\/blog\/wp-content\/uploads\/2021\/07\/andreas-dress-qHv9W48aZ8g-unsplash-684x1024.jpeg 684w, https:\/\/hellovpn.app\/blog\/wp-content\/uploads\/2021\/07\/andreas-dress-qHv9W48aZ8g-unsplash-200x300.jpeg 200w, https:\/\/hellovpn.app\/blog\/wp-content\/uploads\/2021\/07\/andreas-dress-qHv9W48aZ8g-unsplash-768x1149.jpeg 768w, https:\/\/hellovpn.app\/blog\/wp-content\/uploads\/2021\/07\/andreas-dress-qHv9W48aZ8g-unsplash-1026x1536.jpeg 1026w, https:\/\/hellovpn.app\/blog\/wp-content\/uploads\/2021\/07\/andreas-dress-qHv9W48aZ8g-unsplash.jpeg 1069w\" sizes=\"auto, (max-width: 338px) 100vw, 338px\" \/><\/a><\/figure><\/div>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"1\">INDEX<br><br>1-<meta charset=\"utf-8\"><strong><a href=\"#1\">What is VoLTE?<\/a><\/strong><br>2-<meta charset=\"utf-8\"><strong><a href=\"#2\">The ReVoLTE attack<\/a><\/strong><br>3-<meta charset=\"utf-8\"><strong><a href=\"#3\">The scenario of the ReVoLTE attack\u00a0<\/a><\/strong><br>4-<meta charset=\"utf-8\"><strong><a href=\"#4\">How to make safe calls over the Internet?<\/a><\/strong><br><br><strong>What is VoLTE?<\/strong><\/h4>\n\n\n\n<p><strong>VoLTE<\/strong> stands for Voice over Long Term Evolution, which is standard wireless high-speed communication. Its main purpose is to provide high-quality voice communication to <strong><a href=\"https:\/\/en.wikipedia.org\/wiki\/LTE_(telecommunication)\">LTE networks<\/a><\/strong>. All big telecommunication companies use <strong>VoLTE<\/strong> to secure the phone calls. What VoLTE is responsible for is encrypting the voice data between the phone and the network with a stream cipher. The stream cipher generates a unique keystream in return and prevents the <a href=\"https:\/\/revolte-attack.net\/\">keystream reuse<\/a>.<br><br> <a href=\"https:\/\/hellovpn.onelink.me\/ba95\/73b872f5\">Get one of the world&#8217;s best value VPNs<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"2\"><strong>The ReVoLTE attack<\/strong><\/h4>\n\n\n\n<p>The problem arises when mobile operators use the same keystream for two phone calls within the same radio connection. Basically, the reuse of the same keystream by base stations allows hackers to perform <strong>ReVoLTE <\/strong>attack and to decrypt the content of <strong>VoLTE calls<\/strong>.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"3\"><strong>The scenario of the ReVoLTE attack&nbsp;<\/strong><\/h4>\n\n\n\n<p>To perform the attack successfully, the hacker must be fully prepared. He needs to be connected to the same base station as the victim, place a <a href=\"https:\/\/thehackernews.com\/2020\/08\/a-team-of-academic-researcherswho.html\">downlink sniffer<\/a> to the monitor and record the call made by the victim.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The second part of the attack starts when the victim hangs up. The hacker calls the victim back immediately and initiates the calls with a duration equal to the \u2018<strong>targeted call<\/strong>\u2019. The duration is important due to the full \u2018targeted call\u2019 content recovery, otherwise, only separate parts of the conversation will be recovered. Why does the hacker call the victim back immediately?- So he would be connected to the same radio station as the \u2018targeted call\u2019.<br><br><a href=\"https:\/\/hellovpn.onelink.me\/ba95\/73b872f5\">Get The Best VPN Deals This Week<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/hellovpn.onelink.me\/ba95\/73b872f5\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"449\" src=\"http:\/\/ec2-3-238-44-160.compute-1.amazonaws.com\/wp-content\/uploads\/2021\/07\/ReVoLTE-1024x449.png\" alt=\"\" class=\"wp-image-123\" srcset=\"https:\/\/hellovpn.app\/blog\/wp-content\/uploads\/2021\/07\/ReVoLTE-1024x449.png 1024w, https:\/\/hellovpn.app\/blog\/wp-content\/uploads\/2021\/07\/ReVoLTE-300x131.png 300w, https:\/\/hellovpn.app\/blog\/wp-content\/uploads\/2021\/07\/ReVoLTE-768x337.png 768w, https:\/\/hellovpn.app\/blog\/wp-content\/uploads\/2021\/07\/ReVoLTE.png 1513w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption>Source: <a href=\"https:\/\/revolte-attack.net\/\">Call Me Maybe &#8211; Ea\u00adves\u00addrop\u00adping En\u00adcryp\u00adted LTE Calls With Re\u00adVoL\u00adTE<\/a><\/figcaption><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"4\"><strong>How to make safe calls over the Internet?<\/strong><\/h4>\n\n\n\n<p>The above-mentioned <a href=\"https:\/\/revolte-attack.net\/\">research<\/a> demonstrates the imperfection and the possibility of <strong>LTE networks&#8217;<\/strong> bad implementation. The <strong>ReVoLTE <\/strong>attack shows that it is possible to hack and to decrypt the voice data.\u00a0<\/p>\n\n\n\n<p>It is worth mentioning that you can also make <strong><a href=\"https:\/\/hellovpn.onelink.me\/ba95\/73b872f5\">VoIP calls<\/a><\/strong> (voice calls over the Internet). By choosing proven and trusted solutions, <strong>VoIP<\/strong> provides more secure calls than landline telephony. <strong><a href=\"https:\/\/hellovpn.onelink.me\/ba95\/73b872f5\">Encryption<\/a><\/strong> of all of your internet connection means your <a href=\"https:\/\/hellovpn.onelink.me\/ba95\/73b872f5\">VoIP calls<\/a> are protected from data retention. Other than that, your speed connection won\u2019t be slowed down, so you will experience smooth and uninterrupted calls.<\/p>\n\n\n\n<p><strong><em><a href=\"https:\/\/hellovpn.app\/blog\/7-important-things-you-should-know-about-vpns\/\" target=\"_blank\" rel=\"noreferrer noopener\">7 Important Things You Should Know About VPNs<\/a><\/em><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/hellovpn.app\/blog\/wp-content\/uploads\/2021\/08\/elli1-2-1024x536.jpg\" alt=\"\" class=\"wp-image-252\" srcset=\"https:\/\/hellovpn.app\/blog\/wp-content\/uploads\/2021\/08\/elli1-2-1024x536.jpg 1024w, https:\/\/hellovpn.app\/blog\/wp-content\/uploads\/2021\/08\/elli1-2-300x157.jpg 300w, https:\/\/hellovpn.app\/blog\/wp-content\/uploads\/2021\/08\/elli1-2-768x402.jpg 768w, https:\/\/hellovpn.app\/blog\/wp-content\/uploads\/2021\/08\/elli1-2.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/hellovpn.onelink.me\/ba95\/73b872f5\">Get Hello VPN \u2014 Basic and Reliable<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp;A team of researchers (David Rupprecht, Katharina Kohls, Thorsten Holz, and Christina P\u00f6pper) presented a new attack, which is called \u2018ReVoLTE\u2019. The attack might allow remote hackers to break the encrypted connection between targeted phone calls. Get the best overall VPN 2021 INDEX 1-What is VoLTE?2-The ReVoLTE attack3-The scenario of the ReVoLTE attack\u00a04-How to make [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[7],"tags":[40],"class_list":["post-122","post","type-post","status-publish","format-standard","hentry","category-tech-news","tag-new-attack"],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/hellovpn.app\/blog\/wp-json\/wp\/v2\/posts\/122","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hellovpn.app\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hellovpn.app\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hellovpn.app\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/hellovpn.app\/blog\/wp-json\/wp\/v2\/comments?post=122"}],"version-history":[{"count":6,"href":"https:\/\/hellovpn.app\/blog\/wp-json\/wp\/v2\/posts\/122\/revisions"}],"predecessor-version":[{"id":413,"href":"https:\/\/hellovpn.app\/blog\/wp-json\/wp\/v2\/posts\/122\/revisions\/413"}],"wp:attachment":[{"href":"https:\/\/hellovpn.app\/blog\/wp-json\/wp\/v2\/media?parent=122"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hellovpn.app\/blog\/wp-json\/wp\/v2\/categories?post=122"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hellovpn.app\/blog\/wp-json\/wp\/v2\/tags?post=122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}