The arrival of 5G promised ultra-fast connections, lower latency, and a more secure infrastructure compared to previous generations like 4G or 3G. However, as with any technology, security is never absolute. A team of researchers from the ASSET Research Group at the Singapore University of Technology and Design (SUTD) has just demonstrated this with a novel attack framework dubbed Sni5Gect.
This attack framework has a disturbing feature: it can degrade your 5G connection without needing rogue base stations, one of the most common tactics until now. The researchers have found a new way to intercept and manipulate communications between your mobile device and the network during the most vulnerable seconds of the connection process.
At TecnetOne, we want to explain how it works, why it's dangerous, and what lessons it brings for businesses and users that rely on this technology.
The name stands for Sniffing 5G Inject, which precisely describes what it does: it sniffs unencrypted messages exchanged between a 5G base station (gNB) and a mobile device (UE) and then injects malicious messages over the air to manipulate communication.
The surprising part? It doesn’t require rogue base stations or million-dollar equipment. It’s open-source software that, in the wrong hands, could be used with relatively affordable hardware.
The attack specifically targets the pre-authentication and pre-encryption phase. Before 5G communication is protected, there's a brief window where messages are transmitted in plaintext — that's when Sni5Gect strikes.
Learn more: Microsoft Authenticator Will No Longer Be a Password Manager
Until now, manipulating a 5G connection was thought to require rogue base stations, limiting such attacks to well-funded adversaries. But Sni5Gect proves that attackers can exploit the communication without controlling the base station, acting merely as a “spy” that intercepts traffic.
This discovery broadens the threat landscape, lowering technical and financial barriers.
In real-world testing, researchers achieved:
Tested devices included well-known models: OnePlus Nord CE 2, Samsung Galaxy S22, Google Pixel 7, and Huawei P40 Pro, proving this is not a single-vendor issue but a widespread 5G ecosystem vulnerability.
Manipulation of communications (Source: BlackHat)
This work builds on previous research. In 2023, the same team (ASSET) discovered 5Ghoul, a set of 14 vulnerabilities in MediaTek and Qualcomm modem firmware. These flaws could force disconnects, crash modems, and degrade 5G to 4G.
Sni5Gect goes further — it shows you don’t even need to compromise a base station. You just need to attack that tiny window before encryption begins.
This highlights a fundamental truth: security depends not just on protocols but on all intermediate stages, which are often more exposed.
The main risk is downgrading to 4G. While 5G is more secure, 4G carries known vulnerabilities such as:
Additionally:
In short: this attack kicks you out of 5G and leaves you vulnerable in a weaker ecosystem.
The GSMA (Global System for Mobile Communications Association) has acknowledged the finding and labeled it CVD-2024-0096, a code reserved for critical vulnerabilities.
Researchers also highlight that Sni5Gect is not just a threat, but also a valuable tool for future 5G research:
In short: it’s both a red flag and a chance to strengthen security.
Also of interest: Bluetooth Vulnerabilities Allow Hackers to Spy on Your Microphone
At TecnetOne, we often say cybersecurity isn’t a product — it’s a process. Sni5Gect shows that even modern technologies like 5G have weak spots, exploitable in everyday scenarios.
For consumers, the main recommendation is to keep devices updated. Many vendors are already working on patches to harden the initial communication phase.
For businesses that depend heavily on 5G — such as industrial IoT, automotive, or connected healthcare — the message is clear:
Explotation potencial (Source: BlackHat)
The Sni5Gect framework proves that telecom security is not static. While 5G was designed to be safer than 4G, attackers continue to find new angles to exploit vulnerabilities.
The key lessons:
At TecnetOne, we believe these investigations are essential. They remind us that cybersecurity is non-negotiable, and every tech innovation must be paired with a proactive security mindset to protect infrastructure and people.