Although 5G mobile technology is still in its early stages and has not yet been widely deployed, five groups representing a source of serious and serious security threats have been warned, currently lurking in this technology, in preparation to attack it once it is operational, as it is a valuable target, including It will carry and transmit it from huge data all the time, which can be infiltrated and tampered with, in pursuit of financial blackmail, destruction and corruption, or to achieve economic, political and military objectives. This came within the framework of a warning issued by the European Agency for Computer Security «ENISA», in a report published on its website recently about the security threats facing the next generation of mobile networks.

The 5 groups

These groups include online cybercrime groups, early insiders of 5G technology and testing, as well as attack groups supported or sponsored by certain countries, as well as activists and infiltrators and experienced individuals for long periods of time. Finally, the new attackers are individuals with limited experience, who work individually through tools and appliances, home and office communication, such as cameras and electrical appliances and others. The European Agency indicated that the new groups were working as follows:

Cybercrime groups

The INISA report identified advanced capabilities of many organized cybercrime groups, allowing them to launch effective attacks on mobile 5G networks early in their operation and deployment, suggesting that this generation of networks has become a potential target for these long-established groups. To launch attacks in various directions, for purposes including data theft, fraud and financial extortion.

Early Insiders

The first insiders are the people and groups who deal with the technologies in their early experimental and experimental stages, and they are among the first operators and implementers. This technique, because of the changes it will make, and then spontaneously launch attacks on it in its early stages.

Groups of States

They are groups that specialize in large-scale, prolonged and organized cyber attacks, operating under the auspices, support and planning of certain states, to serve their policies and objectives against their enemies. Inesa expected that the fifth generation networks will be one of the major objectives of these groups, because these networks will penetrate into the general infrastructure of all sectors, in a way that has not happened before, and then attacking them to disrupt them is obvious in any conflict or competition between governments.

Professional individuals

They are professionals with many precedents in the field of cybercrime, who work individually, either for money or just to prove themselves, and are called «cybercrime activists», and because the behavior of this category is subject to the individual decisions of the attacker, preferences and personal circumstances, it is It is unclear, according to Enissa, how they will behave, when and where their strikes will be.

New attackers

They are small new hackers in the world of cyber security threats, whether young or inexperienced, a category that Enissa believes will enter the sphere of influence due to the proliferation of devices and equipment and things that are connected to be always connected to the Internet via 5G networks. For mobile phones, many of them are not sufficiently secure, such as digital cameras, curtains, washing machines, refrigerators and air conditioners.

Early assessment

The Executive Director of the European Computer Security Agency, Johan Lepasar, said that the report of the “ENISA”, which ended with the warning of the five groups, was prepared with the support of the European Commission member states and a team of experts, and tried to present a scene of the potential threat of mobile 5G networks, through Detailed analysis of the architectural elements of these networks, which include security architecture, chip architecture, edge computing architecture, architecture of software-defined communication networks, physical architecture, and others.

This assessment came early and coincided with the initial phases and initial operations of 5G networks, because the 5G mobile infrastructure has a high degree of complexity, given the many features and features it offers, he said, noting that in this environment, which is still very dynamic Threat and risk assessments need to be undertaken early and in an iterative way to cover future developments, in order to support stakeholders and help them understand the threats to which they will be exposed.