{"id":36572,"date":"2020-08-12T16:13:13","date_gmt":"2020-08-12T16:13:13","guid":{"rendered":"http:\/\/80ec743b-121f-45bc-b04a-0e26ad6ec1d2"},"modified":"2020-08-12T16:13:13","modified_gmt":"2020-08-12T16:13:13","slug":"revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations\/","title":{"rendered":"Re\u00adVoL\u00adTE attack can decrypt 4G (LTE) calls to eavesdrop on conversations"},"content":{"rendered":"<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/08\/12\/4c97e809-23d1-4893-9895-5508539be001\/revolte.png\" class alt=\"ReVoLTE\"><\/span><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> Image: Rupprecht et al. <\/span><\/figcaption><\/figure>\n<p>A team of academics has detailed this week a vulnerability in the Voice over LTE (VoLTE) protocol that can be used to break the encryption on 4G voice calls.<\/p>\n<p>Named ReVoLTE, researchers say this attack is possible because mobile operators often use the same encryption key to secure multiple 4G voice calls that take place via the same base station (mobile cell tower).<\/p>\n<p>Academics say they tested the attack in a real-world scenario and found that multiple mobile operators are impacted, and have worked with the GSM Association (GSMA), the organization that governs telephony standards, to have the issue resolved.<\/p>\n<h3>What are LTE, VoLTE, and encrypted calls<\/h3>\n<p>But to understand how the ReVoLTE attack works, ZDNet readers must first know how modern mobile communications work.<\/p>\n<p>Today, the latest version of mobile telephony standards is&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/4G\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">4G<\/a>, also commonly referred to as Long Term Evolution (LTE).<\/p>\n<p>Voice over LTE (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Voice_over_LTE\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">VoLTE<\/a>) is one of the many protocols that make up the larger LTE\/4G mobile standard. As the name suggests, VoLTE handles voice communications on 4G networks.<\/p>\n<p>By default, the VoLTE standard supports encrypted calls. For each call, mobile operators must select an encryption key (called a stream cipher) to secure the call. Normally, the stream cipher should be unique for each call.<\/p>\n<h3>How the ReVoLTE attack works<\/h3>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\"> <\/section>\n<p>However, a team of academics from the Ruhr University in Bochum, Germany, has discovered that not all mobile operators follow the 4G standard to the letter of the law.<\/p>\n<p>Researchers say that while mobile operators do, indeed, support encrypted voice calls, many calls are encrypted with the same encryption key.<\/p>\n<p>In their research, academics said that the problem usually manifests at the base station (mobile cell tower) level, which, in most cases, reuse the same stream cipher, or use predictable algorithms to generate the encryption key for voice calls.<\/p>\n<p>In a real-world scenario, academics say that if an attacker can record a conversation between two 4G users using a vulnerable mobile tower, they can decrypt it at a later point.<\/p>\n<p>All an attacker has to do is place a call to one of the victims and record the conversation. The only catch is that the attacker has to place the call from the same vulnerable base station, in order to have its own call encrypted with the same\/predictable encryption key.<\/p>\n<p>&#8220;The longer the attacker [talks] to the victim, the more content of the previous conversation he or she [is] able to decrypt,&#8221; David Rupprecht, one of the academics said.<\/p>\n<p>&#8220;For example, if attacker and victim spoke for five minutes, the attacker could later decode five minutes of the previous conversation.&#8221;<\/p>\n<p>The attacker can compare the two recorded conversations, determine the encryption key, and then recover the previous conversation. A demo of a typical ReVoLTE attack is available embedded below:<\/p>\n<section class=\"shortcode media-source\">\n<p> <iframe width=\"500\" height=\"282\" frameborder=\"0\" allowfullscreen=\"true\" title=\"YouTube content\" id=\"iframe_youtube\" class=\"optanon-category-3\" data-src=\"https:\/\/www.youtube.com\/embed\/FiiELuFvwu0\">[embedded content]<\/iframe> <\/p>\n<\/section>\n<p>Researchers say that the equipment to pull off a ReVoLTE attack costs around $7,000. While the price might seem steep, it is certainly in the price range of other 3G\/4G mobile interception gear, usually employed by law enforcement or criminal gangs.<\/p>\n<h3>Issue reported to the GSMA, patches deployed<\/h3>\n<p>The research team said it conducted thorough research on how widespread the problem was in real-world deployments of 4G mobile cell towers.<\/p>\n<p>Researchers analyzed a random selection of base stations across Germany and said they found that 80% were using the same encryption key or a predictable one, exposing users to ReVoLTE attacks.<\/p>\n<p>Academics said they reported the issues to both German mobile operators and the GSMA body back in December 2019, and that the GSMA issued updates for the 4G protocol implementation to address and prevent ReVoLTE attacks.<\/p>\n<p>&#8220;We then tested several random radio cells all over Germany and haven&#8217;t detected any problems since then,&#8221; Rupprecht said today.<\/p>\n<h3>App available for mobile telcos<\/h3>\n<p>But researchers say that while German mobile operators appear to have fixed the issue, other telcos across the world are most likely vulnerable.<\/p>\n<p>That is why the research team released today an Android app that mobile operators can use to test their 4G networks and base stations and see if they are vulnerable to ReVoLTE attacks. The app has been&nbsp;<a href=\"https:\/\/github.com\/RUB-SysSec\/mobile_sentinel\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">open-sourced on GitHub<\/a>.<\/p>\n<p>Details about the ReVoLTE attack are available on a&nbsp;<a href=\"https:\/\/revolte-attack.net\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">dedicated website<\/a>&nbsp;the research team published today after presenting their work at the USENIX 29 security conference. A video of the ReVoLTE presentation the research team gave at USENIX is available on&nbsp;<a href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/rupprecht\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">this page<\/a>.<\/p>\n<p>A scientific paper detailing the ReVoLTE attack is also available for download as PDF from&nbsp;<a href=\"https:\/\/www.usenix.org\/system\/files\/sec20-rupprecht.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">here<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/revolte-attack.net\/media\/revolte_camera_ready.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">here<\/a>. The paper is titled &#8220;<em>Call Me Maybe: Ea\u00adves\u00addrop\u00adping En\u00adcryp\u00adted LTE Calls With Re\u00adVoL\u00adTE<\/em>.&#8221;<\/p>\n<p>The research team behind the ReVoLTE attack is the same team who earlier this year discovered the&nbsp;<a href=\"https:\/\/imp4gt-attacks.net\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">IMP4GT attack<\/a>&nbsp;on the 4G protocol, a vulnerability that allowed 4G users to&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/lte-security-flaw-can-be-abused-to-take-out-subscriptions-at-your-expense\/\" target=\"_blank\" rel=\"noopener noreferrer\">impersonate other subscribers<\/a>&nbsp;and sign up for paid services at another user&#8217;s expense.<\/p>\n<p>Today&#8217;s ReVoLTE disclosure is the latest in a long list of vulnerabilities identified in the 4G\/LTE protocol over the past years. Previous findings were also published in&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/researchers-find-36-new-security-flaws-in-lte-protocol\/\" target=\"_blank\" rel=\"noopener noreferrer\">March 2019<\/a>,&nbsp;<a href=\"https:\/\/www.ndss-symposium.org\/ndss-paper\/privacy-attacks-to-the-4g-and-5g-cellular-paging-protocols-using-side-channel-information\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">February 2019<\/a>,&nbsp;<a href=\"https:\/\/www.ptsecurity.com\/ww-en\/premium\/diameter-2018\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">July 2018<\/a>,&nbsp;<a href=\"https:\/\/alter-attack.net\/media\/breaking_lte_on_layer_two.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">June 2018<\/a>,&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/new-lte-attacks-eavesdrop-on-messages-track-locations-spoof-alerts\/\" target=\"_blank\" rel=\"noopener noreferrer\">March 2018<\/a>,&nbsp;<a href=\"https:\/\/www.sstic.org\/media\/SSTIC2017\/SSTIC-actes\/remote_geolocation_and_tracing_of_subscribers_usin\/SSTIC2017-Article-remote_geolocation_and_tracing_of_subscribers_using_4g_volte_android_phone-le-moal_ventuzelo_coudray.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">June 2017<\/a>,&nbsp;<a href=\"http:\/\/www.kb.cert.org\/vuls\/id\/790839\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">July 2016<\/a>, and&nbsp;<a href=\"http:\/\/ina.kaist.ac.kr\/~dongsuh\/paper\/kim-ccs15.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">October 2015<\/a>.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/re-vol-te-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Academics detail a new attack on 4G encrypted calls. Attack works only when the attacker is on the same base station (mobile tower) as the victim.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":36573,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-36572","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Re\u00adVoL\u00adTE attack can decrypt 4G (LTE) calls to eavesdrop on conversations 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Re\u00adVoL\u00adTE attack can decrypt 4G (LTE) calls to eavesdrop on conversations 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-12T16:13:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations.png\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Re\u00adVoL\u00adTE attack can decrypt 4G (LTE) calls to eavesdrop on conversations\",\"datePublished\":\"2020-08-12T16:13:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations\/\"},\"wordCount\":894,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations\/\",\"name\":\"Re\u00adVoL\u00adTE attack can decrypt 4G (LTE) calls to eavesdrop on conversations 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations.png\",\"datePublished\":\"2020-08-12T16:13:13+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations.png\",\"width\":770,\"height\":425},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Re\u00adVoL\u00adTE attack can decrypt 4G (LTE) calls to eavesdrop on conversations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Re\u00adVoL\u00adTE attack can decrypt 4G (LTE) calls to eavesdrop on conversations 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations\/","og_locale":"en_US","og_type":"article","og_title":"Re\u00adVoL\u00adTE attack can decrypt 4G (LTE) calls to eavesdrop on conversations 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-08-12T16:13:13+00:00","og_image":[{"width":770,"height":425,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Re\u00adVoL\u00adTE attack can decrypt 4G (LTE) calls to eavesdrop on conversations","datePublished":"2020-08-12T16:13:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations\/"},"wordCount":894,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations\/","url":"https:\/\/www.threatshub.org\/blog\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations\/","name":"Re\u00adVoL\u00adTE attack can decrypt 4G (LTE) calls to eavesdrop on conversations 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations.png","datePublished":"2020-08-12T16:13:13+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations.png","width":770,"height":425},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/revolte-attack-can-decrypt-4g-lte-calls-to-eavesdrop-on-conversations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Re\u00adVoL\u00adTE attack can decrypt 4G (LTE) calls to eavesdrop on conversations"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=36572"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36572\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/36573"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=36572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=36572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=36572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}