top of page

Understand Mobile Threats

​Mobile phone communications, including calls and messages, face significant security threats that are often underestimated.

Many organisations and individuals mistakenly assume their mobile devices provide a secure environment for voice and data transmissions. However, inherent vulnerabilities within cellular devices and networks expose users to risks that could compromise privacy and organisational confidentiality.

Mobile Operator (Cloud Icon)

Fake Cell Towers

IMSI Catchers

An IMSI catcher, also known as a Stingray or cell-site simulator, is a device used to intercept and track mobile phone communications. These devices pose a significant threat to mobile security by impersonating legitimate cell towers.

IMSI stands for International Mobile Subscriber Identity, a unique number assigned to each mobile phone user and stored on the SIM card. When phones connect to an IMSI catcher, it can collect sensitive information and potentially intercept calls, messages, and data traffic.

Cellcrypt's advanced encryption and security measures provide robust protection against IMSI catcher attacks. By encrypting communications end-to-end and implementing additional safeguards, Cellcrypt ensures that even if an IMSI catcher intercepts the signal, the content remains secure and inaccessible to unauthorised parties.

Harris Stingray

Here's a simplified explanation of how an IMSI catcher works and how Cellcrypt protects against it:

  1. An IMSI catcher mimics a legitimate cell tower, emitting a strong signal that attracts nearby mobile phones seeking the best connection.

  2. Phones automatically connect to the IMSI catcher, unknowingly exposing their IMSI number and potentially allowing interception of calls, messages, and data.

  3. The IMSI catcher can force phones to use less secure protocols, making decryption of intercepted data easier.

  4. Cellcrypt counters this threat through several mechanisms:

    • End-to-end encryption ensures that even if data is intercepted, it remains unreadable.

    • Cellcrypt's secure voice and messaging operate independently of cellular networks, bypassing potential IMSI catcher vulnerabilities.

    • Advanced authentication protocols in Cellcrypt prevent unauthorised access, even if an IMSI is compromised.

    • Regular security updates keep Cellcrypt resilient against evolving IMSI catcher techniques.

 

By implementing these layers of protection, Cellcrypt maintains communication security even in the presence of IMSI catchers.

abstract depiction of a network.jpg

Network Attacks

Femtocell

The mobile network security landscape has evolved significantly from 3G to 5G, with each generation introducing new vulnerabilities and protective measures.

 

3G: Foundational Encryption

Third-generation networks introduced encryption from mobile devices through cell towers to Radio Network Controllers, aiming to protect both the Radio Access Network and backhaul. However, a critical weakness persisted: infiltration of the Core Mobile Network could bypass GSM and 3G encryption.

 

4G: Expanded Attack Surface

4G networks brought new security challenges. Mandatory encryption only covered communication between mobile devices and cell towers (eNodeB), leaving IP traffic in the operator's backhaul vulnerable.

 

5G: Advanced Security with Remaining Challenges

While 5G networks have significantly improved security, potential vulnerabilities remain:

 

Enhanced Features: 5G incorporates stronger encryption protocols, improved authentication processes, and better user privacy protection.

 

Service-Based Architecture (SBA): This innovation, leveraging network function virtualization and software-defined networking, increases flexibility but introduces new attack vectors targeting software and virtualized infrastructure.

 

Small Cell Proliferation: The widespread deployment of compact, low-power base stations in public areas creates physical security risks.

 

As mobile networks continue to advance, security strategies must adapt to address evolving threats.

Network Hub and Cable

Signalling Attacks

Signalling System No.7 (SS7)

Signalling System 7 (SS7) is a set of telephony protocols enabling global mobile network connectivity. Developed in the 1970s, it lacks modern security features, making it vulnerable to various attacks.

SS7 vulnerabilities allow intruders to perform:

  • SMS Interception: Attackers can intercept SMS messages, potentially compromising two-factor authentication (2FA) systems.

  • Call Interception: Unauthorized eavesdropping on phone conversations is possible through SS7 exploitation.

  • Call Redirection: Attackers can reroute calls without the caller's or recipient's knowledge, leading to potential information loss or communication disruption.

​​

Cellcrypt addresses these SS7 vulnerabilities through:

  • End-to-end encryption: All communications are encrypted, rendering intercepted data unreadable.

  • Independent infrastructure: Cellcrypt operates separately from traditional cellular networks, bypassing SS7 vulnerabilities.

  • Secure authentication: Robust protocols prevent unauthorised access, even if SS7 is compromised.

  • Encrypted messaging: Cellcrypt's secure messaging replaces vulnerable SMS-based 2FA.

​​

By implementing these security measures, Cellcrypt ensures that communications remain protected against SS7-based attacks, maintaining integrity and confidentiality even when traditional cellular networks are compromised.

SS7 Graphic
Plus Icon

EXAMPLE 1 – Intercepting SMS Messages

SS7 Graphic 2
Plus Icon

EXAMPLE 2 – Intercepting Calls

bottom of page