Coding

Bad Connection: Global telecom exploitation by covert surveillance actors

"Global telecom networks are being compromised by sophisticated covert surveillance actors exploiting unsecured SS7 connections, allowing unauthorized access to call records, location data, and even real-time voice intercepts, with millions of users worldwide potentially affected by this stealthy threat. The vulnerability stems from outdated infrastructure and inadequate security measures in many countries. As a result, sensitive information is being siphoned off with alarming ease. AI-assisted, human-reviewed."

Global telecom networks are being systematically exploited by covert surveillance actors who leverage unsecured SS7 and Diameter signalling protocols to track targets, intercept communications, and extract location data. A new investigation from the Citizen Lab, conducted in collaboration with Cellusys, Telenor Linx, Roaming Audit, and P1 Security, identifies two distinct campaigns by sophisticated actors using multi-vector techniques that combine 3G and 4G signalling with SMS-based device exploitation.

Overview

The vulnerabilities are not software bugs or misconfigurations—they are inherent to the design of global telecommunications. SS7 and Diameter protocols were built for a trusted community of operators, lacking authentication, integrity checks, and encryption. Despite Diameter's stronger security controls, operators have largely failed to implement TLS or IPsec protections, leaving 4G networks vulnerable to the same surveillance techniques as 3G. The result is a shadowy marketplace where state-backed and commercial surveillance vendors (CSVs) weaponize telecom infrastructure for espionage.

The Two Campaigns

The first campaign, observed in November 2024, targeted a high-profile company executive (described as a "VVIP") using a multi-stage effort across multiple 3G and 4G networks. The second, identified in early 2025, used a specially formatted SMS message containing hidden SIM card commands to extract location information, effectively turning the device into a covert tracking beacon. Both campaigns demonstrated advanced, highly structured methods consistent with purpose-built surveillance platforms.

How the Attacks Work

Attackers gain access to the global signalling ecosystem through commercial arrangements with mobile operators, compromised telecom nodes, or control of telecom networks. Because SS7 and Diameter do not authenticate the true source of commands, malicious traffic can appear to originate from legitimate operator network nodes. Key techniques include:

  • Spoofing operator identities: Attackers manipulate signalling identifiers (Global Titles, Origin-Host fields) to masquerade as trusted operators.
  • Protocol pivoting: By exploiting combined attach procedures that allow devices to register on both 3G and 4G networks simultaneously, attackers seamlessly switch between SS7 and Diameter to evade firewalls.
  • Routing manipulation: Attackers steer messages through specific intercarrier providers, often using third-party entry points not listed in the operator's IR.21 roaming documents. The investigation found repeated mismatches between expected interconnect providers and those observed in attack traffic, indicating use of alternate providers.
  • Centralized command-and-control: Near-sequential transaction identifiers (TIDs) and identical parameters across multiple networks reveal a centralized C2 platform generating the queries.

Infrastructure and Attribution

The attacks leveraged identifiers and infrastructure associated with operators in 18 countries: UK, Israel, China,

Similar Articles

More articles like this

Coding 2 min

Ruflo: Multi-agent AI orchestration for Claude Code

A new framework for multi-agent orchestration, Ruflo, has emerged to streamline interactions between Claude Code and external AI agents, leveraging the OpenAPI specification to facilitate seamless integration and data exchange. By abstracting away underlying complexities, Ruflo enables developers to craft more sophisticated workflows and automate tasks with greater ease. This shift in agent management could have far-reaching implications for AI-powered applications. AI-assisted, human-reviewed.

Coding 2 min

Trademark violation: Fake Notepad++ for Mac

A counterfeit version of the popular open-source text editor Notepad++ has been discovered on the Mac App Store, masquerading as the genuine article and potentially compromising user data through unauthorized access to sensitive files. The fake app, which mimics the exact UI and functionality of the original, has been downloaded over 1,000 times, raising concerns about the App Store's vetting process. This incident highlights the need for more robust security measures. AI-assisted, human-reviewed.

Coding 2 min

GameStop makes $55.5B takeover offer for eBay

Retail giant GameStop's $55.5 billion unsolicited bid for eBay marks a seismic shift in e-commerce, as the brick-and-mortar stalwart seeks to leverage its vast customer base and expand its digital footprint through eBay's sprawling online marketplace. The proposed acquisition would integrate eBay's auction and fixed-price platforms with GameStop's loyalty program and omnichannel retail capabilities. The deal's implications for consumer behavior, digital marketplaces, and retail consolidation are far-reaching. AI-assisted, human-reviewed.

Coding 1 min

Over 8M Thermos jars and bottles recalled after 3 people lost vision

Massive consumer goods recall highlights the perils of thermal shock: over 8 million Thermos jars and bottles are being pulled from shelves after three people suffered irreversible vision loss due to sudden temperature changes, prompting a reevaluation of the industry's safety standards for vacuum-insulated containers. The recall affects a wide range of products, including popular travel mugs and food storage containers. A closer look at the affected products' design and manufacturing processes is now underway. AI-assisted, human-reviewed.

Coding 1 min

Stitch Together Lots of Little HTML Pages with Navigations for Interactions

A new approach to web development is emerging, leveraging the concept of "small HTML pages" to stitch together modular, navigable interfaces that facilitate seamless interactions. By breaking down complex web applications into bite-sized, self-contained components, developers can create more agile, responsive, and maintainable user experiences. This modular strategy is poised to revolutionize the way we design and build web interfaces. AI-assisted, human-reviewed.

Coding 1 min

Humanoid Robot Actuators: The Complete Engineering Guide

Advances in high-torque, low-weight actuators are poised to revolutionize humanoid robotics, with the emergence of compact, direct-drive motors and optimized gearboxes enabling more agile and dynamic movement. Key innovations include the integration of high-strength, lightweight materials and the adoption of advanced control algorithms for precise torque control. As a result, humanoid robots are becoming increasingly capable of complex, human-like motion. AI-assisted, human-reviewed.