Investigation uncovers two sophisticated telecom surveillance campaigns

· security privacy · Source ↗

TLDR

  • Citizen Lab exposed two ghost-company surveillance vendors abusing SS7 and SIMjacker exploits in global cellular networks to geolocate high-profile targets.

Key Takeaways

  • Three telcos served as recurring entry and transit points for both campaigns: 019Mobile (Israel), Tango Networks U.K., and Airtel Jersey (now Sure).
  • SS7, the 2G/3G backbone, has no authentication or encryption; Diameter (4G/5G replacement) is still exploitable when carriers skip implementing its new protections.
  • First campaign chained SS7 exploits with Diameter fallback; second used SIMjacker silent SMS to turn the target’s SIM card into a passive location tracker.
  • Researcher Gary Miller ties campaign one to an Israeli commercial geo-intelligence vendor; Circles/NSO Group, Cognyte, and Rayzone are named as known analogues in the space.
  • Miller calls these two campaigns “the tip of the iceberg” in what he estimates is a universe of millions of global attacks.

Hacker News Comment Review

  • Commenters flagged that 5G offers no protection: backward compatibility preserves SS7 downgrade paths, making a data-only SIM combined with internet-based voice the only effective mitigation.
  • Real-world abuse runs far beyond state actors: telco insiders stalking individuals and a Russian black market for location data were both cited as evidence the threat is diffuse and structural.
  • LOVEINT cases – NSA personnel using classified surveillance infrastructure against personal targets – were raised as proof that insider misuse is not an edge case but a predictable outcome of concentrated access.

Notable Comments

  • @aetherspawn: Stalker ex with telco access tracked target across new SIM cards and new phones; police dismissed every report as irrational.

Original | Discuss on HN