top of page

Understand Mobile Threats

​Mobile phone communications, including calls and messages, face significant security threats that are often underestimated.

​

Many organisations and individuals mistakenly assume their mobile devices provide a secure environment for voice and data transmissions. However, inherent vulnerabilities within cellular devices and networks expose users to risks that could compromise privacy and organisational confidentiality.

graphic_edited.png

Fake Cell Towers

IMSI Catchers

An IMSI catcher, also known as a Stingray or cell-site simulator, is a device used to intercept and track mobile phone communications. These devices pose a significant threat to mobile security by impersonating legitimate cell towers.

​

IMSI stands for International Mobile Subscriber Identity, a unique number assigned to each mobile phone user and stored on the SIM card. When phones connect to an IMSI catcher, it can collect sensitive information and potentially intercept calls, messages, and data traffic.

​

Cellcrypt's advanced encryption and security measures provide robust protection against IMSI catcher attacks. By encrypting communications end-to-end and implementing additional safeguards, Cellcrypt ensures that even if an IMSI catcher intercepts the signal, the content remains secure and inaccessible to unauthorised parties.

Here's a simplified explanation of how an IMSI catcher works and how Cellcrypt protects against it:

​

  1. An IMSI catcher mimics a legitimate cell tower, emitting a strong signal that attracts nearby mobile phones seeking the best connection.

  2. Phones automatically connect to the IMSI catcher, unknowingly exposing their IMSI number and potentially allowing interception of calls, messages, and data.

  3. The IMSI catcher can force phones to use less secure protocols, making decryption of intercepted data easier.

  4. Cellcrypt counters this threat through several mechanisms:

    • End-to-end encryption ensures that even if data is intercepted, it remains unreadable.

    • Cellcrypt's secure voice and messaging operate independently of cellular networks, bypassing potential IMSI catcher vulnerabilities.

    • Advanced authentication protocols in Cellcrypt prevent unauthorised access, even if an IMSI is compromised.

    • Regular security updates keep Cellcrypt resilient against evolving IMSI catcher techniques.

 

By implementing these layers of protection, Cellcrypt maintains communication security even in the presence of IMSI catchers.

Fake Cell Towers

Network Attacks

The landscape of mobile network security has undergone significant transformations as we've progressed from 3G to today's 5G technology. Each generation has brought its own set of vulnerabilities and defence mechanisms.

 

3G: Initial Encryption Efforts

Third-generation networks implemented encryption from mobile devices through cell towers and onto Radio Network Controllers. This approach aimed to safeguard both the Radio Access Network and backhaul segments. However, a critical weakness remained: if a malicious actor infiltrated the Core Mobile Network, they could bypass the encryption measures put in place for GSM and 3G communications.

 

4G: Expanded Vulnerabilities

The transition to 4G networks introduced new concerns. In this generation, the mandated encryption only extended from the mobile device to the cell tower (eNodeB). Consequently, IP traffic travelling through the operator's backhaul remained exposed, presenting an increased security risk.

 

5G: Enhanced Protection with Lingering Concerns

While 5G networks have made substantial strides in security compared to their predecessors, they are not without potential weak points. The latest generation boasts improved features such as more robust encryption protocols, advanced authentication processes, and heightened user privacy safeguards. Despite these enhancements, network security remains an ongoing concern.

 

Service-Based Architecture: A Double-Edged Sword

One of the key innovations in 5G is the adoption of a Service-Based Architecture (SBA). This approach leverages network function virtualisation and software-defined networking to boost flexibility and scalability. However, this software-centric model also introduces new attack vectors, as malicious actors may target the underlying software and virtualised infrastructure.

 

Physical Vulnerabilities in the Era of Small Cells

The proliferation of small cells in 5G deployments presents another security challenge. These compact, low-power base stations are often situated in easily accessible public areas, making them potential targets for physical tampering or unauthorised access.

 

As mobile networks continue to evolve, so too must the strategies for protecting them against an ever-changing array of security threats.

Network Attacks
Network Hub and Cable

Signalling Attacks

Signalling System No.7 (SS7)

Signalling System 7 (SS7) is a set of telephony protocols enabling global mobile network connectivity. Developed in the 1970s, it lacks modern security features, making it vulnerable to various attacks.

​

SS7 vulnerabilities allow intruders to perform:

  • SMS Interception: Attackers can intercept SMS messages, potentially compromising two-factor authentication (2FA) systems.

  • Call Interception: Unauthorized eavesdropping on phone conversations is possible through SS7 exploitation.

  • Call Redirection: Attackers can reroute calls without the knowledge of the caller or recipient, leading to potential information loss or communication disruption.

​​

Cellcrypt addresses these SS7 vulnerabilities through:

  • End-to-end encryption: All communications are encrypted, rendering intercepted data unreadable.

  • Independent infrastructure: Cellcrypt operates separately from traditional cellular networks, bypassing SS7 vulnerabilities.

  • Secure authentication: Robust protocols prevent unauthorised access, even if SS7 is compromised.

  • Encrypted messaging: Cellcrypt's secure messaging replaces vulnerable SMS-based 2FA.

​​

By implementing these security measures, Cellcrypt ensures that communications remain protected against SS7-based attacks, maintaining integrity and confidentiality even when traditional cellular networks are compromised.

EXAMPLE 1 – Intercepting SMS Messages

EXAMPLE 2 – Intercepting Calls

Signalling Attacks

Mobile threats are widespread: Cellcrypt protects against both sophisticated and common attacks

Mobile threats are not limited to state actors or high-cost hackers. With minimal resources - just a browser, internet connection, and possibly a prepaid debit card - anyone can spoof SMS messages and Caller IDs.

The fact that a receiving mobile number recognises and displays a familiar name for spoofed calls or texts often leads recipients to trust their authenticity.

 

This vulnerability, combined with basic social engineering, can result in individuals inadvertently revealing critical information like passwords. More alarmingly, some organisations use SMS for emergency alerts, such as building evacuations or employee location requests, making these spoofing attacks potentially dangerous.

​

Cellcrypt addresses these threats through:

​

  • Secure messaging platform: Replaces vulnerable SMS with end-to-end encrypted messages, eliminating the risk of spoofing.

  • Verified user authentication: Ensures that all users on the Cellcrypt network are authenticated, preventing impersonation.

  • Encrypted voice calls: Provides a secure alternative to traditional cellular calls, immune to Caller ID spoofing.

  • Custom alert systems: Offers organisations secure, spoofing-resistant emergency notification options.

​​

Using Cellcrypt, individuals and organisations can confidently communicate, knowing their messages and calls are protected against these common and accessible mobile threats. This comprehensive approach ensures that even low-cost, widely available attack methods are effectively neutralised.

bottom of page