Understanding How IMSI-Catchers Exploit Cell Networks

Very comprehensive article to understand how IMSI-Catchers Exploit Cell Networks.

You’ve probably heard of Stingrays or IMSI-catchers, which belong to the broader category of “Cell Site Simulators” (CSSs).

These devices let their operators “snoop” on the phone usage of people nearby.

There’s a lot of confusion about what CSSs are actually capable of, and different groups - from activists to policy makers to technologists - understand them differently.

It is not easy to find details of what’s going on with “IMSI-catcher” type cell network attacks. And this article try to bridge that gap, and to make accessible the technical inner workings of CSSs, or rather, the details of the kind of attacks they might rely on.

For example, what are the different kinds of location tracking attacks and how do they actually work?

Another example: it’s also widely believed that CSSs are capable of communication interception, but what are the known limits around cell network communication interception and how does that actually work?

See all details in the article: :point_down:

Hi AlexB Thanks for your information. Please tell me that when the IMSI-Catcher is acting as Machine in the Middle (MitM) between MS and the base station, it detects the device or MS model, among other information about the device. Please tell me the scenario in which it gets the MS model.

Before starting to talk about IMSI Catcher, we need to understand what is the IMSI, its importance, and its structure. Based on this, we will discuss the IMSI catcher. So let’s GO :slightly_smiling_face:

IMSI Catcher

Fraudulent Messages: How the “Scam Car” Operated in São Paulo

A sophisticated fraud scheme was dismantled in São Paulo, where a man was arrested for operating a vehicle equipped with advanced technology to commit bank scams.

The car, a white Jeep Renegade, sent fake bank SMS messages to nearby phones, directing victims to phishing sites to steal personal and banking information.

The driver, paid R$1,000 per week, used a computer and antenna in the car to target victims in affluent neighborhoods. Authorities are seeking more victims and accomplices involved in the scheme.

image

More details in this video (in Portuguese*): :point_right: https://www.youtube.com/watch?v=LIMEFGFhZcM

* You can view closed captions in your language doing this: How to Enable Translated Subtitles on YouTube (in Your Language)

Update: This is the device they used :point_right: IMSI Catcher | IMEI Catcher | TMSI Catcher | GSM Catcher | 2G Catcher | 3G Catcher | 4G Catcher | UMTS Catcher | LTE Catcher | SMS Sender | IMEI, IMSI, TMSI identifier collection systems

1 Like