Skip to content

Protecting Your Devices from SMS Fraud: How Hackers are Using Fake Cell Towers

Aug 15, 2024 | Industry News

 

SMS attacks are on the rise, with recent Google announcements providing methods on how to keep your cellular Android devices safe from text message fraud. These types of cellular attacks exploit cell-site simulators, known as False Base Stations (FBS) or Stingrays, which mimic legitimate cell towers. These faulty towers can lure mobile devices to connect to them and breach privacy and security.Group-398.png

Once connected, hackers utilize "SMS Blasters" to spam phishing messages directly to smartphones, bypassing carrier networks and anti-fraud systems. This method takes advantage of weaknesses in 2G networks, downgrading connections to force unencrypted links, making it easier to distribute fraudulent SMS messages.

 

Here are some recent ways FBS Stations and Stingrays have been used to attack cellular networks:

  • Two hackers in Britain were recently arrested for building homemade antennas that flooded local residents with thousands of spam messages. These messages posed as legitimate communications from banks, health insurance companies, and other official organizations in an attempt to steal personal information.
  • In Dubai, three hackers jammed a nearby cell tower, tricking mobile devices into connecting to a fake cellular station inside their van. This allowed them to intercept call and text metadata, and possibly even the contents of the calls.
  • Police caught two hackers from Hong Kong at a Bangkok shopping mall using a portable FBS and Stingray device, posing as the telecom provider AIS. They sent fake messages to AIS customers, claiming their reward points and gift cards were expiring, and provided a fraudulent link for redemption. This link prompted users to enter personal information and credit card details, allowing the hackers to take advantage of this information.

The rapid rise of these attack methods poses a significant risk to mobile security. LOCH's AirCell detection capabilities offer advanced proactive solutions to effectively combat the misuse of cell-site simulators, such as FBS or Stingrays. By continuously monitoring cellular networks and providing real-time alerts, AirCell enables organizations to safeguard their mobile communications, prevent unauthorized interception, and protect sensitive financial data from fraudulent activities.

In an era where mobile security is crucial, LOCH's AirCell detection capabilities represent a significant advancement in the fight against cell-site simulator abuse.  Learn how to detect, assess, and prevent cellular risks.

Related Blog

| Industry News

Don’t hand it Over: Vulnerabilities in the Handover Procedure of Cellular Telecommunications

| Industry News

Leveraging Software-Defined Radios at DEFCON

| Industry News

Unveiling the Vulnerability: Pioneering Cybersecurity in a Connected World