#imsicatcher — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #imsicatcher, aggregated by home.social.
-
Jeżdżą po mieście i włamują się na telefony korzystając z SMS Blasterów ukrytych w bagażnikach
Wyobraź sobie, że stoisz w korku. Albo spacerujesz po chodniku z psem. Tymczasem w samochodzie na światłach siedzi typ, który uśmiecha się i w tym samym momencie zarabia tysiące złotych. Bo w bagażniku samochodu ma “SMS Blastera“. Tym sprzętem przejmuje łączność Twojego smartfona i wstrzuje Ci SMS-a z informacją od Twojego banku. A facetowi w garniturze, który właśnie Cię minął, SMS-a o “niezapłaconej paczce”. Co najgorsze, przed tym atakiem nie obronią Cię żadne filtry po stronie operatora…
SMS Blaster wykorzystywany przez gang w Turcji
SMS Blastery w natarciu
W ciągu ostatnich miesięcy służby w różnych częściach świata zatrzymały osoby korzystające z tzw. “SMS Blasterów” ukrytych w samochodach. SMS Blastery to odpowiednio skonfigurowane IMSI Catchery, czyli fałszywe stacje BTS, które przepinają na siebie sygnał telefonii komórkowej okolicznych smartfonów, a następnie wysyłają na te smartfony wiarygodnie wyglądające SMS-y podszywające się pod różne instytucje.
Efekt? Taki sam jak przy spoofingu SMS, ale atak tego typu nie jest możliwy do odfiltrowania przez operatorów, bo nie przechodzi przez ich infrastrukturę. Jest też dodatkowe zagrożenie wynikające z tego ataku — ofiary nie mogą korzystać z połączeń alarmowych, co może skończyć się tragiczniej niż strata pieniędzy.
Jak to działa i dlaczego jest groźne?
Ten atak w brutalny sposób wykorzystuje to, jak zaprojektowane są sieci komórkowe. Telefony komórkowe automatycznie łączą się z nadajnikiem o najsilniejszym sygnale. Gdy “SMS Blaster” znajdzie się blisko Ciebie — na przykład w stojącym obok na światłach aucie — Twój telefon bez Twojej wiedzy [...]#Banki #BTS #IMSICatcher #Jaskółka #Kanada #MITM #Phishing #SMSBlaster #Smsishing #TelefoniaKomórkowa #Toronto
https://niebezpiecznik.pl/post/sms-blaster-imsi-catcher-bts-spoofing/
-
ever heard of a stingray? it's an IMSI catcher, and its how law enforcement tracks protesters. #imsicatcher #privacy #blog #newpost #hacking #surveillance #activism #stingray #osint #opsec
-
Warning! A lot of acronyms ahead! Welcome to Telco land...
TLDR: Anyone with the "fake cellphone tower" device mentioned can track BOTH your SIMcard, AND your mobile device.
So you better leave them at home, or bring a burner1 phone with a burner1 SIM.
IMSI vs IMEI
The "#IMSI" in #IMSIcatcher is an identifying number tied to your SIM(card).
But what #IMSIcatchers can also capture is your device's #IMEI 2.
The supposed purpose of an IMEI is stated clearly in the official documentation:
"The main objective is to be able to take measures against the use of stolen equipment or against equipment of which the use in the PLMN3 can not or no longer be tolerated for technical reasons."4
Mobile device manufacturers are obligated to produce device unique IMEI's:
"The IMEI shall be unique and shall not be changed after the ME’s [Mobile Equipment] final production process. It shall resist tampering, i.e. manipulation and change, by any means (e.g. physical, electrical and software)."4
IMSIcatcher vendors state their equipment can also capture IMEIs.5 6
So, every phone in the neighborhood of IMSIcatchers in use by law enforcement, are certainly in a batch of "to be tracked".
Did I mention law enforcement (through a legal warrant, they'll need help from mobile operators) can track phones based on IMEI alone (so even if you remove the SIM)? Yes, I believe I did.
PS: a phone connecting to or connected to an IMSIcatcher, is not on the network. Not being able to reach emergency services could lead to physical harm, including death. Just saying.
1 https://ssd.eff.org/glossary/burner-phone
2 International Mobile Station Equipment Identity
3 Public Land Mobile Network: wireless communication services offered by a specific operator in a specific country.
4 https://www.3gpp.org/ftp/Specs/archive/22_series/22.016/
-
Warning! A lot of acronyms ahead! Welcome to Telco land...
TLDR: Anyone with the "fake cellphone tower" device mentioned can track BOTH your SIMcard, AND your mobile device.
So you better leave them at home, or bring a burner1 phone with a burner1 SIM.
IMSI vs IMEI
The "#IMSI" in #IMSIcatcher is an identifying number tied to your SIM(card).
But what #IMSIcatchers can also capture is your device's #IMEI 2.
The supposed purpose of an IMEI is stated clearly in the official documentation:
"The main objective is to be able to take measures against the use of stolen equipment or against equipment of which the use in the PLMN3 can not or no longer be tolerated for technical reasons."4
Mobile device manufacturers are obligated to produce device unique IMEI's:
"The IMEI shall be unique and shall not be changed after the ME’s [Mobile Equipment] final production process. It shall resist tampering, i.e. manipulation and change, by any means (e.g. physical, electrical and software)."4
IMSIcatcher vendors state their equipment can also capture IMEIs.5 6
So, every phone in the neighborhood of IMSIcatchers in use by law enforcement, are certainly in a batch of "to be tracked".
Did I mention law enforcement (through a legal warrant, they'll need help from mobile operators) can track phones based on IMEI alone (so even if you remove the SIM)? Yes, I believe I did.
PS: a phone connecting to or connected to an IMSIcatcher, is not on the network. Not being able to reach emergency services could lead to physical harm, including death. Just saying.
1 https://ssd.eff.org/glossary/burner-phone
2 International Mobile Station Equipment Identity
3 Public Land Mobile Network: wireless communication services offered by a specific operator in a specific country.
4 https://www.3gpp.org/ftp/Specs/archive/22_series/22.016/
-
Warning! A lot of acronyms ahead! Welcome to Telco land...
TLDR: Anyone with the "fake cellphone tower" device mentioned can track BOTH your SIMcard, AND your mobile device.
So you better leave them at home, or bring a burner1 phone with a burner1 SIM.
IMSI vs IMEI
The "#IMSI" in #IMSIcatcher is an identifying number tied to your SIM(card).
But what #IMSIcatchers can also capture is your device's #IMEI 2.
The supposed purpose of an IMEI is stated clearly in the official documentation:
"The main objective is to be able to take measures against the use of stolen equipment or against equipment of which the use in the PLMN3 can not or no longer be tolerated for technical reasons."4
Mobile device manufacturers are obligated to produce device unique IMEI's:
"The IMEI shall be unique and shall not be changed after the ME’s [Mobile Equipment] final production process. It shall resist tampering, i.e. manipulation and change, by any means (e.g. physical, electrical and software)."4
IMSIcatcher vendors state their equipment can also capture IMEIs.5 6
So, every phone in the neighborhood of IMSIcatchers in use by law enforcement, are certainly in a batch of "to be tracked".
Did I mention law enforcement (through a legal warrant, they'll need help from mobile operators) can track phones based on IMEI alone (so even if you remove the SIM)? Yes, I believe I did.
PS: a phone connecting to or connected to an IMSIcatcher, is not on the network. Not being able to reach emergency services could lead to physical harm, including death. Just saying.
1 https://ssd.eff.org/glossary/burner-phone
2 International Mobile Station Equipment Identity
3 Public Land Mobile Network: wireless communication services offered by a specific operator in a specific country.
4 https://www.3gpp.org/ftp/Specs/archive/22_series/22.016/
-
Warning! A lot of acronyms ahead! Welcome to Telco land...
TLDR: Anyone with the "fake cellphone tower" device mentioned can track BOTH your SIMcard, AND your mobile device.
So you better leave them at home, or bring a burner1 phone with a burner1 SIM.
IMSI vs IMEI
The "#IMSI" in #IMSIcatcher is an identifying number tied to your SIM(card).
But what #IMSIcatchers can also capture is your device's #IMEI 2.
The supposed purpose of an IMEI is stated clearly in the official documentation:
"The main objective is to be able to take measures against the use of stolen equipment or against equipment of which the use in the PLMN3 can not or no longer be tolerated for technical reasons."4
Mobile device manufacturers are obligated to produce device unique IMEI's:
"The IMEI shall be unique and shall not be changed after the ME’s [Mobile Equipment] final production process. It shall resist tampering, i.e. manipulation and change, by any means (e.g. physical, electrical and software)."4
IMSIcatcher vendors state their equipment can also capture IMEIs.5 6
So, every phone in the neighborhood of IMSIcatchers in use by law enforcement, are certainly in a batch of "to be tracked".
Did I mention law enforcement (through a legal warrant, they'll need help from mobile operators) can track phones based on IMEI alone (so even if you remove the SIM)? Yes, I believe I did.
PS: a phone connecting to or connected to an IMSIcatcher, is not on the network. Not being able to reach emergency services could lead to physical harm, including death. Just saying.
1 https://ssd.eff.org/glossary/burner-phone
2 International Mobile Station Equipment Identity
3 Public Land Mobile Network: wireless communication services offered by a specific operator in a specific country.
4 https://www.3gpp.org/ftp/Specs/archive/22_series/22.016/
-
Warning! A lot of acronyms ahead! Welcome to Telco land...
TLDR: Anyone with the "fake cellphone tower" device mentioned can track BOTH your SIMcard, AND your mobile device.
So you better leave them at home, or bring a burner1 phone with a burner1 SIM.
IMSI vs IMEI
The "#IMSI" in #IMSIcatcher is an identifying number tied to your SIM(card).
But what #IMSIcatchers can also capture is your device's #IMEI 2.
The supposed purpose of an IMEI is stated clearly in the official documentation:
"The main objective is to be able to take measures against the use of stolen equipment or against equipment of which the use in the PLMN3 can not or no longer be tolerated for technical reasons."4
Mobile device manufacturers are obligated to produce device unique IMEI's:
"The IMEI shall be unique and shall not be changed after the ME’s [Mobile Equipment] final production process. It shall resist tampering, i.e. manipulation and change, by any means (e.g. physical, electrical and software)."4
IMSIcatcher vendors state their equipment can also capture IMEIs.5 6
So, every phone in the neighborhood of IMSIcatchers in use by law enforcement, are certainly in a batch of "to be tracked".
Did I mention law enforcement (through a legal warrant, they'll need help from mobile operators) can track phones based on IMEI alone (so even if you remove the SIM)? Yes, I believe I did.
PS: a phone connecting to or connected to an IMSIcatcher, is not on the network. Not being able to reach emergency services could lead to physical harm, including death. Just saying.
1 https://ssd.eff.org/glossary/burner-phone
2 International Mobile Station Equipment Identity
3 Public Land Mobile Network: wireless communication services offered by a specific operator in a specific country.
4 https://www.3gpp.org/ftp/Specs/archive/22_series/22.016/
-
Rayhunter Sniffs Out Stingrays for $30 - These days, if you’re walking around with a cellphone, you’ve basically fitted an ... - https://hackaday.com/2025/05/05/rayhunter-sniffs-out-stingrays-for-30/ #cellphonehacks #securityhacks #softwarehacks #imsicatcher #rayhunter #cellular #stingray #phone #imsi
-
Dringende Sehempfehlung für alle, die ein #Handy haben: der Vortrag »Staatliche Überwachung: Erfahrungen und Beispiele aus der Praxis« von Marco B. bei den #Datenspuren2024.
https://media.ccc.de/v/ds24-467-staatliche-berwachung-erfahrungen-und-beispiele-aus-der-praxis
Was ich noch gar nicht kannte, war https://www.notrace.how.
Weitere Tipps bekommt ihr auf dieser Instanz bei @smartphone.Wenn Staatsanwaltschaften #Klimaaktivismus für Terrorismus und #Antifaschismus für staatsfeindlich halten, müssen sich auch rechtschaffene Bürger:innen gegen staatliche Überwachung wehren. Manche Polizist:innen geben jetzt schon eure Daten an Nazis weiter. Verschlüsselt alle Daten, sonst werden sie spätestens nach der nächsten NS-Machtergreifung gegen euch verwendet!
#Datenspuren24 #LetzteGeneration #EndeGelände #Hausdurchsuchung #PolizeiTerror #Antifa #TKÜ #Staatstrojaner #Pegasus #Smartphone #CryptoParty #Cellebrite #GrapheneOS #Android #Apple #ITsec #opsec #imsicatcher #polizei #Überwachung #Tracking #Tracing #Datensicherheit