Many people feel like their smartphones may feel like indispensable lifelines, connecting everyone everywhere in real-time, but can you trust it? I never did. As reliant as we are on these devices for everything from banking to personal communication, the GSM network, along with its successors from the 3G that emerged almost 20 years ago already, now 4 and 5G carries with it a number of critical flaws that hackers or (especially) governments can easily exploit using tools. Tools which I confirm being readily available on the dark web. We always knew about the flaws of GSM being left in place to facilitate eavesdropping. Now it’s not about just listening but using a phone to deceive or intercept information, and it’s easier than anyone thinks.
Here are some definitions. Regardless if it’s some Nokia or Ericsson brick or the newest Samsung Galaxy S30, mobile phone’s identity on the network are two crucial pieces of data: the IMSI and the IMEI.
>IMSI: (International Mobile Subscriber Identity)
This unique identifier ties a subscriber to your SIM card and mobile network, see this as the phone's IP, or a code allowing the network to recognize and authenticate the user. However, an attacker with the right tools can spoof an IMSI, essentially tricking the network into thinking they are someone else. This opens up the possibility of interception, call hijacking, or even location tracking.
>IMEI: (International Mobile Equipment Identity)
Similarly, the IMEI is a unique code that identifies your physical device. A bit like a MAC address. Just as with IMSI, software available on the dark web allows an attacker to spoof an IMEI, making it possible to assume the identity of another device, evade blacklists, or bypass security features designed to lock lost or stolen phones.
The creepy fact is that spoofing either of these identifiers isn’t theoretical; it’s shockingly easy if you manage to get the right software, although requires know-how since it’s mainly based on command line. It’s trivial to alter these identifiers and launch attacks on mobile networks. Hackers are out there exploiting these flaws, and most people don’t even realize how exposed they are.
SMS and roaming vulnerabilities with TPDUs
While many people assume that SMS is a secure form of communication, it’s actually a relic from a time when security was an afterthought. I mean I'm trying to resurrect an old pager for fun and sending ASCII codes via radio to it. The GSM standard is a bit like pagers, relies on something called Transfer Protocol Data Units (TPDU), which handle the sending and receiving of SMS messages and more. These messages pass through a series of vulnerable network components, each one a potential point of attack.
The handshake process, where the network authenticates a roaming phone, is particularly vulnerable. Hackers can intercept these signals during the handshake and manipulate them, giving them access to your phone. Once they have control over the TPDU, attackers can not only read SMS messages but also modify or send spoofed messages as if they were the legitimate user.
What’s worse is that this flaw isn’t limited to domestic attacks. When you roam, you’re more exposed because your phone relies on SS7 to communicate with foreign networks. This outdated protocol is widely known for its insecurities, allowing attackers to intercept calls, read messages, and even track a device’s location across the globe. For hackers who know how to exploit this, roaming opens up a world of potential targets.
Let’s imagine a theoretical scenario: Voice spoofing. As if the vulnerabilities in GSM and SMS systems weren’t enough, we’re now facing a new kind of threat: synthetic or altered voice attacks. Imagine a scenario where a hacker has spoofed your phone number using one of the techniques mentioned above. They then use some AI voice synthesis software to impersonate your voice or the voice of someone you know.
For example, a hacker could call your family or coworker, and using some AI-generated voice based on some samples, say something like: “Hey, it’s me. I’m in trouble and I need you to send me money. My phone is broken, so I can’t text. I'll pay you twice, you trust me bro” This type of scam is already becoming a reality with fake SMS which dumb people fall for. In fact, a friend of mine recently received a fake message that said, “Hi mom, my phone is broken, I need money.” It’s only a matter of time before these attacks become widespread. These attacks are common from Nigeria, Gabon, Mali etc. since it’s a common scam, now with the same number and a voice, I assure you 100 % of the people will fall for it if it's done right enoug.
With the ability to clone voices, fake phone numbers, and hijack SMS messages, you see where I'm going. It was not an issue a while ago but with machine learning being more and more accessible and these exploits at the fingertips of manipulative beings, it is about to happen, if not, already been used. Your phone is becoming a tool for sophisticated attackers to manipulate and deceive, and the terrifying part is that most people are completely unaware.
It’s hard to call these devices “smart.” Sure, smartphones are jack of all trades, GPS, media, gaming all that crap, but when it comes to security, they remain the same as dumb phones unless you use some enterprise's VPN or some VOIP services and messaging, a bit like those on Blackberry's BES, now there's similar solutions, even Whatsapp or Telegram. But no standard.
They operate on networks built decades ago with virtually no thought for the types of threats we can get today. Despite the introduction of newer technologies like 5G, which also have vulnerabilities since it’s essentially IP over radio, the underlying architecture remains flawed. Basically the frequencies and spectrum changed to have more bandwidth but the secu remains the same. You can have like, a banking ‘app’ that is secured as fuck yet rely on the SMS verification.