IMSISEC IMSI Catcher Fake Cell Tower Detection

IMSISEC SECURITY 


Impersonation Attack: #IMSI
One-sided man-in-the-middle (MiM) #MiTM attack where an attacker impersonates a fake base station to a mobile device (MD). The attacker makes the MD connect to the fake base station and requests the MD to turn encryption off. This allows the attacker to eavesdrop on all mobile traffic. However, unless the attacker can also impersonate the MD to a real network, the MD will be unreachable for incoming traffic. The attacker needs knowledge of the key (Kc) to carry out this attack.

An IMSI catcher, also known as a "stingray," is a device that can intercept and track the signals of mobile phones in a certain area. It works by posing as a legitimate cell tower and tricking nearby phones into connecting to it. Once a phone is connected to the IMSI catcher, it can be used to monitor the phone's calls, texts, and other data, as well as its location. These devices can be used for a variety of purposes, including tracking individuals, intercepting communications, and gathering intelligence. However, they are controversial because they can be used to monitor the communications of innocent people without their knowledge or consent.

IMSI catchers can be used to intercept and monitor your phone's calls, texts, and internet traffic. This means that others can read or listen to your personal communications without your knowledge. These devices can also re-route or edit the data and communications sent to and from your phone. In some cases, IMSI catchers can even block your phone's service, preventing you from making or receiving calls and texts, including emergency calls. These capabilities make IMSI catchers powerful and potentially invasive tools that can be used to track and monitor individuals.

http://www.iet.unipi.it/g.dini/Teaching/sncs/lectures/handouts/13.01.GSM-and-UMTS.pdf