Close Menu
Newstech24.com
  • Home
  • News
  • Technology
  • Economy & Business
  • Sports News
What's Hot

Exposed: Shadow Trackers Secretly Hijacked Telcos to Pinpoint Your Phone Location

23/04/2026

Unprecedented Cuts: Lufthansa Axes 20,000 Short-Haul Flights as Jet Fuel Prices Soar

23/04/2026

Shade Nabs $14M: Revolutionizing Creative Video Search with AI That Understands You

23/04/2026
Facebook X (Twitter) Instagram
Thursday, April 23
Facebook X (Twitter) Instagram
Newstech24.com
  • Home
  • News
  • Technology
  • Economy & Business
  • Sports News
Newstech24.com
Home - Technology - Exposed: Shadow Trackers Secretly Hijacked Telcos to Pinpoint Your Phone Location
Technology

Exposed: Shadow Trackers Secretly Hijacked Telcos to Pinpoint Your Phone Location

By Admin23/04/2026No Comments7 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Surveillance vendors caught abusing access to telcos to track people's phone locations, researchers say
Share
Facebook Twitter LinkedIn Pinterest Email

Cyber surveillance phone tracking illustration

Key Takeaways:

  • Two sophisticated spying campaigns are actively exploiting well-known, long-standing vulnerabilities in global cellular network protocols (SS7 and Diameter) to track individuals’ locations.
  • These “ghost” surveillance vendors gain illicit access by piggybacking on legitimate telecom providers, effectively turning them into unsuspecting conduits for government-backed or commercially-driven surveillance.
  • The identified campaigns, including a covert SIM-level SMS attack (SIMjacker), represent a mere fraction of a much larger, global problem of widespread and often undetectable exploitation of telecommunications infrastructure.

Global Telecoms Under Siege: “Ghost” Vendors Exploit Network Flaws to Track Your Every Move

In a stark reminder of the pervasive threats lurking within our global communications infrastructure, a recent report by the Citizen Lab has unearthed two distinct, yet equally insidious, spying campaigns. These operations are actively leveraging well-documented weaknesses in the foundational protocols of cellular networks to pinpoint the locations of individuals, operating under the radar as “ghost” companies. The findings paint a troubling picture, suggesting that these are but a glimpse into what researchers believe is a widespread and systematic exploitation of global phone networks by surveillance vendors and their state-sponsored clients.

The Citizen Lab, a digital rights organization with a commendable track record of exposing surveillance abuses, detailed these newly identified campaigns in a comprehensive report published on Thursday. The perpetrators are not your typical cybercriminals; they are surveillance vendors who masquerade as legitimate cellular providers, piggybacking on existing network access to clandestinely obtain and exploit location data from their targets. This sophisticated deception highlights a critical vulnerability at the heart of how our phones connect and communicate.

The Vulnerable Backbone: SS7 and Diameter Exploited

At the core of these spying operations lies the continued exploitation of known architectural flaws within the very technologies that underpin our global phone networks. For years, experts have warned about the gaping security holes in Signaling System 7 (SS7), the set of protocols that served as the backbone for 2G and 3G networks. SS7’s fundamental design, lacking built-in authentication or encryption, has long been a siren call for rogue operators, allowing them to geolocate cell phones with alarming ease. Governments and surveillance tech makers have consistently exploited these vulnerabilities, turning what should be a secure communication pathway into an open door for tracking.

While the newer Diameter protocol was designed to replace SS7 for 4G and 5G communications, theoretically addressing its predecessor’s security shortcomings, the reality is far from ideal. As Citizen Lab’s report underscores, the implementation of Diameter’s enhanced protections is often inconsistent across cell providers. This creates an environment where attackers can still find avenues for exploitation, or, in many cases, simply fall back to abusing the older, more vulnerable SS7 protocol, effectively bypassing newer safeguards. The fragmented nature of global telecom security leaves billions of users exposed.

Unmasking the Conduits: Telecom Providers as “Entry Points”

A common thread binding both newly identified spy campaigns is their reliance on access to three specific telecom providers. These operators, according to the researchers, have repeatedly functioned as “the surveillance entry and transit points within the telecommunications ecosystem.” This crucial access has allowed the shadowy surveillance vendors and their government clients to “hide behind their infrastructure,” effectively anonymizing their illicit tracking activities.

The report specifically names Israeli operator 019Mobile, which was allegedly used in numerous surveillance attempts. Similarly, British provider Tango Networks U.K. is cited for facilitating surveillance activity over several years. The third implicated entity is Airtel Jersey, an operator on the Channel Island of Jersey, now under the ownership of Sure. Notably, Sure’s networks have been previously linked to surveillance campaigns, raising persistent concerns.

Techcrunch event

San Francisco, CA
|
October 13-15, 2026

In response to the allegations, Sure CEO Alistair Beak provided a statement to TechCrunch, asserting that the company “does not lease access to signalling directly or knowingly to organisations for the purposes of locating or tracking individuals, or for intercepting communications content.” Beak further clarified, “Sure acknowledges that digital services can be misused, which is why we take a number of steps to mitigate this risk. Sure has implemented several protective measures to prevent the misuse of signalling services, including monitoring and blocking inappropriate signalling. Any evidence or valid complaint relating to the misuse of Sure’s network results in the service being immediately suspended and, where malicious or inappropriate activity is confirmed following investigation, permanently terminated.”

However, the other implicated providers, 019Mobile and Tango Networks, notably did not respond to requests for comment, leaving critical questions about their roles unanswered.

Two Campaigns, Distinct Tactics, Shared Goal: Tracking ‘High Profile’ Targets

The Citizen Lab’s investigation differentiates between two primary surveillance operations, both demonstrating deep integration into the mobile signaling ecosystem.

The Persistent Multi-Year Operation

The first surveillance vendor, unnamed by Citizen Lab, orchestrated spying campaigns spanning multiple years, targeting individuals across the globe. This operation leveraged the infrastructure of various cellphone providers, leading researchers to conclude that diverse government customers were likely behind these coordinated efforts. The evidence, according to the researchers, points to “a deliberate and well-funded operation with deep integration into the mobile signaling ecosystem.”

Gary Miller, one of the lead researchers, hinted to TechCrunch that clues suggest an “Israeli-based commercial geo-intelligence provider with specialized telecom capabilities.” While the specific vendor remains unconfirmed by Citizen Lab, several Israeli companies such as Circles (now part of NSO Group), Cognyte, and Rayzone are known players in the commercial geo-intelligence market. This campaign notably employed a multi-pronged approach, first attempting to exploit SS7 flaws, and then seamlessly switching to Diameter exploitation if the initial attempts proved unsuccessful.

The Covert SIM-Level Attack (SIMjacker)

The second spy campaign utilized a different, arguably more insidious, method. This other unnamed surveillance vendor focused on sending a unique type of SMS message to a specific “high-profile” target. These are not ordinary text messages; they are specially crafted, text-based commands designed to communicate directly with the target’s SIM card, leaving no visible trace on the user’s device.

Under normal circumstances, cellular providers use these messages for innocuous network commands, such as ensuring a device remains connected. However, in this surveillance campaign, the vendor weaponized these messages, sending commands that effectively transformed the target’s phone into a discreet location tracking device. This type of attack, dubbed SIMjacker by mobile cybersecurity company Enea in 2019, demonstrates a sophisticated understanding of network protocols and SIM card functionalities.

“I’ve observed thousands of these attacks through the years, so I would say it’s a fairly common exploit that’s difficult to detect,” Miller commented. He added that these attacks appear to be “geographically-targeted, indicating that actors employing SIMjacker-style attacks likely know the countries and networks most vulnerable to them.”

Contact Us

Do you have more information about surveillance vendors that exploit cellphone networks? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or email.

Miller’s final assessment serves as a sobering warning: these two campaigns are merely the “tip of the iceberg.” “We only focused on two surveillance campaigns in a universe of millions of attacks across the globe,” he emphasized, underscoring the vast, unseen landscape of digital surveillance.

The Bottom Line

The revelations from Citizen Lab are a stark reminder that the foundational security of our global telecommunications infrastructure remains alarmingly fragile. The ability of “ghost” surveillance vendors, likely backed by state actors, to exploit decades-old vulnerabilities in SS7 and incomplete implementations of newer protocols like Diameter, poses a profound threat to individual privacy, national security, and democratic processes worldwide. As our lives become increasingly digital, relying on mobile connectivity for everything from communication to commerce, the imperative for robust, authenticated, and encrypted network protocols is no longer a technical nicety but an urgent global security mandate. Without comprehensive and consistent security upgrades across the global telecom ecosystem, the promise of secure mobile communication will continue to be undermined by a shadowy industry profiting from our vulnerabilities.

When you purchase through links in our articles, we may earn a small commission. This doesn’t affect our editorial independence.


{content}

Source: {feed_title}

Like this:

Like Loading...

Related

abusing access caught locations Peoples phone researchers Surveillance telcos Track vendors
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Admin
  • Website

Related Posts

Shade Nabs $14M: Revolutionizing Creative Video Search with AI That Understands You

23/04/2026

Tesla’s $25 Billion Master Plan: Decoding the Record Capex Investments

23/04/2026

Artemis II’s Laser Link: Paving the Way for Gigabit Space Internet from the Moon

22/04/2026
Leave A Reply Cancel Reply

Don't Miss
Technology

Exposed: Shadow Trackers Secretly Hijacked Telcos to Pinpoint Your Phone Location

By Admin23/04/20260

Key Takeaways: Two sophisticated spying campaigns are actively exploiting well-known, long-standing vulnerabilities in global cellular…

Like this:

Like Loading...

Unprecedented Cuts: Lufthansa Axes 20,000 Short-Haul Flights as Jet Fuel Prices Soar

23/04/2026

Shade Nabs $14M: Revolutionizing Creative Video Search with AI That Understands You

23/04/2026

Mystery Solved: Why the UK is Rushing New Clyde Frigates to Fill a Norwegian Naval Gap

23/04/2026

Tesla’s $25 Billion Master Plan: Decoding the Record Capex Investments

23/04/2026

Deadly Plume: Inside the West Virginia Plant Chemical Disaster

23/04/2026

Harry Kane’s Relentless Pursuit: How He’s Powering Bayern’s European Treble Charge

22/04/2026

Crypto Titan Justin Sun Ignites Legal War Against Trump Family’s Financial Powerhouse

22/04/2026

Artemis II’s Laser Link: Paving the Way for Gigabit Space Internet from the Moon

22/04/2026

Why a Raytheon Exec is Taking Charge of Space Force’s Future Arsenal

22/04/2026
Advertisement
About Us
About Us

NewsTech24 is your premier digital news destination, delivering breaking updates, in-depth analysis, and real-time coverage across sports, technology, global economics, and the Arab world. We pride ourselves on accuracy, speed, and unbiased reporting, keeping you informed 24/7. Whether it’s the latest tech innovations, market trends, sports highlights, or key developments in the Middle East—NewsTech24 bridges the gap between news and insight.

Company
  • Home
  • About Us
  • Contact Us
  • Privacy Policy
  • Disclaimer
  • Terms Of Use
Latest Posts

Exposed: Shadow Trackers Secretly Hijacked Telcos to Pinpoint Your Phone Location

23/04/2026

Unprecedented Cuts: Lufthansa Axes 20,000 Short-Haul Flights as Jet Fuel Prices Soar

23/04/2026

Shade Nabs $14M: Revolutionizing Creative Video Search with AI That Understands You

23/04/2026

Mystery Solved: Why the UK is Rushing New Clyde Frigates to Fill a Norwegian Naval Gap

23/04/2026

Tesla’s $25 Billion Master Plan: Decoding the Record Capex Investments

23/04/2026
Newstech24.com
Facebook X (Twitter) Tumblr Threads RSS
  • Home
  • News
  • Technology
  • Economy & Business
  • Sports News
© 2026

Type above and press Enter to search. Press Esc to cancel.

Powered by
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by
%d