Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

For Eclipse, the $2.5 billion Cerebras win is just the beginning of realizing its physical world thesis

Elon Musk’s SpaceXAI has been hemorrhaging staff since its merger

Poppy debuts a proactive AI assistant to help you organize your digital life

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    Elon Musk’s SpaceXAI has been hemorrhaging staff since its merger

    17 May 2026

    Research repository ArXiv will ban authors for a year if they let AI do all the work

    17 May 2026

    OpenAI launches ChatGPT for personal finance, it will let you connect bank accounts

    16 May 2026

    Silicon Valley vacation land needs a new energy provider as artificial intelligence raises prices

    16 May 2026

    Runway started by helping filmmakers. Now he wants to beat Google in artificial intelligence.

    15 May 2026
  • Apps

    Poppy debuts a proactive AI assistant to help you organize your digital life

    17 May 2026

    WhatsApp adds an incognito feature to Meta AI chats

    17 May 2026

    Instagram’s new ‘Instants’ feature combines elements from Snapchat and BeReal

    16 May 2026

    How to disable Instagram’s new Instants feature and recall accidentally shared photos

    16 May 2026

    Osaurus brings both local and cloud AI models to your Mac

    15 May 2026
  • Crypto

    As crypto cools, a16z crypto raises $2.2 billion in capital

    6 May 2026

    Coinbase to lay off 14% of staff as part of broader restructuring

    5 May 2026

    British cryptographer Adam Back denies NYT report that he is Bitcoin creator Satoshi Nakamoto

    9 April 2026

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025
  • Fintech

    Venmo’s biggest makeover in years comes at a very interesting time

    11 May 2026

    Fintech startup Parker files for bankruptcy

    10 May 2026

    Robinhood’s venture fund IPO attracted 150,000+ private investors, CEO says

    7 May 2026

    PayPal says it’s “becoming a tech company again” — that’s AI

    6 May 2026

    Stripe introduces Link, a digital wallet that autonomous AI agents can also use

    1 May 2026
  • Hardware

    Users are turning to jailbreaking their older Kindles as Amazon ends support

    17 May 2026

    Cerebras raises $5.5 billion, then shares soar to $108, first huge tech IPO of 2026

    15 May 2026

    Google unveils Googlebook, a new line of laptops with native artificial intelligence

    13 May 2026

    The Instax Wide 400 takes the simplicity of instant photography and expands it, literally

    10 May 2026

    Google Unveils Fitbit Air Without Whoop-like Display

    8 May 2026
  • Media & Entertainment

    YouTube viewers watch 2 billion hours of Shorts on TV every month

    14 May 2026

    Digg is trying again, this time as an AI news aggregator

    12 May 2026

    Bravo creates unscripted mini-dramas for the Peacock app

    11 May 2026

    The hottest place for startups to strike a deal? The F1 mantra

    10 May 2026

    Netflix delays Greta Gerwig’s ‘Narnia’ for big theatrical push to 2027

    2 May 2026
  • Security

    Instructure strikes against hackers who breached it twice

    17 May 2026

    US lawmakers demand answers from Instructure after Canvas data breaches

    16 May 2026

    US orders Air Force One travelers to throw away gifts, pins and cellphones after trip to China

    16 May 2026

    A hotel check-in system left a million passports and driving licenses open for anyone to see

    15 May 2026

    A spyware researcher exposed Russian government hackers trying to break into Signal accounts

    15 May 2026
  • Startups

    Clio’s $500 million milestone comes just as Anthropic steps up to first stage

    15 May 2026

    Startup Battlefield 200 applications close on May 27

    14 May 2026

    Anduril Raises $5B, Doubles Valuation To $61B

    13 May 2026

    Korea’s biggest manufacturers support Config, TSMC robot data

    11 May 2026

    China’s Moonshot AI Raises $2B in $20B Valuation as Demand for Open Source AI Soars

    10 May 2026
  • Transportation

    Tesla Reveals Two Robotaxi Accidents With Remote Controls

    16 May 2026

    RJ Scaringe has raised more than $12 billion in three startups, and investors still want more

    16 May 2026

    Indian Uber rival Rapido raises $240 million at $3 billion valuation

    15 May 2026

    Uber to open 2 campuses in India to support product development and operations

    14 May 2026

    Rep. Jeff Bezos steps down from Slate Auto board

    14 May 2026
  • Venture

    For Eclipse, the $2.5 billion Cerebras win is just the beginning of realizing its physical world thesis

    17 May 2026

    General Catalyst posted VC rage bait and it worked, especially on a16z

    16 May 2026

    Meridian Ventures Raises $35M Fund to Back MBA-Deferred Founders

    15 May 2026

    Cerebras’ IPO earns Benchmark billions, but VC Eric Vishria almost didn’t get the meeting

    15 May 2026

    Khosla Ventures bets $10 million on Ian Crosby, whose last startup, Bench, collapsed

    14 May 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»Surveillance vendors caught abusing telecom access to track people’s phone locations, investigators say
Security

Surveillance vendors caught abusing telecom access to track people’s phone locations, investigators say

techtost.comBy techtost.com25 April 202605 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
Surveillance Vendors Caught Abusing Telecom Access To Track People's Phone
Share
Facebook Twitter LinkedIn Pinterest Email

Security researchers have uncovered two separate spying campaigns that exploit known weaknesses in the global telecommunications infrastructure to track people’s locations. Researchers say these two campaigns are likely a small snapshot of what they believe is widespread exploitation by surveillance vendors seeking access to global phone networks.

On Thursday, Citizen Lab, a digital rights organization with more than a decade of experience exposing surveillance abuses, published a new report detailing the two newly identified campaigns. The surveillance vendors behind them, which Citizen Lab did not name, operated as “ghost” companies that pretended to be legitimate mobile carriers and would block access to those networks to look for their targets’ location data.

The new findings reveal ongoing exploitation of known flaws in the technologies that underpin global telephone networks.

One of them is the insecurity of Signaling System 7, or SS7, a set of protocols for 2G and 3G networks that for years has been the backbone of how cellular networks interconnect and route subscribers’ calls and text messages around the world. Researchers and experts have long warned that governments and makers of surveillance technology can exploit vulnerabilities in SS7 to geo-locate people’s cellphones, as SS7 requires neither authentication nor encryption, leaving the door open for unscrupulous operators to abuse it.

The newer protocol, Diameter, designed for newer 4G and 5G communications, is supposed to replace SS7 and includes the security features its predecessor lacked. But as Citizen Lab points out in this report, there are still ways to exploit Diameter, as carriers don’t always implement the new protections. In some cases, attackers can still exploit the older SS7 protocol.

The two espionage campaigns have at least one thing in common: Both abused access to three specific telecommunications providers that repeatedly acted “as surveillance entry and transit points within the telecommunications ecosystem.” This access gave the surveillance vendors and their government clients behind the campaigns the ability to “hide behind their infrastructure,” as the researchers explained.

According to the report, the first is the Israeli company 019Mobile, which the researchers say was used in many surveillance attempts. British provider Tango Networks UK was also used for surveillance activity over several years, investigators say.

Techcrunch event

San Francisco, California
|
13-15 October 2026

The third mobile operator is Airtel Jersey, an operator on the Channel Island of Jersey now owned by Sure, a company whose networks have linked to previous tracking campaigns.

Certainly CEO Alistair Beak told TechCrunch that the company “does not directly or knowingly lease access to signals to organizations for the purposes of locating or tracking individuals or intercepting communications content.”

“Sure recognizes that digital services can be misused, which is why we take a number of measures to mitigate this risk. Sure has implemented many safeguards to prevent the misuse of signaling services, including monitoring and blocking inappropriate signaling,” Beak’s statement said. “Any evidence or valid complaint related to misuse of Sure’s network results in immediate suspension of service and, where malicious or inappropriate activity is confirmed after investigation, permanent termination.”

Tango Networks and 019Mobile did not respond to TechCrunch’s request for comment.

Gil Nagar, Head of IT and Security and 019Mobile, sent a letter at Citizen Lab. Nagar said the company “cannot confirm” that the alleged 019Mobile infrastructure, identified by Citizen Lab as being used by surveillance vendors, belongs to the company.

Investigators say “high-profile” people are being targeted.

According to Citizen Lab, the first surveillance vendor facilitated spying campaigns spanning several years against different targets around the world and using the infrastructure of several different mobile carriers. This led investigators to conclude that different government clients of the surveillance vendor were behind the various campaigns.

“The evidence points to a purposeful and well-funded operation with deep integration into the mobile signaling ecosystem,” the researchers wrote.

Gary Miller, one of the researchers investigating these attacks, told TechCrunch that some indications point to an “Israel-based commercial geoinformation provider with specialized telecommunications capabilities,” but did not name the tracking provider. Several Israeli companies are known to offer similar services, including Circles (later acquired by spyware maker NSO Group), Cognyte and Rayzone.

Contact us

Do you have more information about surveillance vendors that exploit mobile networks? From a non-working device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382 or via Telegram and Keybase @lorenzofb or via email.

According to Citizen Lab, the first campaign was based on trying to exploit flaws in SS7 and then switching to exploiting Diameter if those efforts failed.

The second spying campaign used different methods. In this case, the other surveillance vendor behind it — which Citizen Lab isn’t naming either — relied on sending a special type of SMS message to a specific “high-profile” target, the researchers explained.

These are text messages designed to communicate directly with the target’s SIM card without showing any trace of them to the user. Under normal circumstances, these messages are used by mobile operators to send harmless commands to their subscribers’ SIM cards used to keep a device connected to their network. However, the surveillance vendor sent commands that effectively turned the target’s phone into a location tracking device, according to the researchers. This type of attack was called SIMjacker by the mobile operator Enea in 2019.

“I’ve observed thousands of these attacks over the years, so I’d say it’s a pretty common feat that’s hard to detect,” Miller said. “However, these attacks appear to be geographically targeted, indicating that operators using SIMjacker-style attacks likely know the countries and networks most vulnerable to them.”

Miller made it clear that these two campaigns are only the tip of the iceberg. “We focused on just two tracking campaigns in a universe of millions of attacks around the world,” he said.

Updated to include 019Mobile’s responses sent to Citizen Lab.

When you purchase through links in our articles, we may earn a small commission. This does not affect our editorial independence.

abusing access caught cyber security Diameter investigators Israel location tracking locations peoples phone privacy SS7 surveillance Telecom Track Vendors
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleFrom Stage to Future: Where Are Startup Battlefield Alumni Now?
Next Article In another crazy turn for AI chips, Meta signs deal for millions of Amazon AI processors
bhanuprakash.cg
techtost.com
  • Website

Related Posts

Instructure strikes against hackers who breached it twice

17 May 2026

US lawmakers demand answers from Instructure after Canvas data breaches

16 May 2026

US orders Air Force One travelers to throw away gifts, pins and cellphones after trip to China

16 May 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

For Eclipse, the $2.5 billion Cerebras win is just the beginning of realizing its physical world thesis

17 May 2026

Elon Musk’s SpaceXAI has been hemorrhaging staff since its merger

17 May 2026

Poppy debuts a proactive AI assistant to help you organize your digital life

17 May 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

Venmo’s biggest makeover in years comes at a very interesting time

11 May 2026

Fintech startup Parker files for bankruptcy

10 May 2026

Robinhood’s venture fund IPO attracted 150,000+ private investors, CEO says

7 May 2026
Startups

Clio’s $500 million milestone comes just as Anthropic steps up to first stage

Startup Battlefield 200 applications close on May 27

Anduril Raises $5B, Doubles Valuation To $61B

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.