EFF senior technologist Cooper Quintin, along with Wired reporters, analyzed wireless signal data from the incident and found suspicious activity consistent with a cell phone site simulator, a tool used to intercept cell phone signals.

The investigation revealed that a device migrated to a new tower, received a request for its IMSI number, and then “logged out” and was disconnected; This was uncommon behavior in regular base stations. This raised strong suspicions that this was a man-in-the-middle attack.

Mobile site simulators like Stingray can collect sensitive information like location data and call logs by tricking phones into thinking the simulator is a legitimate tower. It is not clear who used the device.

Source: Ferra

Previous articleSpaceX lowered the orbit of Starlink satellites to avoid interfering with scientists Science and technology January 12, 2025, 09:45
Next articleAmericans began to monitor TikTok’s fate in the country more actively. AttachmentsJanuary 12, 2025, 11:15
I am a professional journalist and content creator with extensive experience writing for news websites. I currently work as an author at Gadget Onus, where I specialize in covering hot news topics. My written pieces have been published on some of the biggest media outlets around the world, including The Guardian and BBC News.

LEAVE A REPLY

Please enter your comment!
Please enter your name here