EFF senior technologist Cooper Quintin, along with Wired reporters, analyzed wireless signal data from the incident and found suspicious activity consistent with a cell phone site simulator, a tool used to intercept cell phone signals.
The investigation revealed that a device migrated to a new tower, received a request for its IMSI number, and then “logged out” and was disconnected; This was uncommon behavior in regular base stations. This raised strong suspicions that this was a man-in-the-middle attack.
Mobile site simulators like Stingray can collect sensitive information like location data and call logs by tricking phones into thinking the simulator is a legitimate tower. It is not clear who used the device.
Source: Ferra

I am a professional journalist and content creator with extensive experience writing for news websites. I currently work as an author at Gadget Onus, where I specialize in covering hot news topics. My written pieces have been published on some of the biggest media outlets around the world, including The Guardian and BBC News.