BotBeat
...
← Back

> ▌

Citizen Lab (University of Toronto)Citizen Lab (University of Toronto)
RESEARCHCitizen Lab (University of Toronto)2026-04-23

Researchers Expose Commercial Surveillance Tools Exploiting Mobile Network Vulnerabilities in Real-World Attacks

Key Takeaways

  • ▸First documented link between real-world surveillance campaigns and mobile operator signalling infrastructure exploitation using SS7 and Diameter protocols
  • ▸Threat actors impersonated legitimate mobile operators from 17+ countries to conduct covert surveillance while evading detection and attribution
  • ▸Systemic vulnerabilities in global telecommunications infrastructure persist despite years of public reporting and FCC investigations into both SS7 and Diameter protocol security
Source:
Hacker Newshttps://cyberscoop.com/surveillance-campaigns-use-commercial-surveillance-tools-to-exploit-long-known-telecom-vulnerabilities/↗

Summary

Researchers at the University of Toronto's Citizen Lab have documented the first-ever confirmed link between real-world surveillance attack traffic and mobile operator signalling infrastructure. Two unknown threat actors deployed commercial surveillance tools to track targets by mimicking mobile phone operators' identities and exploiting long-known vulnerabilities in SS7 and Diameter protocols used in 3G, 4G, and 5G networks. The attackers leveraged operator infrastructure from at least 17 countries across Cambodia, China, Israel, Italy, Poland, Sweden, Uganda, and others to hide their activities and steer traffic through covert network pathways.

According to the Citizen Lab report, the attackers operated as "ghost operators" within the global telecom ecosystem, blending their malicious signalling traffic into the massive volume of legitimate international roaming signals. Despite repeated public warnings about these vulnerabilities, the campaigns continue unabated without regulatory consequences. The researchers were unable to definitively identify the commercial surveillance vendors or threat actors responsible, highlighting the opacity of telecommunications signalling protocols that allows bad actors to operate with impunity.

  • Commercial surveillance vendors exploit the opaque nature of telecom signalling to operate as "ghost operators" within networks, making oversight and accountability nearly impossible
CybersecurityRegulation & PolicyPrivacy & Data

Comments

Suggested

N/AN/A
INDUSTRY REPORT

Compliance Check: Open-Source AI Apps Face EU AI Act Readiness Challenges

2026-04-23
Not ApplicableNot Applicable
POLICY & REGULATION

White House Warns of 'Industrial-Scale' AI Technology Theft Efforts from China

2026-04-23
Authors GuildAuthors Guild
POLICY & REGULATION

Authors Guild Warns Publishers Against Uploading Manuscripts to Consumer AI Tools Without Permission

2026-04-23
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us