Telco Security
Back to Mobile Attacks
2G/3G Attacks

IMSI Catching

CRITICAL SEVERITY
Overview

IMSI catchers are rogue base stations that trick mobile devices into connecting to them, allowing attackers to capture International Mobile Subscriber Identity (IMSI) numbers and intercept communications.

Technical Overview

IMSI catchers exploit the trust model in 2G and 3G networks where devices automatically connect to the strongest signal without proper authentication. The device broadcasts as a legitimate cell tower with higher signal strength, forcing nearby devices to connect and reveal their IMSI during the authentication process.

Impact
Potential consequences of this attack
  • Subscriber identification and tracking
  • Call and SMS interception
  • Location tracking in real-time
  • Man-in-the-middle attacks
  • Denial of service to targeted devices
Attack Vectors
Methods used to execute this attack
  • Passive IMSI collection without user awareness
  • Active call/SMS interception through rogue base station
  • Continuous location tracking via cell tower triangulation
  • Forced downgrade to 2G for easier exploitation
  • Silent SMS for location queries
Attack Methodology
Step-by-step attack execution process
  1. 1Deploy software-defined radio (SDR) or commercial IMSI catcher
  2. 2Configure device to broadcast as legitimate cell tower
  3. 3Set higher signal strength than legitimate towers
  4. 4Wait for devices to connect automatically
  5. 5Capture IMSI during authentication handshake
  6. 6Optionally relay traffic to legitimate network for stealth
Mitigations & Defense
Protective measures and countermeasures
  • Use IMSI catcher detection apps (SnoopSnitch, Android IMSI-Catcher Detector)
  • Enable LTE-only mode to prevent 2G downgrade
  • Monitor for unusual network behavior and signal anomalies
  • Use encrypted communication apps (Signal, WhatsApp)
  • Implement network-level IMSI catcher detection systems
  • Deploy SUPI/SUCI protection in 5G networks
Real-World Examples
Known incidents and use cases
  • Law enforcement use of Stingray devices for surveillance
  • Journalist tracking during political events
  • Corporate espionage at trade shows and conferences
  • Border surveillance and immigration enforcement
  • Protest monitoring by government agencies