Back to 2G Hacking
2G Hacking

Downgrade Attacks

Downgrade attacks force mobile devices to connect to older, less secure network technologies (2G) where encryption is weaker and easier to break, enabling various attack vectors.

Attack Flow Diagram
Step-by-step visualization of the attack process
Downgrade Attacks Attack Flow
Impact
  • Exposure to weak 2G encryption
  • Vulnerability to IMSI catcher attacks
  • Increased susceptibility to interception
  • Bypass of modern security features
  • Denial of high-speed data services
Attack Vectors
  • Selective jamming of 3G/4G/5G frequencies
  • Fake BTS advertising only 2G support
  • Protocol manipulation to force downgrade
  • Exploiting automatic network selection
  • Combining with IMSI catcher for full attack chain
Attack Methodology
  1. 1Deploy jamming equipment for 3G/4G/5G bands
  2. 2Set up fake 2G BTS with strong signal
  3. 3Wait for devices to downgrade automatically
  4. 4Capture connections on 2G network
  5. 5Execute secondary attacks (IMSI catching, interception)
  6. 6Maintain downgrade to prevent re-upgrade
Mitigation Strategies
  • Disable 2G in device settings (LTE-only mode)
  • Use network selection to prefer 4G/5G
  • Monitor for unexpected network changes
  • Implement network-level downgrade detection
  • Use encrypted communication apps regardless of network
  • Deploy 2G sunset policies in networks
Real-World Examples
  • IMSI catcher operations forcing 2G connection
  • Surveillance operations at public events
  • Border control and customs enforcement
  • Corporate espionage at conferences
  • Government surveillance programs