监控厂商被发现滥用访问电信公司的权限来追踪人们的位置。
Investigation uncovers two sophisticated telecom surveillance campaigns

原始链接: https://techcrunch.com/2026/04/23/surveillance-vendors-caught-abusing-access-to-telcos-to-track-peoples-phone-locations-researchers-say/

## 全球电信被用于广泛间谍活动 最近来自公民实验室的研究显示,有两个不同的间谍活动利用全球电信基础设施的漏洞来追踪个人的位置。这些活动很可能只是更广泛活动的一小部分,涉及监控厂商伪装成合法的蜂窝网络运营商来访问网络数据。 核心问题在于信号协议(如2G/3G网络中使用的SS7)的弱点——缺乏身份验证和加密——甚至更新的Diameter协议(4G/5G),其并非总是安全地实施。攻击者利用这些漏洞来定位手机,或者在一种情况下,直接向目标的SIM卡发送隐藏的短信指令(“SIMjacker”风格)进行追踪。 两项活动都依赖于通过三个特定电信供应商的访问:以色列运营商019Mobile、英国供应商Tango Networks U.K.和Airtel Jersey。这些供应商无意中充当了监控的“入口和中转点”。一项活动试图同时利用SS7和Diameter漏洞,而另一项则专注于有针对性的基于SIM卡的追踪。 研究人员认为,多个政府客户在这些行动背后,利用移动信号生态系统内的“蓄意且资金充足”的网络。他们强调,这些发现只是持续的、全球范围内的漏洞利用的一个小样本。

## 电信监控活动曝光 公民实验室的一项调查揭露了两次复杂的监控活动,利用了全球电信网络的漏洞。这些活动允许访问手机位置数据,可能导致在缺乏适当法律授权的情况下追踪个人。 调查指向一家“总部位于以色列的商业地理情报提供商”作为关键参与者,引发了对Circles(现为NSO Group的一部分)、Cognyte和Rayzone等公司作用的担忧。讨论帖子强调了这种数据被滥用的容易性——从跟踪到针对记者和活动家——以及电信行业内部缺乏问责制。 评论员指出,人们长期以来就意识到SS7协议的弱点,并且由于责任最小和协调挑战,缺乏修复它们的动力。人们也对电信公司的数据安全措施以及员工滥用的可能性表示担忧。该报告强调了普遍存在的监控以及数字时代隐私的侵蚀这一更广泛的问题,一些人建议需要更严格的法规和对隐私规范的重新评估。值得注意的是,公民实验室的报告链接目前返回404错误。
相关文章

原文

Security researchers have uncovered two separate spying campaigns that are abusing well-known weaknesses in the global telecoms infrastructure to track people’s locations. The researchers say these two campaigns are likely a small snapshot of what they believe to be widespread exploitation of surveillance vendors seeking access to global phone networks.

On Thursday, the Citizen Lab, a digital rights organization with more than a decade of experience exposing surveillance abuses, published a new report detailing the two newly identified campaigns. The surveillance vendors behind them, which Citizen Lab did not name, operated as “ghost” companies that pretended to be legitimate cellular providers, and would piggyback their access to those networks to look up the location data of their targets.

The new findings reveal continued exploitation of known flaws in the technologies that underpin the global phone networks. 

One of them is the insecurity of Signaling System 7, or SS7, a set of protocols for 2G and 3G networks that for years has been the backbone of how cellular networks connect to each other and route subscribers’ calls and text messages around the world. Researchers and experts have long warned that governments and surveillance tech makers can exploit vulnerabilities in SS7 to geolocate individuals’ cell phones, as SS7 does not require authentication nor encryption, leaving the door open for rogue operators to abuse it. 

The newer protocol, Diameter, designed for newer 4G and 5G communications, is supposed to replace SS7 and includes the lacking security features of its predecessor. But as the Citizen Lab highlights in this report, there are still ways to exploit Diameter, as cell providers do not always implement the new protections. In some cases, attackers can still fall back to exploiting the older SS7 protocol.

The two spy campaigns have at least one thing in common: Both abused access to three specific telecom providers that repeatedly acted “as the surveillance entry and transit points within the telecommunications ecosystem.” This access gave the surveillance vendors and their government customers behind the campaigns the ability to “hide behind their infrastructure,” as the researchers explained. 

According to the report, the first one is Israeli operator 019Mobile, which researchers said was used in several surveillance attempts. British provider Tango Networks U.K. was also used for surveillance activity over several years, the researchers say.

Techcrunch event

San Francisco, CA | October 13-15, 2026

The third cellphone provider, Airtel Jersey, an operator on the Channel Island of Jersey now owned by Sure, a company whose networks have been linked to prior surveillance campaigns.

Sure CEO Alistair Beak told TechCrunch that the company “does not lease access to signalling directly or knowingly to organisations for the purposes of locating or tracking individuals, or for intercepting communications content.” 

“Sure acknowledges that digital services can be misused, which is why we take a number of steps to mitigate this risk. Sure has implemented several protective measures to prevent the misuse of signalling services, including monitoring and blocking inappropriate signalling,” read Beak’s statement. “Any evidence or valid complaint relating to the misuse of Sure’s network results in the service being immediately suspended and, where malicious or inappropriate activity is confirmed following investigation, permanently terminated.”

019Mobile and Tango Networks did not respond to a request for comment. 

According to the Citizen Lab, the first surveillance vendor facilitated spying campaigns spanning several years against different targets all over the world, and using the infrastructure of several different cellphone providers. This led researchers to conclude that different government customers of the surveillance vendor were behind the various campaigns.  

“The evidence shows a deliberate and well-funded operation with deep integration into the mobile signaling ecosystem,” the researchers wrote. 

Gary Miller, one of the researchers who investigated these attacks, told TechCrunch that some clues point to an “Israeli-based commercial geo-intelligence provider with specialized telecom capabilities,” but did not name the surveillance provider. Several Israeli companies are known to offer similar services, such as Circles (later acquired by spyware maker NSO Group), Cognyte, and Rayzone. 

Contact Us

Do you have more information about surveillance vendors that exploit cellphone networks? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or email.

According to the Citizen Lab, the first campaign relied on trying to abuse flaws in SS7, and then switching to exploiting Diameter if those attempts failed.  

The second spy campaign used different methods. In this case, the other surveillance vendor  behind it — Citizen Lab is not naming, either — relied on sending a special type of SMS message to one specific “high-profile” target, as the researchers explained. 

These are text-based messages designed to communicate directly with the target’s SIM card, without showing any trace of them to the user. Under normal circumstances, these messages are used by cellphone providers to send innocuous commands to their subscribers’ SIM cards used for keeping a device connected to their network. But the surveillance vendor instead sent commands that essentially turned the target’s phone into a location tracking device, according to the researchers. This type of attack was dubbed SIMjacker by mobile cybersecurity company Enea in 2019.

“I’ve observed thousands of these attacks through the years, so I would say it’s a fairly common exploit that’s difficult to detect,” said Miller. “However, these attacks appear to be geographically-targeted, indicating that actors employing SIMjacker-style attacks likely know the countries and networks most vulnerable to them.”

Miller made it clear that these two campaigns are just the tip of the iceberg. “We only focused on two surveillance campaigns in a universe of millions of attacks across the globe,” he said.

When you purchase through links in our articles, we may earn a small commission. This doesn’t affect our editorial independence.

联系我们 contact @ memedata.com