I wrote an article before about ” What is GT (Global Title)? Why Do We Need It?” What is Global Title Leasing? GT leasing is the practice of a mobile operator entering into a commercial arrangement to allow another operator to use one or more of its GTS. Lessees obtain access to the global SS7 […]


Last weekend, by coincidence, I found a fraud story related to the Telecom domain called “Spoofing CLI” or “Calling Line Identification (CLI) spoofing.” which is a technique used in mobile network fraud where the caller purposefully fakes the phone number or the caller ID information that appears on the recipient’s device. CLI is the phone […]

The SS7 network was once considered an environment that controls users’ access to network-based content and services, allowing licensed mobile operators to access customer data. However, many unlicensed entities currently have access to the SS7 network, taking advantage of the low security of this protocol. Consequently, more businesses and individuals with direct access to the […]

Many types of firewalls are often categorized by system protection, form factor, network placement, and data filtering method. Regarding 5G, Firewalls protect different network layers — especially in the Service-Based Architecture (SBA) of 5G Core. This includes: Perimeter Firewall (Traditional Role) It protects 5G infrastructure from external threats and is deployed at the edge of […]

🔐 The SS7 network was once considered an environment that controls users’ access to network-based content and services, allowing licensed mobile operators to access customer data. However, many unlicensed entities currently have access to the SS7 network, taking advantage of its low security. Consequently, more businesses and individuals with direct access to the network, as […]

👉Previous generations relied on the SS7 and Diameter protocols. The 5G network core is built on well-known Internet protocols such as HTTP and TLS. 👉 Security threats associated with 3G and 4G will remain after 5G reaches the public and heavily influence NR deployments. However, the main challenge with 5G is that Internet technologies are […]

📃5Ghoul is the name given to a set of 14 newly discovered vulnerabilities in Qualcomm and MediaTek 5G modems, disclosed in December 2023 by researchers from the Singapore University of Technology and Design (SUTD). These vulnerabilities affect hundreds of smartphone models and allow cyberattacks on 5G-enabled devices. 👉5GHoul = 5G + Ghoul, an Arabic mythology. […]

The journey started with 2G and 3G, where Voice was the leading service, and the main protocols were SS7 and SIGTRAN (Signaling Transport). At this time, the primary Firewalls are: SS7/SIGTRAN Firewall: Its functions are national/international interconnect protection with different policies and detection patterns in real-time. GTP Firewall: The functions are GTP Packet binary checks […]

SS7 was never designed with security in mind, so it has always been open to internal and external threats. S7 Firewall is a smart, rules-based system that can monitor, create rules, and enforce policies to prevent or mitigate the effects of these attacks. It is essential for safeguarding your network and subscribers. The GSMA’s FS.11 […]

Currently, I see some confusion regarding 5G identification and the purpose of each one, such as which network node generates them and the subscriber’s role. I summarized the 3 identifications in one page, and here is the summary: What is SUPI? The Subscription Permanent Identifier (SUPI) is stored within the SIM. The SUPI is the […]

The IMSI is a unique number assigned to every mobile subscriber, which is stored on the SIM card and used by mobile networks to identify and authenticate users. An IMSI Catcher is a device that pretends to be a commercial Base Station (BS), tracks devices and violates subscriber privacy. Criminals or hackers may use IMSI […]