Global Title Lease is BANNED in UK
April 26, 2025

I wrote an article before about ” What is GT (Global Title)? Why Do We Need It?” What is Global Title Leasing?  GT leasing is the practice of a mobile operator entering into a commercial arrangement to allow another operator to use one or more of its GTS. Lessees obtain access to the global SS7 […]

What is Calling Line Identification (CLI) Spoofing?
April 25, 2025

Last weekend, by coincidence, I found a fraud story related to the Telecom domain called “Spoofing CLI” or “Calling Line Identification (CLI) spoofing.” which is a technique used in mobile network fraud where the caller purposefully fakes the phone number or the caller ID information that appears on the recipient’s device. CLI is the phone […]

Common SS7 Attacks through Data Leakage
April 19, 2025

The SS7 network was once considered an environment that controls users’ access to network-based content and services, allowing licensed mobile operators to access customer data. However, many unlicensed entities currently have access to the SS7 network, taking advantage of the low security of this protocol. Consequently, more businesses and individuals with direct access to the […]

The Importance of Firewall in 5G Network
April 12, 2025

Many types of firewalls are often categorized by system protection, form factor, network placement, and data filtering method. Regarding 5G, Firewalls protect different network layers — especially in the Service-Based Architecture (SBA) of 5G Core. This includes: Perimeter Firewall (Traditional Role) It protects 5G infrastructure from external threats and is deployed at the edge of […]

Common SS7 Attacks through Data Leakage
March 29, 2025

🔐 The SS7 network was once considered an environment that controls users’ access to network-based content and services, allowing licensed mobile operators to access customer data. However, many unlicensed entities currently have access to the SS7 network, taking advantage of its low security. Consequently, more businesses and individuals with direct access to the network, as […]

Evolution of Network Core Signaling protocols
March 22, 2025

👉Previous generations relied on the SS7 and Diameter protocols. The 5G network core is built on well-known Internet protocols such as HTTP and TLS. 👉 Security threats associated with 3G and 4G will remain after 5G reaches the public and heavily influence NR deployments. However, the main challenge with 5G is that Internet technologies are […]

What is 5GHoul in 5G Security World?
March 14, 2025

📃5Ghoul is the name given to a set of 14 newly discovered vulnerabilities in Qualcomm and MediaTek 5G modems, disclosed in December 2023 by researchers from the Singapore University of Technology and Design (SUTD). These vulnerabilities affect hundreds of smartphone models and allow cyberattacks on 5G-enabled devices. 👉5GHoul = 5G + Ghoul, an Arabic mythology. […]

Network Signaling and Firewall Journey from 2G to 5G
February 18, 2025

The journey started with 2G and 3G, where Voice was the leading service, and the main protocols were SS7 and SIGTRAN (Signaling Transport). At this time, the primary Firewalls are: SS7/SIGTRAN Firewall: Its functions are national/international interconnect protection with different policies and detection patterns in real-time. GTP Firewall: The functions are GTP Packet binary checks […]

What is the importance of SS7 Firewall?
February 11, 2025

SS7 was never designed with security in mind, so it has always been open to internal and external threats. S7 Firewall is a smart, rules-based system that can monitor, create rules, and enforce policies to prevent or mitigate the effects of these attacks. It is essential for safeguarding your network and subscribers. The GSMA’s FS.11 […]

What is the difference between SUPI, SUCI and 5G-GUTI in 5G SA Networks?
January 28, 2025

Currently, I see some confusion regarding 5G identification and the purpose of each one, such as which network node generates them and the subscriber’s role. I summarized the 3 identifications in one page, and here is the summary: What is SUPI? The Subscription Permanent Identifier (SUPI) is stored within the SIM. The SUPI is the […]

What is an IMSI catcher?
January 22, 2025

The IMSI is a unique number assigned to every mobile subscriber, which is stored on the SIM card and used by mobile networks to identify and authenticate users. An IMSI Catcher is a device that pretends to be a commercial Base Station (BS), tracks devices and violates subscriber privacy. Criminals or hackers may use IMSI […]