TWO SPYING CAMPAIGNS EXPLOIT TELECOM PROTOCOL FLAWS
AI DESK■ 2 MIN READ
SAT, APR 25, 2026■ AI-SUMMARIZED FROM 1 SOURCE BELOW
Citizen Lab researchers have identified two separate espionage operations exploiting known vulnerabilities in SS7 and Diameter protocols to track individuals across 2G, 3G, 4G, and 5G networks.
Security researchers at Citizen Lab have documented two distinct spying campaigns that leverage weaknesses in fundamental telecommunications infrastructure to conduct surveillance and location tracking.
The attacks target SS7 and Diameter protocols—core systems that underpin global mobile networks. SS7 has been exploited for years by both state actors and criminal groups, while Diameter vulnerabilities represent a newer attack vector affecting 4G and 5G infrastructure.
These protocols handle critical functions including call routing, messaging, and authentication across carriers worldwide. Their weaknesses allow attackers to intercept communications and pinpoint targets' locations without requiring access to devices or carrier cooperation.
The dual campaigns signal that sophisticated threat actors continue to abuse these known flaws despite years of public disclosure. The ability to track individuals across multiple network generations—from older 2G infrastructure to cutting-edge 5G—demonstrates that network security gaps persist across the entire mobile ecosystem.
Telecommunications carriers have struggled to fully patch these vulnerabilities. Widespread remediation requires significant infrastructure upgrades, and many operators have deprioritized fixes due to costs and technical complexity. Legacy systems running 2G and 3G networks remain particularly exposed.
The findings underscore a fundamental challenge in mobile security: the protocols connecting carriers internationally were designed with minimal security considerations decades ago. Retrofitting protections onto this aging infrastructure has proven difficult and incomplete.
Citizen Lab's research joins mounting evidence that location tracking via telecom vulnerabilities represents an ongoing threat to journalists, activists, and other high-value targets. The group previously documented similar campaigns by government-linked actors exploiting these same weaknesses.
Mobile network operators and regulators face pressure to accelerate security upgrades, though the global scope of telecommunications infrastructure makes coordinated improvements difficult to implement.
■ SOURCES
► Techmeme■ SUMMARY WRITTEN BY AI FROM THE LINKS ABOVE
■ MORE FROM THE SECURITY DESK
The Department of Justice has intervened in xAI's lawsuit challenging Colorado's new AI regulation law. The state law requires developers of high-risk AI systems to disclose and mitigate algorithmic discrimination risks.
6H AGO— AI Desk
A group of Discord users gained unauthorized access to Anthropic's internal project documentation known as Mythos. The breach exposed sensitive information about the AI safety company's internal operations and research.
6H AGO— AI Desk
The UK's National Cyber Security Centre has officially moved away from recommending passwords, endorsing passkeys as the more secure login method for digital services. Passkeys offer stronger protection against phishing and data breaches.
8H AGO— Industry Desk
The U.S. State Department has ordered diplomats worldwide to highlight what it characterizes as systematic intellectual property theft targeting American AI laboratories by Chinese companies.
17H AGO— AI Desk