Обзор An $800 DIY setup was all it took to intercept some T-Mobile data (Updated: T-Mobile statement)

Обзор

Команда форума
Редактор
Регистрация
15 Февраль 2018
Сообщения
15 558
Лучшие ответы
0
Реакции
0
Баллы
1 295
Offline
#1


Mishaal Rahman / Android Authority


TL;DR

  • Researchers intercepted T-Mobile call and text data using an $800 off-the-shelf satellite setup.
  • Around half of the satellite links they scanned were unencrypted, including military data.
  • T-Mobile fixed the issue after being alerted in December 2024, and told us that only a limited number of cell sites in remote, low-population areas were affected.

Update: October 14, 2025 (2:00 PM ET): Following publication of the original article below, T-Mobile contacted us to provide the following statement:


“T-Mobile immediately addressed a vendor’s technical misconfiguration that affected a limited number of cell sites using geosynchronous satellite backhaul in remote, low-population areas, as identified in this research from 2024. This was not network-wide, is unrelated to our T-Satellite direct-to-cell offering, and we implemented nationwide Session Initiation Protocol (SIP) encryption for all customers to further protect signaling traffic as it travels between mobile handsets and the network core, including call set up, numbers dialed and text message content. We appreciate our collaboration with the security research community, whose work helps reinforce our ongoing commitment to protecting customer data and enhances security across the industry.”

Original article: October 14, 2025 (12:25 PM ET): In an eye-opening privacy revelation, it turns out some of the world’s most sensitive communications were far less secure than you’d hope. A team of researchers has shown that even major carriers like T-Mobile were broadcasting calls and text messages over satellites without encryption. All it took to intercept them was around $800 worth of off-the-shelf hardware.


According to a study by researchers at UC San Diego and the University of Maryland, as reported by Wired, roughly half of all geostationary satellite signals they scanned were sent unencrypted. Over the course of three years, the team, led by UCSD professor Aaron Schulman, pointed a standard satellite dish at the sky from a building in La Jolla, California, and recorded data from 39 satellites. What they found was unprotected T-Mobile phone calls and SMS messages, airline Wi-Fi activity, corporate and banking data, and even US and Mexican military communications.


Don’t want to miss the best from Android Authority?





The researchers were able to capture real T-Mobile call audio and text content, as well as metadata such as phone numbers, for more than 2,700 users. They disclosed the issue to T-Mobile in December 2024, after which the company quickly added encryption to those links. The team also intercepted traffic from other North American networks, including AT&T Mexico and Telmex, along with internal data from Walmart Mexico and the Mexican military.


While satellite TV streams have been encrypted for decades, the study found that many private and industrial satellite networks still send data in plain view, apparently assuming nobody would try to listen in. As Schulman put it, “They assumed that no one was ever going to check and scan all these satellites and see what was out there.” Emphasizing the point, he added, “They just really didn’t think anyone would look up.”


Thank you for being part of our community. Read our Comment Policy before posting.
 
Сверху Снизу