SlideShare a Scribd company logo
The insights shared in this document are drawn from the actual data collected by
SecurityGen team across many MNOs (Mobile Network Operators) in the region.
SIGNALLING THREATS IN
LATAM
LATAM Scenario
The number of attacks does NOT depend on the size of the country/Mobile Operator.
The volume of attacks received by an MNO depends on how vulnerable is the
operator’s signaling infrastructure and the efficiency of its protective systems, when
available.
Attackers will always take the easier path. Unless there is a special contract with specific
targets, they will focus on opportunities for a fast cashflow.
Hard Truths
secgen.com
NPN
Some Numbers
NPN
Attack Categories
The most common exploited threats were:
NPN
Considerations
The largest category - Fraud - mostly comprises of such attacks against MNOs as
grey route and SMS and Billing evasion.
Data breach mainly was against subscribers and included IMSI, location data and
interception of calls and SMS. In many of those events, cross-protocol attacks
were performed either to facilitate or obfuscate the main attack.
A minor part in terms of volume, the Operator data breach is still much relevant if
you consider the possibility of network mapping and posterior Denial-of-service.
Data Breach
Subscriber DoS
Fraud
Operators received from 60 to over 100 thousand attacks daily.
MNOs without a well configured firewall protection or not even STP and DEA protection,
had an average of 70% of incoming attacks being successfully responded by the
network. Due to nature of some attacks (like sweeping), this is expected.
When protective measures are executed on the network correctly, successful
attacks drop to less than 1%.
Data Breach
Subscriber DoS
Fraud
secgen.com
UK | Italy | Czech Republic | Brazil | Egypt
India | South Korea | Japan | Malaysia | UAE
Email: contact@secgen.com
Website: www.secgen.com
SecurityGen is a global company focused on
cybersecurity for telecom security. We deliver
a solid security foundation to drive secure
telecom digital transformations and ensure
safe and robust network operations.
Our extensive product and service portfolio
provides complete protection against existing
and advanced telecom security threats.
About SecurityGen Connect With Us
Subscriber DoS is not evenly spread worldwide but is unfortunately detected in
some countries in the region. If you assume part of the subscribers is IoT
equipment used in utilities and security, DoS attacks are considered significant
threats to the general public.
Want a better understanding of how those threats affect your Operator and how to
Identify, Detect and Protect the Network and Subscribers?
Just reach out for a clarification session at contact@secgen.com, and we at
SecurityGen will be happy to guide you through a completely new approach to
securing your Network and Subscribers!

More Related Content

PDF
SS7: 2G/3G's weakest link
PDF
Toward Continuous Cybersecurity with Network Automation
PDF
Toward Continuous Cybersecurity With Network Automation
PDF
PDF
Prevention based mechanism for attacks in Network Security
PDF
cyber security guidelines.pdf
PPTX
Cyber security
SS7: 2G/3G's weakest link
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity With Network Automation
Prevention based mechanism for attacks in Network Security
cyber security guidelines.pdf
Cyber security

Similar to SecurityGen-Signaling-Threats-in-Latam.pdf (20)

PPTX
Network Security of Data Protection
PDF
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
PDF
Unleashing the Power of Telecom Network Security.pdf
PDF
Strengthening Your Network Against Future Incidents with SecurityGen
PDF
IBM Security Services
PDF
SecurityGen-whitepaper-gtp-firewall- security 5G.pdf
PDF
SecurityGen whitepaper GTP vulnerabilities - A cause for concern in 5G and LT...
PDF
Secure Your Network with Confidence Understanding - GTP Protocols by Security...
PDF
SecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdf
PDF
Protect Your Network_ Invest in Telco Security Solutions Today
PDF
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
PDF
2015 Global Threat Intelligence Report Executive Summary | NTT i3
PDF
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
PDF
Network Security Research Paper
PDF
How to avoid cyber security attacks in 2024 - CyberHive.pdf
PDF
5 Essential Network Security Strategies to Defend Against Modern Cyberattacks...
PDF
Survey of apt and other attacks with reliable security schemes in manet
PDF
AGEOS Infrastructure Cyber Security White Paper
PDF
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Network Security of Data Protection
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Unleashing the Power of Telecom Network Security.pdf
Strengthening Your Network Against Future Incidents with SecurityGen
IBM Security Services
SecurityGen-whitepaper-gtp-firewall- security 5G.pdf
SecurityGen whitepaper GTP vulnerabilities - A cause for concern in 5G and LT...
Secure Your Network with Confidence Understanding - GTP Protocols by Security...
SecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdf
Protect Your Network_ Invest in Telco Security Solutions Today
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...
2015 Global Threat Intelligence Report Executive Summary | NTT i3
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
Network Security Research Paper
How to avoid cyber security attacks in 2024 - CyberHive.pdf
5 Essential Network Security Strategies to Defend Against Modern Cyberattacks...
Survey of apt and other attacks with reliable security schemes in manet
AGEOS Infrastructure Cyber Security White Paper
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...

More from Security Gen (20)

PDF
Unlock the Future: SecurityGen's 5G Standalone Solutions
PDF
Address 5G Vulnerabilities with SecurityGen's Expert Solution
PDF
SecurityGen-IDS-enhance-your-signalling-security (1).pdf
PDF
SecurityGen: Your Trusted Partner for Unrivaled Telecom Security
PDF
SecurityGen - Your Shield Against Cyber Threats
PDF
SecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdf
PDF
Why the VoLTE Rush?
PDF
Best 5G Security Solutions - SecurityGen
PDF
Shield Your Network: Prevent DDoS Attacks with SecurityGen
PDF
Fake BTS Network Vulnerabilities
PDF
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
PDF
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
PDF
SecurityGen 5G Cyber-security Lab - A holistic 5G view for building a safe & ...
PDF
ACE: ARTIFICIAL CYBERSECURITY EXPERT
PDF
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
PDF
5G Security Program Datasheet (2).pdf
PDF
5G Security Program -Case Studies
PDF
IDS: INTRUSION DETECTION SYSTEM PLATFORM
PDF
NGFW - An Updated Overview
PDF
Securing the 5G growth story with NFVi (1).pdf
Unlock the Future: SecurityGen's 5G Standalone Solutions
Address 5G Vulnerabilities with SecurityGen's Expert Solution
SecurityGen-IDS-enhance-your-signalling-security (1).pdf
SecurityGen: Your Trusted Partner for Unrivaled Telecom Security
SecurityGen - Your Shield Against Cyber Threats
SecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdf
Why the VoLTE Rush?
Best 5G Security Solutions - SecurityGen
Shield Your Network: Prevent DDoS Attacks with SecurityGen
Fake BTS Network Vulnerabilities
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
SecurityGen 5G Cyber-security Lab - A holistic 5G view for building a safe & ...
ACE: ARTIFICIAL CYBERSECURITY EXPERT
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
5G Security Program Datasheet (2).pdf
5G Security Program -Case Studies
IDS: INTRUSION DETECTION SYSTEM PLATFORM
NGFW - An Updated Overview
Securing the 5G growth story with NFVi (1).pdf

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Cloud computing and distributed systems.
PDF
Empathic Computing: Creating Shared Understanding
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Machine learning based COVID-19 study performance prediction
PDF
KodekX | Application Modernization Development
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Approach and Philosophy of On baking technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
cuic standard and advanced reporting.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Digital-Transformation-Roadmap-for-Companies.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
MYSQL Presentation for SQL database connectivity
Understanding_Digital_Forensics_Presentation.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Cloud computing and distributed systems.
Empathic Computing: Creating Shared Understanding
CIFDAQ's Market Insight: SEC Turns Pro Crypto
20250228 LYD VKU AI Blended-Learning.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Mobile App Security Testing_ A Comprehensive Guide.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Machine learning based COVID-19 study performance prediction
KodekX | Application Modernization Development
Encapsulation_ Review paper, used for researhc scholars
Approach and Philosophy of On baking technology
Reach Out and Touch Someone: Haptics and Empathic Computing

SecurityGen-Signaling-Threats-in-Latam.pdf

  • 1. The insights shared in this document are drawn from the actual data collected by SecurityGen team across many MNOs (Mobile Network Operators) in the region. SIGNALLING THREATS IN LATAM LATAM Scenario The number of attacks does NOT depend on the size of the country/Mobile Operator. The volume of attacks received by an MNO depends on how vulnerable is the operator’s signaling infrastructure and the efficiency of its protective systems, when available. Attackers will always take the easier path. Unless there is a special contract with specific targets, they will focus on opportunities for a fast cashflow. Hard Truths
  • 2. secgen.com NPN Some Numbers NPN Attack Categories The most common exploited threats were: NPN Considerations The largest category - Fraud - mostly comprises of such attacks against MNOs as grey route and SMS and Billing evasion. Data breach mainly was against subscribers and included IMSI, location data and interception of calls and SMS. In many of those events, cross-protocol attacks were performed either to facilitate or obfuscate the main attack. A minor part in terms of volume, the Operator data breach is still much relevant if you consider the possibility of network mapping and posterior Denial-of-service. Data Breach Subscriber DoS Fraud Operators received from 60 to over 100 thousand attacks daily. MNOs without a well configured firewall protection or not even STP and DEA protection, had an average of 70% of incoming attacks being successfully responded by the network. Due to nature of some attacks (like sweeping), this is expected. When protective measures are executed on the network correctly, successful attacks drop to less than 1%. Data Breach Subscriber DoS Fraud
  • 3. secgen.com UK | Italy | Czech Republic | Brazil | Egypt India | South Korea | Japan | Malaysia | UAE Email: contact@secgen.com Website: www.secgen.com SecurityGen is a global company focused on cybersecurity for telecom security. We deliver a solid security foundation to drive secure telecom digital transformations and ensure safe and robust network operations. Our extensive product and service portfolio provides complete protection against existing and advanced telecom security threats. About SecurityGen Connect With Us Subscriber DoS is not evenly spread worldwide but is unfortunately detected in some countries in the region. If you assume part of the subscribers is IoT equipment used in utilities and security, DoS attacks are considered significant threats to the general public. Want a better understanding of how those threats affect your Operator and how to Identify, Detect and Protect the Network and Subscribers? Just reach out for a clarification session at contact@secgen.com, and we at SecurityGen will be happy to guide you through a completely new approach to securing your Network and Subscribers!