About
I'm Dmitry, a telecom cybersecurity expert and co-founder of SecurityGen.
Our company…
Articles by Dmitry
Contributions
Activity
-
📞 Caller ID Spoofing and Evolution of Fraudulent Services Caller ID Spoofing has been a persistent issue for many years and continues to be a…
📞 Caller ID Spoofing and Evolution of Fraudulent Services Caller ID Spoofing has been a persistent issue for many years and continues to be a…
Shared by Dmitry Kurbatov
-
Done my first Half Marathon at Penang Bridge Marathon 2024 ⭐️ A challenge to self, to push a little further. An amazing feeling and managed to…
Done my first Half Marathon at Penang Bridge Marathon 2024 ⭐️ A challenge to self, to push a little further. An amazing feeling and managed to…
Liked by Dmitry Kurbatov
Experience
Education
-
Moscow State Institute of Radiotechnics Electronics and Automatics
-
Publications
-
4G and 5G are not ready for smart cities, GTP, EPC
Positive Technologies
By 2022, the number of connected IoT devices is expected to jump from 400 million to 1.5 billion. Smart city systems, self-driving cars, and other IoT infrastructure are connected to the same mobile networks that your smartphone uses. But interruptions of these networks can cause chaos and worse. Merely disabling a few traffic lights can bring an entire city to a standstill. The architecture of modern mobile networks is fundamentally vulnerable, with attackers able to perform denial of service…
By 2022, the number of connected IoT devices is expected to jump from 400 million to 1.5 billion. Smart city systems, self-driving cars, and other IoT infrastructure are connected to the same mobile networks that your smartphone uses. But interruptions of these networks can cause chaos and worse. Merely disabling a few traffic lights can bring an entire city to a standstill. The architecture of modern mobile networks is fundamentally vulnerable, with attackers able to perform denial of service and disrupt networks in a matter of hours.
Other authors -
Next-generation networks, next-level cybersecurity problems, Diameter
Positive Technologies
In preparation for the brave new world of 5G and IoT, the last few years have seen operators make significant investments in their next-generation networks. However, despite spending billions upgrading from a protocol developed in the 70’s (SS7) to Diameter (4G and 5G), flaws exist that allow an attacker to carry out eavesdropping, tracking, fraud, theft and DoS. This research piece outlines, using examples, how next-generation networks can be abused by an attacker and the steps which can be…
In preparation for the brave new world of 5G and IoT, the last few years have seen operators make significant investments in their next-generation networks. However, despite spending billions upgrading from a protocol developed in the 70’s (SS7) to Diameter (4G and 5G), flaws exist that allow an attacker to carry out eavesdropping, tracking, fraud, theft and DoS. This research piece outlines, using examples, how next-generation networks can be abused by an attacker and the steps which can be taken to protect against this.
Other authors -
Primary Security Threats for SS7 Cellular Networks 2016
Positive Technologies
SS7 exploits can turn a cell phone into an open book, allowing an attacker to read messages, track a subscriber’s location, and eavesdrop on and redirect calls. This technique is now available not only to intelligence services, but to an average hacker as well. In 2014, we described in detail security issues in signaling networks. This report contains a security analysis of SS7 networks for various operators with a subscriber base of 10 to 70 million.
Other authors -
SS7 Vulnerabilities Security Report
Positive Technologies
-
Vulnerabilities of Mobile Internet (GPRS)
Positive Technologies
Modern mobile networks facilitate the most convenient access to the Internet without the need for static infrastructures. People can access email, messengers, social networks, and online stores whenever and wherever they need it. A range of businesses use mobile Internet for remote administration, financial operations, e-commerce, M2M, and some other purposes.
Other authors -
How to Intercept a Conversation Held on the Other Side of the Planet
Positive Hack Days
Lately, phone communication records can be found in the Internet and even be heard on TV. It is obvious that such records were obtained without the knowledge of the subscribers. Many of us have received weird text messages and, after that, long bills for mobile services. We will consider the range of possibilities of an intruder who accessed the holy of holies of telecom companies — SS7. The talk will address attacks aimed at: disclosure of subscriber’s sensitive data including his or her…
Lately, phone communication records can be found in the Internet and even be heard on TV. It is obvious that such records were obtained without the knowledge of the subscribers. Many of us have received weird text messages and, after that, long bills for mobile services. We will consider the range of possibilities of an intruder who accessed the holy of holies of telecom companies — SS7. The talk will address attacks aimed at: disclosure of subscriber’s sensitive data including his or her location, changing enabled services, call forwarding, unauthorized intrusion into a voice communication channel.
Other authorsSee publication -
Five Nightmares for a Telecom
Five Nightmares for a Telecom are five stories on how to intrude into an operator’s network and perform an attack against packet services, how to gain control of the infrastructure, make money with VoIP and self-service portals. Some attacks already have precedents in the past, and others are just a fancy, which we hope will not become a reality.
-
Popular Network Equipment and Vulnerability Statistics
Cisco, Juniper, Avaya, Alcatel-Lucent, Huawei, Allied Telesis, D-Link and NetGear equipment: there are vulnerabilities in software but there is little public information about them. If you don’t know about them, somebody else may know. In other words, keep your eyes open!
More activity by Dmitry
-
Wishing everyone a Merry Christmas & Joyous New Year! 🎄 ✨ As the holiday season approaches, we want to take a moment to express our heartfelt…
Wishing everyone a Merry Christmas & Joyous New Year! 🎄 ✨ As the holiday season approaches, we want to take a moment to express our heartfelt…
Liked by Dmitry Kurbatov
-
🎄 Merry Christmas and Happy Holidays! 🎄 As 2024 comes to a close, we can truly say that this year we’ve faced and overcome many complex challenges…
🎄 Merry Christmas and Happy Holidays! 🎄 As 2024 comes to a close, we can truly say that this year we’ve faced and overcome many complex challenges…
Shared by Dmitry Kurbatov
-
Season's Greetings! 🎄 Wishing you a festive season with positive signals and secure networks! 📡🔒
Season's Greetings! 🎄 Wishing you a festive season with positive signals and secure networks! 📡🔒
Liked by Dmitry Kurbatov
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Dmitry Kurbatov
-
Dmitry Kurbatov
Data Analyst at Matrica | FRM at UCL
-
Dmitry Kurbatov
-
Dmitry Kurbatov
-
Dmitry Kurbatov
Delivery Manager @Symfa Inc.
20 others named Dmitry Kurbatov are on LinkedIn
See others named Dmitry Kurbatov