Dmitry Kurbatov

Dmitry Kurbatov

Windsor, England, United Kingdom
7K followers 500+ connections

About

I'm Dmitry, a telecom cybersecurity expert and co-founder of SecurityGen.
Our company…

Articles by Dmitry

Contributions

Activity

Join now to see all activity

Experience

Education

  • Moscow State Institute of Radiotechnics Electronics and Automatics

    -

Publications

  • 4G and 5G are not ready for smart cities, GTP, EPC

    Positive Technologies

    By 2022, the number of connected IoT devices is expected to jump from 400 million to 1.5 billion. Smart city systems, self-driving cars, and other IoT infrastructure are connected to the same mobile networks that your smartphone uses. But interruptions of these networks can cause chaos and worse. Merely disabling a few traffic lights can bring an entire city to a standstill. The architecture of modern mobile networks is fundamentally vulnerable, with attackers able to perform denial of service…

    By 2022, the number of connected IoT devices is expected to jump from 400 million to 1.5 billion. Smart city systems, self-driving cars, and other IoT infrastructure are connected to the same mobile networks that your smartphone uses. But interruptions of these networks can cause chaos and worse. Merely disabling a few traffic lights can bring an entire city to a standstill. The architecture of modern mobile networks is fundamentally vulnerable, with attackers able to perform denial of service and disrupt networks in a matter of hours.

    Other authors
    • Pavel Novikov
    • Sergey Mashukov
  • Next-generation networks, next-level cybersecurity problems, Diameter

    Positive Technologies

    In preparation for the brave new world of 5G and IoT, the last few years have seen operators make significant investments in their next-generation networks. However, despite spending billions upgrading from a protocol developed in the 70’s (SS7) to Diameter (4G and 5G), flaws exist that allow an attacker to carry out eavesdropping, tracking, fraud, theft and DoS. This research piece outlines, using examples, how next-generation networks can be abused by an attacker and the steps which can be…

    In preparation for the brave new world of 5G and IoT, the last few years have seen operators make significant investments in their next-generation networks. However, despite spending billions upgrading from a protocol developed in the 70’s (SS7) to Diameter (4G and 5G), flaws exist that allow an attacker to carry out eavesdropping, tracking, fraud, theft and DoS. This research piece outlines, using examples, how next-generation networks can be abused by an attacker and the steps which can be taken to protect against this.

    Other authors
    • Pavel Novikov
    • Sergey Mashukov
  • Primary Security Threats for SS7 Cellular Networks 2016

    Positive Technologies

    SS7 exploits can turn a cell phone into an open book, allowing an attacker to read messages, track a subscriber’s location, and eavesdrop on and redirect calls. This technique is now available not only to intelligence services, but to an average hacker as well. In 2014, we described in detail security issues in signaling networks. This report contains a security analysis of SS7 networks for various operators with a subscriber base of 10 to 70 million.

    Other authors
  • SS7 Vulnerabilities Security Report

    Positive Technologies

    Nowadays mobile networks are the most dynamic part of critical communication infrastructures and the key instrument used to perform daily activities ranging from voice and text messaging to providing signaling for emergency services and critical infrastructure.

    Other authors
  • Vulnerabilities of Mobile Internet (GPRS)

    Positive Technologies

    Modern mobile networks facilitate the most convenient access to the Internet without the need for static infrastructures. People can access email, messengers, social networks, and online stores whenever and wherever they need it. A range of businesses use mobile Internet for remote administration, financial operations, e-commerce, M2M, and some other purposes.

    Other authors
    • Pavel Novikov
  • How to Intercept a Conversation Held on the Other Side of the Planet

    Positive Hack Days

    Lately, phone communication records can be found in the Internet and even be heard on TV. It is obvious that such records were obtained without the knowledge of the subscribers. Many of us have received weird text messages and, after that, long bills for mobile services. We will consider the range of possibilities of an intruder who accessed the holy of holies of telecom companies — SS7. The talk will address attacks aimed at: disclosure of subscriber’s sensitive data including his or her…

    Lately, phone communication records can be found in the Internet and even be heard on TV. It is obvious that such records were obtained without the knowledge of the subscribers. Many of us have received weird text messages and, after that, long bills for mobile services. We will consider the range of possibilities of an intruder who accessed the holy of holies of telecom companies — SS7. The talk will address attacks aimed at: disclosure of subscriber’s sensitive data including his or her location, changing enabled services, call forwarding, unauthorized intrusion into a voice communication channel.

    Other authors
    See publication
  • Five Nightmares for a Telecom

    Five Nightmares for a Telecom are five stories on how to intrude into an operator’s network and perform an attack against packet services, how to gain control of the infrastructure, make money with VoIP and self-service portals. Some attacks already have precedents in the past, and others are just a fancy, which we hope will not become a reality.

    See publication
  • Popular Network Equipment and Vulnerability Statistics

    Cisco, Juniper, Avaya, Alcatel-Lucent, Huawei, Allied Telesis, D-Link and NetGear equipment: there are vulnerabilities in software but there is little public information about them. If you don’t know about them, somebody else may know. In other words, keep your eyes open!

More activity by Dmitry

View Dmitry’s full profile

  • See who you know in common
  • Get introduced
  • Contact Dmitry directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Dmitry Kurbatov

Add new skills with these courses