About
I'm Dmitry, a telecom cybersecurity expert and co-founder of SecurityGen.
Our company…
Articles by Dmitry
Contributions
Activity
-
📱 iPhone Restart Feature Keeps Thieves and Law Enforcement Away from Your Data It seems law enforcement topics are popping up a lot lately, but…
📱 iPhone Restart Feature Keeps Thieves and Law Enforcement Away from Your Data It seems law enforcement topics are popping up a lot lately, but…
Shared by Dmitry Kurbatov
-
Привет, друзья! Рад снова поделиться приятными моментами. На прошлой неделе мне выпала честь принять участие в значимом событии — конференции Verny…
Привет, друзья! Рад снова поделиться приятными моментами. На прошлой неделе мне выпала честь принять участие в значимом событии — конференции Verny…
Liked by Dmitry Kurbatov
Experience
Education
-
Moscow State Institute of Radiotechnics Electronics and Automatics
-
Publications
-
4G and 5G are not ready for smart cities, GTP, EPC
Positive Technologies
By 2022, the number of connected IoT devices is expected to jump from 400 million to 1.5 billion. Smart city systems, self-driving cars, and other IoT infrastructure are connected to the same mobile networks that your smartphone uses. But interruptions of these networks can cause chaos and worse. Merely disabling a few traffic lights can bring an entire city to a standstill. The architecture of modern mobile networks is fundamentally vulnerable, with attackers able to perform denial of service…
By 2022, the number of connected IoT devices is expected to jump from 400 million to 1.5 billion. Smart city systems, self-driving cars, and other IoT infrastructure are connected to the same mobile networks that your smartphone uses. But interruptions of these networks can cause chaos and worse. Merely disabling a few traffic lights can bring an entire city to a standstill. The architecture of modern mobile networks is fundamentally vulnerable, with attackers able to perform denial of service and disrupt networks in a matter of hours.
Other authors -
Next-generation networks, next-level cybersecurity problems, Diameter
Positive Technologies
In preparation for the brave new world of 5G and IoT, the last few years have seen operators make significant investments in their next-generation networks. However, despite spending billions upgrading from a protocol developed in the 70’s (SS7) to Diameter (4G and 5G), flaws exist that allow an attacker to carry out eavesdropping, tracking, fraud, theft and DoS. This research piece outlines, using examples, how next-generation networks can be abused by an attacker and the steps which can be…
In preparation for the brave new world of 5G and IoT, the last few years have seen operators make significant investments in their next-generation networks. However, despite spending billions upgrading from a protocol developed in the 70’s (SS7) to Diameter (4G and 5G), flaws exist that allow an attacker to carry out eavesdropping, tracking, fraud, theft and DoS. This research piece outlines, using examples, how next-generation networks can be abused by an attacker and the steps which can be taken to protect against this.
Other authors -
Primary Security Threats for SS7 Cellular Networks 2016
Positive Technologies
SS7 exploits can turn a cell phone into an open book, allowing an attacker to read messages, track a subscriber’s location, and eavesdrop on and redirect calls. This technique is now available not only to intelligence services, but to an average hacker as well. In 2014, we described in detail security issues in signaling networks. This report contains a security analysis of SS7 networks for various operators with a subscriber base of 10 to 70 million.
Other authors -
SS7 Vulnerabilities Security Report
Positive Technologies
-
Vulnerabilities of Mobile Internet (GPRS)
Positive Technologies
Modern mobile networks facilitate the most convenient access to the Internet without the need for static infrastructures. People can access email, messengers, social networks, and online stores whenever and wherever they need it. A range of businesses use mobile Internet for remote administration, financial operations, e-commerce, M2M, and some other purposes.
Other authors -
How to Intercept a Conversation Held on the Other Side of the Planet
Positive Hack Days
Lately, phone communication records can be found in the Internet and even be heard on TV. It is obvious that such records were obtained without the knowledge of the subscribers. Many of us have received weird text messages and, after that, long bills for mobile services. We will consider the range of possibilities of an intruder who accessed the holy of holies of telecom companies — SS7. The talk will address attacks aimed at: disclosure of subscriber’s sensitive data including his or her…
Lately, phone communication records can be found in the Internet and even be heard on TV. It is obvious that such records were obtained without the knowledge of the subscribers. Many of us have received weird text messages and, after that, long bills for mobile services. We will consider the range of possibilities of an intruder who accessed the holy of holies of telecom companies — SS7. The talk will address attacks aimed at: disclosure of subscriber’s sensitive data including his or her location, changing enabled services, call forwarding, unauthorized intrusion into a voice communication channel.
Other authorsSee publication -
Five Nightmares for a Telecom
Five Nightmares for a Telecom are five stories on how to intrude into an operator’s network and perform an attack against packet services, how to gain control of the infrastructure, make money with VoIP and self-service portals. Some attacks already have precedents in the past, and others are just a fancy, which we hope will not become a reality.
-
Popular Network Equipment and Vulnerability Statistics
Cisco, Juniper, Avaya, Alcatel-Lucent, Huawei, Allied Telesis, D-Link and NetGear equipment: there are vulnerabilities in software but there is little public information about them. If you don’t know about them, somebody else may know. In other words, keep your eyes open!
More activity by Dmitry
-
With ever increasing announcements of decommissioning of 2G/3G networks, it’s no wonder that VoLTE Roaming is the #1 priority for most Roaming teams…
With ever increasing announcements of decommissioning of 2G/3G networks, it’s no wonder that VoLTE Roaming is the #1 priority for most Roaming teams…
Liked by Dmitry Kurbatov
-
🎉 Some new Telco utils 📞📡 are now installed in our x86_64, arm64 and partially on RISCV64 images 📦 👉 rfswift.io #pentest #telco #security #ss7…
🎉 Some new Telco utils 📞📡 are now installed in our x86_64, arm64 and partially on RISCV64 images 📦 👉 rfswift.io #pentest #telco #security #ss7…
Liked by Dmitry Kurbatov
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Dmitry Kurbatov
-
Dmitry Kurbatov
Delivery Manager @Symfa Inc.
-
Dmitry Kurbatov
-
Dmitry Kurbatov
High profile Real Estate in Spain. Investment opportunities.
-
DMITRY KURBATOV
Trade Marketing Director
19 others named Dmitry Kurbatov are on LinkedIn
See others named Dmitry Kurbatov