🧵A good recent example of #Ukraine contesting the Mobile Network / InfoSec battlespace.
Multiple #SIMBox seizures as part of an "enemy bot farm" network were announced yesterday by the Security Service of Ukraine. 1/6 ssu.gov.ua/novyny/z-pocha…
Technically this is a much bigger setup that the #SIMBox relay discovery from 2 weeks ago, (see my previous thread) which is not surprising as these are more traditional ‘bot farms’ used for signups for social media 2/6
According to the #SBU, the 5 enemy bot farms in the network used social media (including some banned in Ukraine) to “spread disinformation about a full-scale Russian invasion of our state and spread distorted news from the front”.
This network used 100,000 fake accounts 3/6
On the telecom side, visually this comprises of what looks like Shenzhen Yundatong Technology's Eyondalink 64 SIM GSM Modems.
Presumably these would connect to a server to register and then receive SMSs as part of the fake account setup process 4/6 aliexpress.com/i/400098376274…
Ukraine has been identifying and cracking down on these for years, including recently before the war – here is a somewhat smaller one from February 9th with similar equipment.
1/5 Another significant capture in #Ukraine. Reported discovery today of a #SIMBox being used to relay Voice calls & SMS and other info to Russian forces (including top leadership of Russian army) & other individuals in #Ukraine. I will explain what this is and how it works.
2/5
First the system is comprised of 3 main parts, 1) the SIM Box server - in this case a Hypertone SMB-128 . This handles the control of up to 128 SIM Cards, cycles them when detected etc , and co-ordinates interaction with the #GSM Gateways hybertone.com/en/pro_detail.…
3/5 Next the GSM Gateways, there are two Hypertone types being used here:
- There are 3x GoIP 8 - VoIP Gateway for 8 Channels being used,
- along with 1x GoIP-4 4 SIM VoIP GSM Gateway.
Both can be used for SMS or Voice