BusinessCybersecurityNewswireTechnology

U.S. Found 100K SIM Cards That Could Have Crippled NYC’s Cell Network

▼ Summary

– The US Secret Service seized a large cache of telecom devices capable of shutting down New York City’s cellular network, attributing it to a nation-state.
– The seized equipment included over 300 SIM servers and 100,000 SIM cards found at multiple locations in the New York City area.
– The investigation began due to anonymous threats against officials, but the system was designed for larger-scale attacks like disabling cell towers.
– Preliminary analysis indicates nation-state threat actors were involved, possibly to disrupt or spy on the UN General Assembly in New York.
– While the equipment has been taken offline, no arrests have been made and the investigation is ongoing.

A significant threat to New York City’s cellular infrastructure has been neutralized following the discovery of a massive cache of telecommunications equipment. The U.S. Secret Service revealed it seized a system comprising more than 300 SIM servers and 100,000 SIM cards, a setup authorities believe possessed the capability to severely disrupt or even shut down mobile networks across the metropolis. Initial findings point toward the involvement of a sophisticated nation-state threat actor, indicating this was far more than a simple criminal operation.

The investigation began after anonymous telephonic threats were made against high-ranking U.S. officials. This led agents to multiple locations in the New York City area, where they uncovered what are known as SIM boxes. These devices, often exploited for fraudulent activities, were found loaded with SIM cards and mounted on multi-shelf racks. Photographic evidence depicts not only the operational hardware but also towering stacks of empty SIM card packaging, suggesting a considerable and methodical effort went into assembling the entire network.

Authorities assert that the potential applications of this equipment extended well beyond making threatening phone calls. The system was technically capable of disabling cell phone towers, launching denial-of-service attacks, and providing a platform for anonymous, encrypted communication between malicious actors. This level of functionality indicates a clear intent to execute large-scale disruption.

The timing of the discovery is particularly noteworthy, coinciding with the UN General Assembly’s meeting in New York. One theory is that the equipment could have been intended to spy on or disrupt communications among international delegates. However, the gear was recovered from sites scattered up to 35 miles from the UN, leaving its ultimate purpose somewhat unclear. Reports indicate the devices were seized from SIM farms located in abandoned apartment buildings across more than five separate locations.

While the immediate danger has been averted with the removal of the hardware, the investigation remains active. No arrests have been made public at this time as analysts continue to pore over the vast amount of data recovered from the seized equipment.

(Source: Ars Technica)

Topics

secret service 95% telecom devices 90% nation-state threat 88% sim boxes 85% network disruption 82% investigation ongoing 80% encrypted communication 78% sim farms 77% anonymous threats 75% spy hardware 74%