• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Guide
  • Home Improvement
  • Gadget & Apps
  • Deals
  • News

GPRS roaming network exposed to Internet-based attacks

By Guest Authors

In 2013, alongside reports on the National Security Agency’s spying program that had raised the hackles of privacy advocates, the British intelligence agency GHCQ was also discovered to have breached the routers and mobile roaming traffic of Belgacom, a Belgian telecommunications service provider.

The incident has led Stephen Kho and Rob Kuiters, security experts from Netherlands-based telecom provider KPN, to perform a test on the level of vulnerability of the GPRS Roaming Exchange network, carrier of roaming traffic comprising of hundreds of mobile networks across the world. The researchers found out that the GRX network has been exposed to attacks.

gprs-roaming-network

GRX providers serve to connect mobile operators worldwide to their roaming partners from the other part of the world. It is almost impossible for a roaming traffic, regardless of location, not to pass through the GRX network. So the GHCQ spying scandal brought to light the magnitude of private traffic information viewed by the British agency.

Kho and Kuiters worked to find out the ways to penetrate into the global GRX infrastructure from a remote computer while bypassing the station of network engineers, a task that turned out to be rather as simple as reciting the alphabet. Part also of the hacking test is to determine the types of data that might be exposed to malicious attackers and snoopers.

The researchers found that 13 percent of the  live GRX hosts that they have successfully identified were readily exposed to anyone who will try to access it from the Internet using the tools that they employed but did not publicly reveal. It shows the lack of strong measure to bolster the supposed private networks.

Those hosts were also responsible for the vulnerabilities that affected various services such as the GPRS Tunneling Protocol, Network Management Protocol, Server Message Block, Hypertext Transfer Protocol, Transfer Protocol, Simple Mail Transfer Protocol, and Domain Name System.

Part of what contributes to their vulnerabilities is the old software whose remote code execution has been rendered defenseless out of the lack of security updates.

And like I’ve said above, it so easily done. Hackers do not need to purchase zero-day exploits to gain access to the GRX infrastructure.

Some of the critical information potentially susceptible to this hack includes session identifiers, credentials, URLs, files, mobile device type, mobile network code, mobile country code, cell identifiers, International Mobile Subscriber Identity code and location area code.

Imagine how easy it would be to track you once these pieces of information fall in the hands of the wrong guy?

Disclosure: We might earn commission from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Footer

Retevis MateTalk C3 and C4 Review: A New Generation of GMRS Radios

Seedpace Interactive Player with Craft Review: A Screen-Free Storytelling Experience

Mudita Kompakt E-Ink Phone Review: A Phone That Lets You Disconnect

Keychron K6 HE Wireless Magnetic Switch Keyboard (Special Edition) Review

Follow TechWalls

YoutubeFacebookXInstagram

Recent Posts

  • Retevis MateTalk C3 and C4 Review: A New Generation of GMRS Radios
  • Seedpace Interactive Player with Craft Review: A Screen-Free Storytelling Experience
  • Audioengine HD4 Next Gen Review – The Perfect Bookshelf Speakers for Your Computer Setup
  • Mureka AI Launches V7.5 Model with Revolutionary Music Quality and Creativity Enhancement

Copyright © 2025 · All Rights Reserved