Far From Home is a series of threat intelligence reports providing a comprehensive vision into surveillance attacks and cyber espionage activity against US mobile phones. The reports expose 3 years of active surveillance operations targeting US mobile users, where years of network exploitations have resulted into massive breaches of user privacy. The reports feature global rankings of source countries and network operators originating the attacks. Featuring live attack traces, global attack heat maps and deep insights into threat operations, these reports are the culmination of independent expert investigations into attack data from state sponsors and organized crime entities using 3G and 4G networks.
Far From Home Threat Intelligence Report provides details of foreign cyber threats during 2018-2019. It includes key themes, targeting classifications, surveillance methods, forward-looking risk assessments and rankings of 3G and 4G attacks. Additional insights are provided into threats from China, Russia and Eastern European networks as well as Palestine.
Far from Home - Part 2 Technical Supplement and 2020 Analysis report provides an update and deep dive into techniques used by threat actors in active surveillance attacks, and an analysis of attacks from specific foreign sources. Also provided are never before seen traces of live attacks from China, Greece, Mexico and Palestine, deep investigations into mobile threat trends and key attack observations.
With millions of transactions, massive volumes of threat activity have occurred for years and continues to this day.
Surveillance operations are not limited to traditional adversaries. Allied and neutral countries also participate actively to monitor phone locations and communications.
Security firewalls provide a layer of detection and prevention. However, many network operators use conservative approaches to reduce the risks of potentially disrupting international roaming service
Mobile devices use 3G and 4G networks simultaneously. Threat actors exploit both technologies to increase the success rates of attacks. In 2020, attackers are adapting to favor 4G attack vectors which poses great risks to 5G.
Countries are observed attacking the same mobile users with similar attack methods. Attacks sources from multiple Caribbean countries are observed with indications of network selling to conduct intelligence operations.
Current security guidelines are not sufficient to hold networks accountable for these attacks. The lack of mandates encourages small nations to participate in the threat economy, effectively selling their network to adversaries.
This report only reveals the surface of foreign espionage activity. If you have more details on mobile network attacks or are interested in hearing more about mobile network attack trends and insights we would love to hear from you directly at the email below.
To be provided with special access, reporters, media and NGO's should contact Exigent Media directly using the secure contact link below or send a secure email to firstname.lastname@example.org or request an email encryption key and we will respond ASAP.