Tiens, on en sait plus sur les SMS-Blasters à Paris en 2022

"Leur fournisseur chinois, Yin Nongzhong, interpellé à l’occasion d’un voyage en Suisse et qui a comparu détenu en février, a été condamné à quatre ans de prison ferme, un an par machine vendue à des clients dans cette affaire."

"Une expertise technique a évalué que 3,7 millions d’appareils ont été accrochés pour leur délivrer un SMS par l’une des machines en cause dans cette affaire."
👇
https://www.lemonde.fr/pixels/article/2026/03/13/escroquerie-a-l-imsi-catcher-des-peines-allant-jusqu-a-cinq-ans-de-prison-ferme_6671066_4408996.html

"Des escrocs sillonnaient Paris en voiture équipée d’appareils capables d’envoyer des SMS frauduleux à des millions de personnes
Des outils détournés pour arnaquer des millions de Français…"
👇
https://siecledigital.fr/2026/03/17/avec-ces-machines-reservees-aux-forces-de-lordre-ils-emettaient-des-sms-frauduleux/

💬
⬇️
https://infosec.pub/post/43568998

#CybeVeille #Pais #Fance #SMSBlaster #IMSIcatcher

Escroquerie à l’IMSI-catcher : des peines allant jusqu’à cinq ans de prison ferme

Deux gérants d’une société avaient acquis ces machines, normalement réservées aux forces de l’ordre, pour émettre des SMS frauduleux dans Paris.

Le Monde

Wow @eff could not have made the #RayHunter install any easier. If you can unzip a file, connect to a network, and run a script, you can flash an Orbic in seconds. I just did. The most difficult part was figuring out where the Orbic kept its admin password. Turned out it was the default Wifi password. (And I would have know that if I had #RTFM )

Great work team!

#IMSI #IMSICatcher #StingRay

Cleaning out decades of #obsoletehardware so would any of those make a good #imsicatcher or should I recycle them? Alternatively if you want one or all for free, ping me and I bring them to #39C3

@downey

Warning! A lot of acronyms ahead! Welcome to Telco land...

TLDR: Anyone with the "fake cellphone tower" device mentioned can track BOTH your SIMcard, AND your mobile device.

So you better leave them at home, or bring a burner1 phone with a burner1 SIM.

IMSI vs IMEI

The "#IMSI" in #IMSIcatcher is an identifying number tied to your SIM(card).

But what #IMSIcatchers can also capture is your device's #IMEI 2.

The supposed purpose of an IMEI is stated clearly in the official documentation:

"The main objective is to be able to take measures against the use of stolen equipment or against equipment of which the use in the PLMN3 can not or no longer be tolerated for technical reasons."4

Mobile device manufacturers are obligated to produce device unique IMEI's:

"The IMEI shall be unique and shall not be changed after the ME’s [Mobile Equipment] final production process. It shall resist tampering, i.e. manipulation and change, by any means (e.g. physical, electrical and software)."4

IMSIcatcher vendors state their equipment can also capture IMEIs.5 6

So, every phone in the neighborhood of IMSIcatchers in use by law enforcement, are certainly in a batch of "to be tracked".

Did I mention law enforcement (through a legal warrant, they'll need help from mobile operators) can track phones based on IMEI alone (so even if you remove the SIM)? Yes, I believe I did.

PS: a phone connecting to or connected to an IMSIcatcher, is not on the network. Not being able to reach emergency services could lead to physical harm, including death. Just saying.

1 https://ssd.eff.org/glossary/burner-phone

2 International Mobile Station Equipment Identity

3 Public Land Mobile Network: wireless communication services offered by a specific operator in a specific country.

4 https://www.3gpp.org/ftp/Specs/archive/22_series/22.016/

5 https://x-surveillance.com/imsi-stingray-device/

6 https://www.stratign.com/imsi-catcher-system/

Burner phone

A phone that is not connected to your identity, is only used for a small set of calls or activities, and can be discarded if and when it is suspected of being tracked or compromised. Burner phones are often pre-paid mobile phones bought with cash.

Exclusive: Fake cellphone tower may have surveilled protesters at Portland ICE facility

SAN analyzed cellular signals outside the #Portland ICE facility last weekend as President Donald Trump attempted to deploy National Guard troops to a city he described as “war-ravaged.”

SAN analyzed signals using a device called Marlin. The scans detected over half a dozen IMSI-exposure ratios above 10%, and three separate 18% spikes in just a one-hour window — significantly higher than what the Marlin developers ever registered under normal conditions.

Away from the building, that percentage began to drop. At a hotel 3/10s of a mile away, percentages hovered around 1% to 4% with occasional spikes as high as 9% over a roughly two-hour period.

In SAN’s extensive use of #Marlin over the past four months, the only other time an IMSI-exposure ratio was detected was outside an #ICE facility in Washington state.

Straight Arrow News / https://archive.md/r5yUY #IMSIcatcher #StingRay #surveillance

Die offizielle Schweiz lässt also zu, dass eine Firma am Repressionsexport verdient. Wir GRÜNE fordern: klare Regeln, Transparenz und ein Ende solcher Exporte. Der Bundesrat muss hier rasch vorwärts machen! #neosoft #imsicatcher #repressionsexport 3/3
Die Zürcher Firma #Neosoft exportiert Überwachungstechnologie – darunter IMSI-Catcher, die Handys orten und abhören können. Hier der Artikeln in der @woz.ch : 🔗 https://www.woz.ch/2535/ueberwachungstechnologie/handyspione-aus-dem-binzquartier/!4PESK8KTD13E #imsicatcher #repressionsexport 1/3
2/3 Diese Geräte landen auch in autoritären Staaten. Offiziell für «Kriminalitätsbekämpfung», faktisch zur Unterdrückung von Oppositionellen eingesetzt. #IMSICatcher können Demoteilnehmende anschreiben und abschrecken: "Wir wissen, dass Du da bist..." #neosoft #imsicatcher #repressionsexport