The Electronic Frontier Foundation has released an open source project called Rayhunter. It is designed to run on an inexpensive (~$20) mobile hotspot and look for signs of mobile spying devices called cell-site simulators. Also known as Stingrays or IMSI catchers, they masquerade as legitimate cellphone towers, tricking phones w/in a certain radius into connecting to the device rather than a tower.

https://www.eff.org/deeplinks/2025/03/meet-rayhunter-new-open-source-tool-eff-detect-cellular-spying

Meet Rayhunter: A New Open Source Tool from EFF to Detect Cellular Spying

Rayhunter is a new open source tool we’ve created that runs off an affordable mobile hotspot that we hope empowers everyone, regardless of technical skill, to help search out cell-site simulators (CSS) around the world.

Electronic Frontier Foundation
@briankrebs Perhaps a weekend project.
@briankrebs
Very nice. Now I wonder if/when the code will be ported to other pocket routers. And maybe also not-so-pocket ones.

@briankrebs Serious questions for semi-technical person:

  • Is it necessary to get an "unlocked" model of the Orbic device?

  • Are they all Verizon?

  • Is this for the Verizon locked model only? Which MPNs? · Issue #112 · EFForg/rayhunter

    The readme states Orbic RC400L but on Ebay most of these are Verizon locked. The few unlocked one's have an MPN of ORB400LBVZRT, a list of Orbic MPNs this is tested to work on would be nice.

    GitHub
    @guyjantic @briankrebs Mine has the Verizon firmware but does not appear to be locked, it's working fine with another carrier's SIM card
    @mick_talbott Nice! I've ordered one. I'm going to try this. I can't imagine there are any stingrays or whatever in my tiny rural town, but it would be really weird and interesting if there were.
    @briankrebs I don not need one of these but WOW am I glad this device exists!
    @feoh @briankrebs You don't want to know if someone's spoofing your cell connection?

    @crazyeddie

    You mis-understand.

    There is a lmit to how many incursions one can ward ones self against every minute of every day.

    I treat cellular comms like broadcast anyway, and so as I said, while I am VERY glad this exists, I do not feel the need to carry one at all times.

    @briankrebs I built one. Haven't found a stingray yet, thought I know CPD and the Sheriff have some.
    @Sempf @briankrebs same. Putting it in my car so I can test a greater number of places
    GitHub - EFForg/rayhunter: Rust tool to detect cell site simulators on an orbic mobile hotspot

    Rust tool to detect cell site simulators on an orbic mobile hotspot - EFForg/rayhunter

    GitHub
    @briankrebs there's a.good article on detection of rogue cell towers, on Hackaday from 2016 https://hackaday.com/2016/08/09/how-to-detect-and-find-rogue-cell-towers/
    How To Detect And Find Rogue Cell Towers

    Software defined radios are getting better and better all the time. The balaclava-wearing hackers know it, too. From what we saw at HOPE in New York a few weeks ago, we’re just months away fr…

    Hackaday
    @briankrebs one thing that is not clear in EFF's writeup— to use these, one needs to pay for a separate cellphone line? (Or pre-paid SIM cards i guess?)
    @mlncn @briankrebs Works without any need for an account or SIM.
    @briankrebs can we make our own 2 with spare old WAPs & wifi routers?
    @briankrebs I got my orbic in the mail last week! I need to sit down and set it up. I plan to loan it to anyone going to a protest, as well as take it when I go.

    @briankrebs I rather like the idea of constructing something from a Pi and qualcom hat, but I see zero tests here :p How would I even know it's working?

    Granted, I'm not familiar with rust patterns of development. But there are no test directories or test_ files or anything...

    How do they verify it themselves I wonder.

    @briankrebs ive seen this news and im desperate to see what happens when it catches one
    @briankrebs @stux Copped a brand new one for $11 on eBay. A new toy (and increasingly important tool) to look forward too!
    @briankrebs this is cool but what do you even do if you detect one. i feel like the people using these devices aren’t going to yield to a sternly worded letter.
    @briankrebs I’m thinking of making one of these to see what I find around me.
    @briankrebs Ooooh. Too bad it doesn't run on Huawei devices. I have a couple unused ones laying around.
    @briankrebs If folks want to learn more about the cellular attacks behind IMSI-catchers/etc, here's a technical primer I wrote for EFF in 2019: https://www.eff.org/wp/gotta-catch-em-all-understanding-how-imsi-catchers-exploit-cell-networks
    Gotta Catch 'Em All: Understanding How IMSI-Catchers Exploit Cell Networks

    Table of ContentsSection 1: Introduction Section 2: Necessary background info Section 3: Overview of attacks Section 3.1: Basic IMSI-catcher Section 3.2: Communication interception Section 3.2.1: Spoofing authentication Section 3.2.2: Dealing with encryption Section 3.2.3: Why aren’...

    Electronic Frontier Foundation
    @briankrebs I’ll read up more but does is there a place to record a master list of suspected fake towers?
    @briankrebs Damn I really hope they developed a program that runs on rooted Android or Linux phones, even if they had models limited (to like only one device supported). Orbic devices are not being sold here at all.
    Do these work outside the U.S.
    @briankrebs @iffybooks Do you know if the normal function of the device still works?