SecurityGen-Signaling-Threats-in-Latam.pdf

Security Gen
Security GenTelecom Service Provider

The number of attacks does NOT depend on the size of the country/Mobile Operator. The volume of attacks received by an MNO depends on how vulnerable is the operator’s signaling infrastructure and the efficiency of its protective systems, when available. Attackers will always take the easier path. Unless there is a special contract with specific targets, they will focus on opportunities for a fast cashflow

The insights shared in this document are drawn from the actual data collected by
SecurityGen team across many MNOs (Mobile Network Operators) in the region.
SIGNALLING THREATS IN
LATAM
LATAM Scenario
The number of attacks does NOT depend on the size of the country/Mobile Operator.
The volume of attacks received by an MNO depends on how vulnerable is the
operator’s signaling infrastructure and the efficiency of its protective systems, when
available.
Attackers will always take the easier path. Unless there is a special contract with specific
targets, they will focus on opportunities for a fast cashflow.
Hard Truths
secgen.com
NPN
Some Numbers
NPN
Attack Categories
The most common exploited threats were:
NPN
Considerations
The largest category - Fraud - mostly comprises of such attacks against MNOs as
grey route and SMS and Billing evasion.
Data breach mainly was against subscribers and included IMSI, location data and
interception of calls and SMS. In many of those events, cross-protocol attacks
were performed either to facilitate or obfuscate the main attack.
A minor part in terms of volume, the Operator data breach is still much relevant if
you consider the possibility of network mapping and posterior Denial-of-service.
Data Breach
Subscriber DoS
Fraud
Operators received from 60 to over 100 thousand attacks daily.
MNOs without a well configured firewall protection or not even STP and DEA protection,
had an average of 70% of incoming attacks being successfully responded by the
network. Due to nature of some attacks (like sweeping), this is expected.
When protective measures are executed on the network correctly, successful
attacks drop to less than 1%.
Data Breach
Subscriber DoS
Fraud
secgen.com
UK | Italy | Czech Republic | Brazil | Egypt
India | South Korea | Japan | Malaysia | UAE
Email: contact@secgen.com
Website: www.secgen.com
SecurityGen is a global company focused on
cybersecurity for telecom security. We deliver
a solid security foundation to drive secure
telecom digital transformations and ensure
safe and robust network operations.
Our extensive product and service portfolio
provides complete protection against existing
and advanced telecom security threats.
About SecurityGen Connect With Us
Subscriber DoS is not evenly spread worldwide but is unfortunately detected in
some countries in the region. If you assume part of the subscribers is IoT
equipment used in utilities and security, DoS attacks are considered significant
threats to the general public.
Want a better understanding of how those threats affect your Operator and how to
Identify, Detect and Protect the Network and Subscribers?
Just reach out for a clarification session at contact@secgen.com, and we at
SecurityGen will be happy to guide you through a completely new approach to
securing your Network and Subscribers!

Recomendados

SS7: 2G/3G's weakest link por
SS7: 2G/3G's weakest linkSS7: 2G/3G's weakest link
SS7: 2G/3G's weakest linkPositiveTechnologies
253 vistas30 diapositivas
Toward Continuous Cybersecurity with Network Automation por
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
107 vistas28 diapositivas
Toward Continuous Cybersecurity With Network Automation por
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
236 vistas28 diapositivas
Retail por
Retail Retail
Retail CMR WORLD TECH
113 vistas5 diapositivas
Prevention based mechanism for attacks in Network Security por
Prevention based mechanism for attacks in Network SecurityPrevention based mechanism for attacks in Network Security
Prevention based mechanism for attacks in Network SecurityEditor IJMTER
211 vistas10 diapositivas
cyber security guidelines.pdf por
cyber security guidelines.pdfcyber security guidelines.pdf
cyber security guidelines.pdfVarinSingh1
12 vistas7 diapositivas

Más contenido relacionado

Similar a SecurityGen-Signaling-Threats-in-Latam.pdf

Information Security por
Information SecurityInformation Security
Information SecuritySarah Griffin
4 vistas44 diapositivas
Network Security of Data Protection por
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
98 vistas20 diapositivas
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance por
Telecom Resilience: Strengthening Networks through Cybersecurity VigilanceTelecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity VigilanceSecurityGen1
6 vistas7 diapositivas
Unleashing the Power of Telecom Network Security.pdf por
Unleashing the Power of Telecom Network Security.pdfUnleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdfSecurityGen1
15 vistas7 diapositivas
Business Intelligence Plan por
Business Intelligence PlanBusiness Intelligence Plan
Business Intelligence PlanAlejandra Rodriguez
2 vistas41 diapositivas

Similar a SecurityGen-Signaling-Threats-in-Latam.pdf(20)

Network Security of Data Protection por UthsoNandy
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
UthsoNandy98 vistas
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance por SecurityGen1
Telecom Resilience: Strengthening Networks through Cybersecurity VigilanceTelecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
SecurityGen16 vistas
Unleashing the Power of Telecom Network Security.pdf por SecurityGen1
Unleashing the Power of Telecom Network Security.pdfUnleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdf
SecurityGen115 vistas
SecurityGen-whitepaper-gtp-firewall- security 5G.pdf por NamTran825776
SecurityGen-whitepaper-gtp-firewall- security 5G.pdfSecurityGen-whitepaper-gtp-firewall- security 5G.pdf
SecurityGen-whitepaper-gtp-firewall- security 5G.pdf
NamTran8257762 vistas
SecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdf por SecurityGen1
SecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdfSecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdf
SecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdf
SecurityGen16 vistas
SecurityGen whitepaper GTP vulnerabilities - A cause for concern in 5G and LT... por Security Gen
SecurityGen whitepaper GTP vulnerabilities - A cause for concern in 5G and LT...SecurityGen whitepaper GTP vulnerabilities - A cause for concern in 5G and LT...
SecurityGen whitepaper GTP vulnerabilities - A cause for concern in 5G and LT...
Security Gen6 vistas
Prevention Of Service Attacks And Remedies por Connie Ripp
Prevention Of Service Attacks And RemediesPrevention Of Service Attacks And Remedies
Prevention Of Service Attacks And Remedies
Connie Ripp2 vistas
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection! por SecurityGen1
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
SecurityGen14 vistas
Network Security Research Paper por Pankaj Jha
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
Pankaj Jha17.5K vistas
Survey of apt and other attacks with reliable security schemes in manet por ijctet
Survey of apt and other attacks with reliable security schemes in manetSurvey of apt and other attacks with reliable security schemes in manet
Survey of apt and other attacks with reliable security schemes in manet
ijctet245 vistas
Network Security And The Internet por April Davis
Network Security And The InternetNetwork Security And The Internet
Network Security And The Internet
April Davis3 vistas
A Distributed Denial Of Service Attack And Defense Essay por Brenda Potter
A Distributed Denial Of Service Attack And Defense EssayA Distributed Denial Of Service Attack And Defense Essay
A Distributed Denial Of Service Attack And Defense Essay
Brenda Potter2 vistas
Beyond the Perimeter IDS, IPS, and Firewall Strategies Unveiled.pdf por SecurityGen1
Beyond the Perimeter IDS, IPS, and Firewall Strategies Unveiled.pdfBeyond the Perimeter IDS, IPS, and Firewall Strategies Unveiled.pdf
Beyond the Perimeter IDS, IPS, and Firewall Strategies Unveiled.pdf
SecurityGen15 vistas

Más de Security Gen

Best 5G Security Solutions - SecurityGen por
Best 5G Security Solutions - SecurityGenBest 5G Security Solutions - SecurityGen
Best 5G Security Solutions - SecurityGenSecurity Gen
9 vistas6 diapositivas
Fake BTS Network Vulnerabilities por
Fake BTS Network VulnerabilitiesFake BTS Network Vulnerabilities
Fake BTS Network VulnerabilitiesSecurity Gen
8 vistas4 diapositivas
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf por
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdfSecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdfSecurity Gen
2 vistas4 diapositivas
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM por
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMTELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMSecurity Gen
4 vistas8 diapositivas
A CLOSER LOOK AT LAPSUS$ AND SIM SWAP por
A CLOSER LOOK AT LAPSUS$ AND SIM SWAPA CLOSER LOOK AT LAPSUS$ AND SIM SWAP
A CLOSER LOOK AT LAPSUS$ AND SIM SWAPSecurity Gen
2 vistas5 diapositivas
ACE: ARTIFICIAL CYBERSECURITY EXPERT por
ACE: ARTIFICIAL CYBERSECURITY EXPERTACE: ARTIFICIAL CYBERSECURITY EXPERT
ACE: ARTIFICIAL CYBERSECURITY EXPERTSecurity Gen
6 vistas6 diapositivas

Más de Security Gen(17)

Best 5G Security Solutions - SecurityGen por Security Gen
Best 5G Security Solutions - SecurityGenBest 5G Security Solutions - SecurityGen
Best 5G Security Solutions - SecurityGen
Security Gen9 vistas
Fake BTS Network Vulnerabilities por Security Gen
Fake BTS Network VulnerabilitiesFake BTS Network Vulnerabilities
Fake BTS Network Vulnerabilities
Security Gen8 vistas
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf por Security Gen
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdfSecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
Security Gen2 vistas
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM por Security Gen
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMTELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
Security Gen4 vistas
A CLOSER LOOK AT LAPSUS$ AND SIM SWAP por Security Gen
A CLOSER LOOK AT LAPSUS$ AND SIM SWAPA CLOSER LOOK AT LAPSUS$ AND SIM SWAP
A CLOSER LOOK AT LAPSUS$ AND SIM SWAP
Security Gen2 vistas
ACE: ARTIFICIAL CYBERSECURITY EXPERT por Security Gen
ACE: ARTIFICIAL CYBERSECURITY EXPERTACE: ARTIFICIAL CYBERSECURITY EXPERT
ACE: ARTIFICIAL CYBERSECURITY EXPERT
Security Gen6 vistas
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM por Security Gen
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMTELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
Security Gen7 vistas
5G Security Program Datasheet (2).pdf por Security Gen
5G Security Program Datasheet (2).pdf5G Security Program Datasheet (2).pdf
5G Security Program Datasheet (2).pdf
Security Gen5 vistas
5G Security Program -Case Studies por Security Gen
5G Security Program -Case Studies 5G Security Program -Case Studies
5G Security Program -Case Studies
Security Gen14 vistas
IDS: INTRUSION DETECTION SYSTEM PLATFORM por Security Gen
IDS: INTRUSION DETECTION SYSTEM PLATFORMIDS: INTRUSION DETECTION SYSTEM PLATFORM
IDS: INTRUSION DETECTION SYSTEM PLATFORM
Security Gen7 vistas
NGFW - An Updated Overview por Security Gen
NGFW - An Updated Overview NGFW - An Updated Overview
NGFW - An Updated Overview
Security Gen3 vistas
Securing the 5G growth story with NFVi (1).pdf por Security Gen
Securing the 5G growth story with NFVi (1).pdfSecuring the 5G growth story with NFVi (1).pdf
Securing the 5G growth story with NFVi (1).pdf
Security Gen5 vistas
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM por Security Gen
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOMTELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
Security Gen16 vistas
SecurityGen-IDS_case_study.pdf por Security Gen
SecurityGen-IDS_case_study.pdfSecurityGen-IDS_case_study.pdf
SecurityGen-IDS_case_study.pdf
Security Gen8 vistas
Securing Private 5G Networks (1).pdf por Security Gen
Securing Private 5G Networks (1).pdfSecuring Private 5G Networks (1).pdf
Securing Private 5G Networks (1).pdf
Security Gen14 vistas
Securing the 5G growth story with NFVi.pdf por Security Gen
Securing the 5G growth story with NFVi.pdfSecuring the 5G growth story with NFVi.pdf
Securing the 5G growth story with NFVi.pdf
Security Gen4 vistas
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdf por Security Gen
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdfSecurityGen Telecom network security assessment - legacy versus BAS (1).pdf
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdf
Security Gen16 vistas

Último

2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue por
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlueShapeBlue
50 vistas23 diapositivas
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue por
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueMigrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueShapeBlue
96 vistas20 diapositivas
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 por
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院IttrainingIttraining
80 vistas8 diapositivas
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De... por
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...Moses Kemibaro
29 vistas38 diapositivas
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT por
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITShapeBlue
91 vistas8 diapositivas
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue por
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueShapeBlue
85 vistas54 diapositivas

Último(20)

2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue por ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue50 vistas
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue por ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueMigrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
ShapeBlue96 vistas
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 por IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De... por Moses Kemibaro
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Moses Kemibaro29 vistas
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT por ShapeBlue
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
ShapeBlue91 vistas
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue por ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
ShapeBlue85 vistas
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... por TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc77 vistas
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... por ShapeBlue
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
ShapeBlue74 vistas
State of the Union - Rohit Yadav - Apache CloudStack por ShapeBlue
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStack
ShapeBlue145 vistas
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... por Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
Jasper Oosterveld28 vistas
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... por ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue63 vistas
Data Integrity for Banking and Financial Services por Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely56 vistas
Igniting Next Level Productivity with AI-Infused Data Integration Workflows por Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software344 vistas
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue por ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue46 vistas
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... por James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson133 vistas
NTGapps NTG LowCode Platform por Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu141 vistas
PharoJS - Zürich Smalltalk Group Meetup November 2023 por Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi141 vistas
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T por ShapeBlue
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&TCloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
ShapeBlue56 vistas
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... por ShapeBlue
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
ShapeBlue57 vistas

SecurityGen-Signaling-Threats-in-Latam.pdf

  • 1. The insights shared in this document are drawn from the actual data collected by SecurityGen team across many MNOs (Mobile Network Operators) in the region. SIGNALLING THREATS IN LATAM LATAM Scenario The number of attacks does NOT depend on the size of the country/Mobile Operator. The volume of attacks received by an MNO depends on how vulnerable is the operator’s signaling infrastructure and the efficiency of its protective systems, when available. Attackers will always take the easier path. Unless there is a special contract with specific targets, they will focus on opportunities for a fast cashflow. Hard Truths
  • 2. secgen.com NPN Some Numbers NPN Attack Categories The most common exploited threats were: NPN Considerations The largest category - Fraud - mostly comprises of such attacks against MNOs as grey route and SMS and Billing evasion. Data breach mainly was against subscribers and included IMSI, location data and interception of calls and SMS. In many of those events, cross-protocol attacks were performed either to facilitate or obfuscate the main attack. A minor part in terms of volume, the Operator data breach is still much relevant if you consider the possibility of network mapping and posterior Denial-of-service. Data Breach Subscriber DoS Fraud Operators received from 60 to over 100 thousand attacks daily. MNOs without a well configured firewall protection or not even STP and DEA protection, had an average of 70% of incoming attacks being successfully responded by the network. Due to nature of some attacks (like sweeping), this is expected. When protective measures are executed on the network correctly, successful attacks drop to less than 1%. Data Breach Subscriber DoS Fraud
  • 3. secgen.com UK | Italy | Czech Republic | Brazil | Egypt India | South Korea | Japan | Malaysia | UAE Email: contact@secgen.com Website: www.secgen.com SecurityGen is a global company focused on cybersecurity for telecom security. We deliver a solid security foundation to drive secure telecom digital transformations and ensure safe and robust network operations. Our extensive product and service portfolio provides complete protection against existing and advanced telecom security threats. About SecurityGen Connect With Us Subscriber DoS is not evenly spread worldwide but is unfortunately detected in some countries in the region. If you assume part of the subscribers is IoT equipment used in utilities and security, DoS attacks are considered significant threats to the general public. Want a better understanding of how those threats affect your Operator and how to Identify, Detect and Protect the Network and Subscribers? Just reach out for a clarification session at contact@secgen.com, and we at SecurityGen will be happy to guide you through a completely new approach to securing your Network and Subscribers!