{
	"id": "5d5795b3-3ea0-430e-a285-a33a512a6fae",
	"created_at": "2026-04-06T01:31:16.819056Z",
	"updated_at": "2026-04-10T03:21:27.727819Z",
	"deleted_at": null,
	"sha1_hash": "e7b44e67b993cf2791a7a5723161ee5f5a5fe85f",
	"title": "CEL-38 · Mobile Threat Catalogue",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 48029,
	"plain_text": "CEL-38 · Mobile Threat Catalogue\r\nArchived: 2026-04-06 01:17:18 UTC\r\nMobile Threat Catalogue\r\nObtaining Device Location via SS7 Exploit\r\nContribute\r\nThreat Category: Carrier Interoperability\r\nID: CEL-38\r\nThreat Description: Tracking of device locations by exploiting network weaknesses.\r\nThreat Origin\r\nSCTPscan - Finding Entry Points to SS7 Networks \u0026 Telecommunication Backbones 1\r\nGSM Sniffing 2\r\nToward the HLR: Attacking the SS7 \u0026 SIGTRAN Applications 3\r\nMobile Self Defense 4\r\nExploit Examples\r\nNot Applicable\r\nCVE Examples\r\nNot Applicable\r\nPossible Countermeasures\r\nMobile Network Operator\r\nSS7 Firewalls may be deployed throughout the network. See Securing SS7 Telecommunications Networks 5\r\nReferences\r\n1. P. Langlois, SCTPscan - Finding Entry Points to SS7 Networks \u0026 Telecommunication Backbones,\r\npresented at Blackhat EU, 29 Mar. 2007; www.blackhat.com/presentations/bh-europe-07/Langlois/Presentation/bh-eu-07-langlois-ppt-apr19.pdf [accessed 8/23/2016] ↩\r\nhttps://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-38.html\r\nPage 1 of 2\n\n2. K. Nohl, GSM Sniffing, 27th Chaos Communication Congress, Dec. 2010;\r\nhttps://events.ccc.de/congress/2010/Fahrplan/attachments/1783_101228.27C3.GSM-Sniffing.Nohl_Munaut.pdf [accessed 8/23/2016] ↩\r\n3. P. Langlois, Toward the HLR: Attacking the SS7 \u0026 SIGTRAN Applications, presented at H2HC, Dec.\r\n2009; www.h2hc.org.br/repositorio/2009/files/Philippe.en.pdf [accessed 8/23/2016] ↩\r\n4. K. Nohn, Mobile Self-Defense, presented at 31st Chaos Communication Congress, 27 Dec. 2014;\r\nhttps://events.ccc.de/congress/2014/Fahrplan/system/attachments/2493/original/Mobile_Self_Defense-Karsten_Nohl-31C3-v1.pdf [accessed 8/29/2016] ↩\r\n5. G. Lorenz et al., “Securing SS7 Telecommunications Networks”, in Workshop on Information Assurance\r\nand Security vol. 2, 2001; https://citeseerx.ist.psu.edu/viewdoc/download?\r\ndoi=10.1.1.480.2222\u0026rep=rep1\u0026type=pdf [accessed 8/1/2022] ↩\r\nSource: https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-38.html\r\nhttps://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-38.html\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://pages.nist.gov/mobile-threat-catalogue/cellular-threats/CEL-38.html"
	],
	"report_names": [
		"CEL-38.html"
	],
	"threat_actors": [],
	"ts_created_at": 1775439076,
	"ts_updated_at": 1775791287,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/e7b44e67b993cf2791a7a5723161ee5f5a5fe85f.pdf",
		"text": "https://archive.orkl.eu/e7b44e67b993cf2791a7a5723161ee5f5a5fe85f.txt",
		"img": "https://archive.orkl.eu/e7b44e67b993cf2791a7a5723161ee5f5a5fe85f.jpg"
	}
}