• Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
Tech News, Magazine & Review WordPress Theme 2017
  • Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
No Result
View All Result
  • Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
No Result
View All Result
Blog - Creative Collaboration
No Result
View All Result
Home Android

Outdated network tech in Chinese state-owned telecom providers are claimed to be putting global data at risk

April 18, 2025
Share on FacebookShare on Twitter

A new report by mobile threat mitigation company iVerify claims to show how older and unencrypted network protocols used by some of the most dominant mobile traffic interconnect providers are allowing hacking groups to access mobile data as it flies from country to country. Maybe even yours.

To make it even worse, these providers are based in China. To Americans, anything related to China is often viewed as bad, but the fact that there are potentially billions of customers using these services is real. Knowing they’ve been compromised is terrifying to many network security professionals.

I take any reports from a company that profits from network security with a grain of salt, but after reading the report in full, the claims sound valid on most counts.


You may like

What is a mobile interconnect provider?

(Image credit: Android Central)

To understand why this matters, you need to know what is being affected. A mobile interconnect provider is exactly what it sounds like — a thing that allows two or more different mobile networks to communicate with each other.

Let’s say you have a Verizon account. You can send and receive anything from another phone using a Verizon account across Verizon’s network, as long as both parties are in Verizon’s service area.

If you’re talking to someone on AT&T, or Orange or are outside of a normal Verizon service area (maybe you’re vacationing) that traffic has to be routed across different networks so it can reach it’s destination.

These interconnect providers use complicated routing and control software to make it happen. Some, such as Chinese state-owned networks China Mobile, China Telecom, China Unicom, CITIC Telecom, and PCCW Global Hong Kong, play a dominant role in routing all this traffic and use software and protocols that are severely outdated and unsafe.

Get the latest news from Android Central, your trusted companion in the world of Android

5G icon

(Image credit: Future)

None of this is speculation. There are multiple real-world examples of how SS7 and Diameter, the unsafe network signaling protocols in question, have been exploited. A group with the ability to exploit this software can access authentication data, SMS messages, location updates, and internet traffic in either real-time for active threats or store it for passive threats.

You probably aren’t a high-value target, yet your data is potentially being stored so it can one day be used against you.

The report also states how this makes it trivial for Chinese government-sponsored hacking groups to operate, but there is no proof given; an attacker can be anywhere in the world and gain access. These companies may be controlled by the Chinese state, but they could also be victims in all this. Victims with the means to make a change, though.

Your data is potentially being stored so it can one day be used against you.

The United States stopped considering Chinese interconnect providers as trusted under the Secure Networks Act so US outbound traffic isn’t routed through any of the companies in question. But if you’re talking to someone in say, South Korea, or the Bahamas, or even Five-Eye intelligence member nation New Zealand anything they send to you might be.

What does all this mean for me?

Android encryption adoption

That’s the easy part, which is great.

This means you should never be sending anything to anyone unless it is end-to-end encrypted. Doing so might mean anyone can take a look at it.

This means everything. Your messages, your bank data, and especially those SMS 2FA codes from companies that do not care about your security enough to use an alternative authentication method. Like my bank (and probably yours, too).

I know I’m not important enough, nor do I have enough money for any big hacking group to care about me. The fact is, you are probably the same. That doesn’t mean we shouldn’t care; one day, I may win Mega-Millions or be elected President.

We can only do what we can, when we can. The real enablers of this sort of mess will do whatever they please.

Next Post

3 new PlayStation Plus games to play this weekend (April 18-20)

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

No Result
View All Result

Recent Posts

  • Gemini Live could become even more impressive thanks to Personal Intelligence
  • Today’s Hurdle hints and answers for March 10, 2026
  • Google makes NotebookLM more useful for students and book lovers
  • Moon phase today explained: What the Moon will look like on March 10, 2026
  • Marvel Rivals implements a “Victim Compensation Protocol” as people are getting paid to throw

Recent Comments

    No Result
    View All Result

    Categories

    • Android
    • Cars
    • Gadgets
    • Gaming
    • Internet
    • Mobile
    • Sci-Fi
    • Home
    • Shop
    • Privacy Policy
    • Terms and Conditions

    © CC Startup, Powered by Creative Collaboration. © 2020 Creative Collaboration, LLC. All Rights Reserved.

    No Result
    View All Result
    • Home
    • Blog
    • Android
    • Cars
    • Gadgets
    • Gaming
    • Internet
    • Mobile
    • Sci-Fi

    © CC Startup, Powered by Creative Collaboration. © 2020 Creative Collaboration, LLC. All Rights Reserved.

    Get more stuff like this
    in your inbox

    Subscribe to our mailing list and get interesting stuff and updates to your email inbox.

    Thank you for subscribing.

    Something went wrong.

    We respect your privacy and take protecting it seriously