{"guid":"xdX27wLbHpeOU_dSgBO4Hg","title":"Mobile network attack evolution","subtitle":null,"slug":"30C3_-_5449_-_en_-_saal_1_-_201312271715_-_mobile_network_attack_evolution_-_karsten_nohl_-_luca_melette","link":"http://events.ccc.de/congress/2013/Fahrplan/events/5449.html","description":"Mobile networks should protect users on several fronts: Calls need to be encrypted, customer data protected, and SIM cards shielded from malware.\n\nMany networks are still reluctant to implement appropriate protection measures in legacy systems. But even those who add mitigations often fail to fully capture attacks: They target symptoms instead of solving the core issue.\n\nThis talks discusses mobile network and SIM card attacks that circumvent common protection techniques to illustrate the ongoing mobile attack evolution.\n","original_language":"eng","persons":["Karsten Nohl","Luca Melette"],"tags":["30c3","Security \u0026 Safety"],"view_count":2329,"promoted":false,"date":"2013-12-27T01:00:00.000+01:00","release_date":"2013-12-31T01:00:00.000+01:00","updated_at":"2026-02-26T09:45:07.066+01:00","length":2973,"duration":2973,"thumb_url":"https://static.media.ccc.de/media/congress/2013/5449-h264-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2013/5449-h264-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2013/xdX27wLbHpeOU_dSgBO4Hg-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2013/xdX27wLbHpeOU_dSgBO4Hg-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/30C3_-_5449_-_en_-_saal_1_-_201312271715_-_mobile_network_attack_evolution_-_karsten_nohl_-_luca_melette","url":"https://api.media.ccc.de/public/events/xdX27wLbHpeOU_dSgBO4Hg","conference_title":"30C3","conference_url":"https://api.media.ccc.de/public/conferences/30c3","related":[{"event_id":185,"event_guid":"import-c09aabf3b80f40f452","weight":9},{"event_id":1203,"event_guid":"import-fc58b881c2cf74003e","weight":16},{"event_id":1274,"event_guid":"import-b24e96b14b74162533","weight":10},{"event_id":1405,"event_guid":"import-9a084512d1ad9e7a7a","weight":18},{"event_id":1520,"event_guid":"import-70c32b8bc4f7a9b0a7","weight":16},{"event_id":2156,"event_guid":"-n9QScyDLXMEwkqrCHASYw","weight":31},{"event_id":2157,"event_guid":"szHEwO2pazLIG7w8wQTa1w","weight":80},{"event_id":2173,"event_guid":"13hAy7IIWod2RIuLMvnELw","weight":9},{"event_id":2475,"event_guid":"2b3d8f9e-7169-457a-b2db-834282f437f4","weight":24},{"event_id":3633,"event_guid":"530f0400-e4e8-4d99-909d-4cfc8121c0b0","weight":11}],"recordings":[{"size":null,"length":null,"mime_type":"application/x-subrip","language":"eng","filename":"30c3-5449-en-Mobile_network_attack_evolution.en.srt","state":"complete","folder":"","high_quality":true,"width":null,"height":null,"updated_at":"2021-02-21T17:45:21.095+01:00","recording_url":"https://cdn.media.ccc.de/congress/2013/30c3-5449-en-Mobile_network_attack_evolution.en.srt","url":"https://api.media.ccc.de/public/recordings/44355","event_url":"https://api.media.ccc.de/public/events/xdX27wLbHpeOU_dSgBO4Hg","conference_url":"https://api.media.ccc.de/public/conferences/30c3"},{"size":null,"length":2973,"mime_type":"video/mp4","language":"eng","filename":"30c3-5449-en-Mobile_network_attack_evolution_h264-hq.mp4","state":"downloaded","folder":"mp4","high_quality":true,"width":640,"height":360,"updated_at":"2016-01-27T11:04:00.553+01:00","recording_url":"https://cdn.media.ccc.de/congress/2013/mp4/30c3-5449-en-Mobile_network_attack_evolution_h264-hq.mp4","url":"https://api.media.ccc.de/public/recordings/3773","event_url":"https://api.media.ccc.de/public/events/xdX27wLbHpeOU_dSgBO4Hg","conference_url":"https://api.media.ccc.de/public/conferences/30c3"},{"size":null,"length":2973,"mime_type":"audio/opus","language":"eng","filename":"30c3-5449-en-Mobile_network_attack_evolution_opus.opus","state":"downloaded","folder":"opus","high_quality":true,"width":0,"height":0,"updated_at":"2014-11-11T12:42:54.958+01:00","recording_url":"https://cdn.media.ccc.de/congress/2013/opus/30c3-5449-en-Mobile_network_attack_evolution_opus.opus","url":"https://api.media.ccc.de/public/recordings/4754","event_url":"https://api.media.ccc.de/public/events/xdX27wLbHpeOU_dSgBO4Hg","conference_url":"https://api.media.ccc.de/public/conferences/30c3"},{"size":null,"length":2946,"mime_type":"audio/mpeg","language":"eng","filename":"30c3-5449-en-Mobile_network_attack_evolution_mp3.mp3","state":"downloaded","folder":"mp3","high_quality":true,"width":640,"height":360,"updated_at":"2014-06-29T00:22:21.810+02:00","recording_url":"https://cdn.media.ccc.de/congress/2013/mp3/30c3-5449-en-Mobile_network_attack_evolution_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/3774","event_url":"https://api.media.ccc.de/public/events/xdX27wLbHpeOU_dSgBO4Hg","conference_url":"https://api.media.ccc.de/public/conferences/30c3"},{"size":null,"length":2973,"mime_type":"video/webm","language":"eng","filename":"30c3-5449-en-Mobile_network_attack_evolution_webm.webm","state":"downloaded","folder":"webm","high_quality":true,"width":640,"height":360,"updated_at":"2016-01-27T11:04:00.586+01:00","recording_url":"https://cdn.media.ccc.de/congress/2013/webm/30c3-5449-en-Mobile_network_attack_evolution_webm.webm","url":"https://api.media.ccc.de/public/recordings/3772","event_url":"https://api.media.ccc.de/public/events/xdX27wLbHpeOU_dSgBO4Hg","conference_url":"https://api.media.ccc.de/public/conferences/30c3"},{"size":null,"length":2973,"mime_type":"video/mp4","language":"eng","filename":"30c3-5449-en-Mobile_network_attack_evolution_h264-hd.mp4","state":"downloaded","folder":"mp4-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-01-26T08:07:11.623+01:00","recording_url":"https://cdn.media.ccc.de/congress/2013/mp4-hd/30c3-5449-en-Mobile_network_attack_evolution_h264-hd.mp4","url":"https://api.media.ccc.de/public/recordings/4533","event_url":"https://api.media.ccc.de/public/events/xdX27wLbHpeOU_dSgBO4Hg","conference_url":"https://api.media.ccc.de/public/conferences/30c3"},{"size":null,"length":2973,"mime_type":"video/mp4","language":"eng","filename":"30c3-5449-en-Mobile_network_attack_evolution_h264-iprod.mp4","state":"downloaded","folder":"mp4-lq","high_quality":false,"width":512,"height":288,"updated_at":"2016-01-26T08:07:14.517+01:00","recording_url":"https://cdn.media.ccc.de/congress/2013/mp4-lq/30c3-5449-en-Mobile_network_attack_evolution_h264-iprod.mp4","url":"https://api.media.ccc.de/public/recordings/4618","event_url":"https://api.media.ccc.de/public/events/xdX27wLbHpeOU_dSgBO4Hg","conference_url":"https://api.media.ccc.de/public/conferences/30c3"}]}