Home
/
Blog
/

Fake Roaming Operator Case Studies

Fake roaming operators exploit weaknesses in international telecom interconnects to launch large-scale fraud and surveillance attacks. Here’s how these operations unfold—and what they reveal about persistent telco security gaps.

Research
Nov 6, 2025
Fake Roaming Operator Case Studies

In the global telecom ecosystem, trust is assumed but rarely verified. Every day, legitimate operators exchange signaling messages across borders to enable roaming. But among these trusted players, a few bad actors quietly pose as “roaming partners” to infiltrate networks. These fake roaming operators aren’t just anomalies—they’re a recurring symptom of how telecom trust can be weaponized.

The Anatomy of a Fake Operator

A fake roaming operator is typically registered as a legitimate-looking Mobile Network Code (MNC) or Mobile Country Code (MCC) entity. On paper, it appears to be an authorized partner; in practice, it operates as a fraudulent signaling endpoint used for reconnaissance, interception, or monetization.

These entities often:

  • Acquire or hijack Global Titles (GTs) to send or receive SS7 or Diameter traffic.
  • Build minimal network infrastructure (sometimes virtualized) to maintain credibility.
  • Establish roaming agreements—real or spoofed—with legitimate carriers.

Once inside the global signaling web, these fake nodes behave like insiders, sending location requests, subscriber data queries, or SMS intercept attempts under the guise of lawful traffic.

Case Study 1: The Phantom GRX Partner

In one incident, a European operator observed unexpected signaling flows from what appeared to be a regional MVNO. Upon inspection, the supposed partner had no physical network and was using a leased GRX connection from a third-party hub.

By crafting legitimate-looking MAP SendRoutingInfo and ProvideSubscriberInfo requests, the attacker was able to continuously track subscriber locations and intercept authentication flows. Because the traffic came from a “known” peer, it bypassed perimeter filters until cross-correlation exposed the abnormal request frequency.

Case Study 2: The Revenue Harvest Scheme

Another scenario involved a fake operator exploiting roaming test SIMs to simulate traffic patterns that triggered revenue-sharing fraud. By generating SMS and data sessions between its own IMSI range and compromised partners, it inflated interconnect settlements while exfiltrating call metadata.

Here, the abuse wasn’t about surveillance—it was about profit. Still, the attack used the same foundation: trust between operators and weak identity validation within roaming signaling exchanges.

Case Study 3: The Silent Listener

A particularly stealthy campaign involved an operator identifier allocated in a small jurisdiction. It appeared inactive but was still routed in global signaling directories (GT and SCCP). Threat actors used it to passively listen to MAP dialogues between real operators, gathering intelligence on numbering plans and network topology.

No malware. No breach. Just quiet, lawful-looking traffic flowing through a ghost network.

Why These Attacks Persist

The global signaling fabric—SS7, Diameter, and GTP—is built on assumed legitimacy. The entire roaming ecosystem depends on bilateral trust and slow-moving governance. Fraudulent operators exploit:

  • Lack of real-time validation for new roaming entities.
  • Loose filtering policies on legacy SS7 interconnects.
  • Poorly maintained GT registries and outdated routing tables.

As networks evolve toward 5G, fake operators continue to exploit backward-compatible interfaces and shared roaming hubs, keeping the attack surface wide open.

Lessons from the Field

Fake roaming operators demonstrate that network trust is not a control mechanism—it’s a vulnerability. Effective mitigation starts with:

  • Continuous monitoring of signaling peers and message patterns.
  • Periodic GT and MNC/MCC validation.
  • Cross-protocol anomaly detection across SS7, Diameter, and GTP.
  • Collaboration between operators, regulators, and threat intelligence providers.

The truth is simple: until trust becomes verifiable, fake operators will remain part of the telecom landscape.

Summary
Download our whitepaper

LTE Pwnage: Hacking HLR/HSS and MME Core Network Elements

By clicking download you confirm that you accept our terms and conditions.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Be informed

SS7 Attacker Heaven turns into Riot: How to make Nation-State and Intelligence Attackers’ lives much harder on mobile networks

By clicking download you confirm that you accept our terms and conditions.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Towards Harmonization: Mapping EU Telecom Security Regulations and their evolution

By clicking download you confirm that you accept our terms and conditions.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.