Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Rayhunter – Rust tool to detect cell site simulators on an orbic mobile hotspot (github.com/efforg)
177 points by stefankuehnel 10 months ago | hide | past | favorite | 23 comments


I can see why they'd write it for a specific cheap device. Is this stuff possible with a typical phone modem, though; or does it rely on some special features? Forgive my ignorance. :)


Possible, yes, it's just looking at various 3GPP network messages and parsing out a few common anomalies. Accessible, not all the time.

This project uses QMDL (Qualcomm debug logging) on a device with an accessible modem debug port and debug logging enabled. Most older Qualcomm devices have this form of debug logging available by default, but on newer devices, the debug interface is usually more locked down, requiring some degree of shenanigans to access.

Take a look at SnoopSnitch (similar project for Qualcomm Android phones), QCSuper and MobileInsight (tools capable of capturing signaling data from QC and Mediatek phones), and SCAT (capable of capturing signaling data from some Samsung basebands).

Other vendors usually have similar debug modes for their modems, but they often aren't reverse engineered or as easy to access as the Qualcomm ones.


Amazing reply, thank you!


In the blog post[0], they mention it being possible with rooted Androids - so likely possible, just requires more access to what the modem's doing than the OS normally provides. [0]: https://www.eff.org/deeplinks/2025/03/meet-rayhunter-new-ope...


I see the devices vary quite a bit in price on eBay: Verizon, Unlocked, etc. Anyone know if it matters whether locked, Verizon, AT&T, etc.?


How would one test this device to know that it works? It would seem actual cell site simulators would be rare in the wild for many HN readers.


You could bring it to a large festival or even a protest. Law enforcement deploys them all the time. I found one using SnoopSnitch on an Android phone while at a large festival here in Louisiana.


Does that work by comparing known cell sites to found cells sites? I know some StingRay detectors use that method and it's prone to false positives around large events where mobile carriers or 3rd parties bring in legitimate temporary cell sites to improve cell service at the venue and provide more capacity.


Here in Brazil criminals are starting to use those to send phishing SMS, exploiting our ubiquitous mobile payment system (pix) or pretending to be a second authentication factor for banks.


They are quite common in some municipalities. There are folks who talk about this at length in cybersecurity circles every year at conferences, it’s been an issue for a long while and the scope of the problem continues to grow.

The EFF also writes in the topic from time to time. See: https://www.eff.org/deeplinks/2024/06/next-generation-cell-s...


Is it possible to detect these using SDR networks?

https://www.rtl-sdr.com/kiwisdr-tdoa-direction-finding-now-f...


I have no idea. I'm not an RF expert, but I'll ask this the next time I run into one. Great question!


Visit Washington, DC.


iPhone Field Test Mode can be informative, https://www.xda-developers.com/how-access-field-test-mode-io... when combined with open data on cell tower identity, https://opencellid.org

  Dial *3001#12345#*
It can sometimes be informative to turn off Data Roaming in cellular settings.

(e)SIM password can provide an additional layer of control over when the phone contacts a cellular tower.


Wow! Thanks for the information! Very neat!


What's inside the Orbic? Any chance to make this work on a different device. Orbics don't seem to be very easy to get in Europe.


You can buy these off eBay for pretty cheap.

Unlocked RC400L's are going for ~$19.99

Gunna look into getting one and making one of these to play with.


Pretty cool!

I'm wondering if using an imsi catcher is still effective? Most of the time I'm using calling over wifi (VoLTE) or I'm in a car (where an imsi catcher isn't really practical).


The purpose is to track the location of a specific phone using triangulation based on the closes cell towers which receive the phone’s signals. The phone maintains a connection to the nearest cell tower(s) to be on the network in case a call is initiated.

It’s not necessarily intended to intercept, although I believe there were some that downgraded G3 to G2 to be able to potentially do that.

I don’t know whether downgrade attacks are still viable (or needed).


Note that if you are being specifically targeted then a warrant to the provider would presumably net the equivalent of real time 911 location data.

As far as I understand, outside of active interception the only use for these things is warrantless dragnet surveillance of location. (And active interception is increasingly not possible due to better security practices.)


From what Ive read about stingrays here on HN, the device is fooling your cell phone to make a tower connection using the movile network. This does not depend on you making a call, the cell phone is normally doing background activity to connect to cell towers all the time.

IIRC even with airplane mode the stingray can capture phone info, IMEI, GPS location, etc.


> IIRC even with airplane mode the stingray can capture phone info, IMEI, GPS location, etc.

No. Airplane mode turns off the cellular radio's emissions, that's the whole point. A cellular base station emulator isn't going to do anything in that situation.





Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: