Rogue Cell Towers

The Bastille Research Team proactively monitors for new radio-borne threats. Their breakthrough research and discoveries such as MouseJack and KeySniffer help to keep not just Bastille clients, but the larger ecosystem safe. Each month, Bastille Research reports on and ranks the most prevalent and most pernicious attacks.

Rogue Cell Towers AKA Stingrays, IMSI Catchers. Rogue cell towers are used to hijack cellphone connections, allowing attackers to listen to calls and read texts. An attacker can even push malware to a vulnerable phone to hack it.  A common use of Rogue Cell towers is to break 2-factor authentication. 

To learn more about finding rogue cellular devices and other RF-enabled devices operating in your environment read the Bastille data sheet or request a Bastille demo.

Learn more about other Internet of Radios vulnerabilities