5G/6G Academy
5G/6G AcademyTelecom certifications · since 2009
5G Security

5G Security · Pro

Real-world: How SUCI prevents IMSI catching

The 4G Vulnerability

IMSI catchers have been used by law enforcement and malicious actors for decades. In 4G, the attack is straightforward: a rogue base station sends an Identity Request asking for the IMSI. The UE has no choice but to respond with its permanent identity in cleartext because the protocol mandates it before security is established. The attacker captures the IMSI of every device in range, enabling subscriber tracking, movement profiling, and in some cases call interception. Commercially available IMSI catchers made this attack accessible to anyone with modest technical resources.

Continue reading with Pro

Your free trial has ended. Subscribe to unlock the full lesson plus all 26 advanced levels, 732 lessons, labs, and 17 TELCOMA certification exams.

From $99/year·7-day money-back guarantee·Cancel anytime