What are Fake Base Stations and their impact in the modern network environment

Liu’s Daily Chronicles
4 min readNov 29, 2023

--

I would like to discuss this topic in depth with the help of Prof. Luo Xiang’s video on Fake Base Stations. Although the video mentions the potential hazards of pseudo-base stations, I believe that these hazards may have been over-exaggerated in the current technological environment.

How Fake Base Station Works

Fake base stations mainly target 2G (GSM) networks. Let’s briefly review how a Fake BTS works:

  1. Detection and Disguise: Use special equipment to detect the communication parameters of real base stations, and then set the pseudo-base stations to the same parameters in order to trick cell phones into connecting.
  2. Capturing a cell phone: By increasing the power of the transmitted signal, the cell phone mistakenly believes it has entered a new service area, causing it to disconnect from the real base station and connect to the fake base station.
  3. Sending SMS: Once a cell phone is connected to a pseudo-base station, criminals can use computer software to send out mass text messages through the phone’s IMEI code.
  4. Break Connection: After sending a text message, the pseudo base station will cut off the connection with the cell phone, forcing the phone to find and connect to the real base station again.

Application Scenarios of Fake Base Station

Fake base stations are used in a variety of applications, ranging from SMS to the more serious SMS fraud:

  1. SMS: The use of pseudo-base stations for advertisements or mass messages, bypassing the cost of operators.

2. SMS Fraud: Fraudulent SMS messages sent under the disguise of an official organization or bank to defraud users of their funds.

3. Targeted fraud: Fraudulent text messages are sent in specific areas, such as corporate campuses, disguised as the numbers of leaders or colleagues.

Impact of the modern network environment on pseudo-base stations

In 3G and higher network standards, communication between cell phones and base stations includes a two-way authentication mechanism that significantly improves security. In addition, so-called 4G pseudo-base stations, which actually refer to network jammers or signal blockers, force cell phones to fall back to the more easily attacked 2G network by interfering with normal signals. However, the cost and technical difficulty of such operations are relatively high.

Why Fake Base Stations Are Becoming Less Dangerous

  1. Development of Networks: 2G networks are declining in importance as 5G networks become more widespread.

2. Device updates: Many cell phone manufacturers provide the option to turn off the 2G network in their devices, reducing the chances of attacks by fake base stations.

3. Operator’s Adjustment: Some operators started to shut down 2G base stations, which enhanced the overall security of the network. Operator base stations have the ability to recognize neighboring base stations.

user recommendation

  • Upgrading your device: In light of the phasing out of 2G networks, it’s wise to upgrade to a device that supports 3G or higher networks.
  • Be wary of SMS content: Don’t trust the content of any unverified SMS messages, especially those involving personal information and financial interests.

summarize

The danger of Fake Base Station exists, but its impact is diminishing in the current network environment. Understanding how it works and how to deal with it is very important for all of us. I hope this video will help you better understand Fake Base Station and how to protect yourself from it.

--

--

No responses yet