Penetration testing for a US Telco leader

The ever-growing tech security risks require mobile service providers to adapt constantly. One such provider reached out to improve the security of their mobile devices. Being experts on all things mobile, we were the right team for the task.

telco 1 1 1

SHORT
summary

Industry

Telecommunications

Location

United States

Timeline

7 months

Services

Penetration testing

Team

1 R&D engineer

Our client has over 150 million network subscribers, making them a market leader in their field. They wanted to ensure top-of-the-line security for their mobile devices and protect their users from both hardware and software attacks.

The challenge

There are roughly 100+ mobile phone models across the most notable mobile manufacturers (Samsung, Apple, Huawei..). If you’re a mobile provider, making sure all of those phones are secure is a challenge, to say the least.

The sheer number of potential security scenarios could be a nightmare to deal with.

So they needed proven experts to give their mobile devices a green security light. 


The solution

We’ve planned a series of penetration tests to test out the defenses of various devices. Only until we’ve rigorously tested each device, could it be fit for further use.

Telco penetration testing 2

How we got there

We’ve received the phones in batches from halfway across the world, starting with the easiest batch, and ending with what the client deemed the hardest. And here’s how that went:

1st batch — It consisted of their old mobile devices already in use. We’ve managed to break into more than 90% of them. That’s bad news.

2nd batch — This was a harder nut to crack since the devices had less obvious vulnerabilities and we had less time due to deadlines.

3rd batch — Here, we saw a lot of new prototypes which we could barely break due to a lack of firmware for the prototypes and no active fastboot mode.

4th batch — The final prototype batch was also the strongest in terms of security. We couldn’t find a way to break them, which meant the client was moving in the right direction.

We communicated with the client regularly, with weekly reports and meetings every 5 days. 

telco 1 3 21 1
telco 1 3 13

Our impact

OS penetration testing

We’ve used methods such as Man-in-the-middle and bypassing certificate pinning to test out the defenses of each mobile device.

Hardware penetration testing

By identifying specific pins on the phone motherboard, we would create a short circuit, sending the phone into debug mode.

This meant all defenses were down and a potential attacker could do whatever they wanted.

Security consulting

When all of our meticulous testing was said and done, we prepared a detailed report with our findings while also consulting them on which security practices they should implement.

Outcome

Our findings on the strengths and weaknesses of different mobile phone brands helped the client make decisions that directly impacted their bottom line.

On top of that, we’ve found many vulnerabilities that potential attackers could exploit. But thankfully, we’ve found them first and guided the client toward the right solutions.

10

4

models passed our tests

WANT A SERVICE JUST LIKE THIS? — LET’S TALK

Just fill in the short form below, or skip to the bottom to arrange a chat directly with our client strategy specialist. Either way, we’ll be back in touch as soon as we can to arrange an informal call.

Don’t worry, any information you give us will only be stored for business purposes. Find out more in our Privacy Policy.


or
Ivor Cindric

Arrange a chat with Ivor, our client strategy specialist.

More case studies