Spectrum of Violence: Mobile Network-enabled Attacks in Hybrid Warfare

In this white paper, AdaptiveMobile Security, an Enea company, outlines emerging mobile network attack strategies in Hybrid Warfare including a newly revealed HiddenArt mobile threat actor. 


Cyber Warfare Against National Critical Infrastructure

Use of Mobile Network attacks as part of a warfare strategy

This paper provides a comprehensive analysis of the usage of mobile networks for various cyber-attacks as part of a warfare strategy.

  • Introducing what Hybrid warfare is, and the role that cyber-attacks play in it.
  • Describing the types of threats encountered on mobile core networks today. 
  • Outlining how attacks on mobile networks, as part of a hybrid warfare strategy, could happen.
  • Reviewing previous history of the usage of mobile networks for surveillance, call interception and Denial of Service incidents
  • Sharing details of recent attacks by a signaling threat actor/platform we call HiddenArt
  • Providing a list of recommendations for mobile operators, regulators, and government agencies on how to protect critical communication network infrastructure from weaponization by state-level threat actors, surveillance companies, and attacks by Organized Crime Groups (OCGs).

“The supreme art of war is to subdue the enemy without fighting.”
-Sun Tzu

“Malicious mobile network signaling attacks must be recognized as a state-level cyber threat to individual nations as well as to collective security, and an integral component of hybrid warfare. Mobile Networks form part of the Critical National Infrastructure of a state, we aim to highlight the increasingly profound implications of vulnerabilities in insufficiently-protected telecom network infrastructure for the security and stability of societies, economies, and states into the future.”

Enea AdaptiveMobile Security


Why is hybrid warfare a threat to national security?

Hybrid wars aim to undermine the target through military and non-military attacks such as cyberattacks against vulnerable telecom network infrastructures, representing a serious threat to the security and stability of countries, their economies and people into the future.

What forms can cyber warfare attacks on mobile networks take?

Threat actors can attack core network vulnerabilities to attain and further amplify advantage in offensive military operations. The form that cyber network attacks can take varies, but at a high level the following are possible:

  • Surveillance/location tracking
  • Message/Call/Data Interception
  • Fraud (against the operator or the subscriber)Phishing* (malware delivery)
  • Denial of Service
  • Information harvesting

Cyber Warfare

Mobile Network-enabled Attacks in Hybrid Warfare

Download the white paper now!

AdaptiveMobile Security, an Enea company

Cyber & Telecom Security

AdaptiveMobile Security, an Enea company is the world leader in mobile network security, protecting more than 2.1 billion subscribers worldwide. With deep expertise and a unique focus on network-to-handset security, AdaptiveMobile’s award-winning security solutions and services provide its customers with advanced threat detection and actionable intelligence, combined with the most comprehensive security product-set in the market today.

AdaptiveMobile Security was founded in 2006 and counts some of the world’s largest carriers, Governments and Regulators as customers. The Company is headquartered in Dublin with offices in North America, Europe, South Africa, the Middle East and Asia Pacific.

Protecting Every Nation! Every Network! Every Number!