Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026

Badges, Bytes and Blackmail

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Cell Tower Hacking Gear Seized Ahead of UN General Assembly
Cyber Security

Cell Tower Hacking Gear Seized Ahead of UN General Assembly

Team-CWDBy Team-CWDSeptember 24, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


The US Secret Service has found and dismantled a network of electronic devices that could be used to shut down the cellular network in New York City.

The equipment, discovered across multiple sites throughout the New York tristate area (New York, New Jersey and Connecticut), included 300 co-located SIM servers and 100,000 SIM cards.

In a statement published on September 23, the Secret Service said the gear had been used to conduct multiple telecommunications-related threats directed towards senior US government officials.

It could be used to disable cell phone towers, enable denial-of-services (DoS) attacks and facilitate anonymous, encrypted communication between potential threat actors and criminal enterprises.

These devices were concentrated within 35 miles of the global meeting of the United Nations General Assembly, which was then about to start in New York City.

“Given the timing, location and potential for significant disruption to New York telecommunications posed by these devices, the agency moved quickly to disrupt this network,” the Secret Service said.

The Secret Service dismantled a network of more than 300 SIM servers and 100,000 SIM cards in the New York-area that were capable of crippling telecom systems and carrying out anonymous telephonic attacks, disrupting the threat before world leaders arrived for the UN General… pic.twitter.com/sZKUeGqvGY

— U.S. Secret Service (@SecretService) September 23, 2025

The effort was led by the agency’s Advanced Threat Interdiction Unit, a new section dedicated to disrupting the most significant and imminent threats to American citizens.

While an investigation is still ongoing, early analysis indicates that nation-state threat actors have been in contact with individuals known to federal law enforcement.

In the statement, Sean Curran, the US Secret Service director, emphasized that the potential for disruption to the US telecommunications posed by this network of devices “cannot be overstated.”

“This investigation makes it clear to potential bad actors that imminent threats to our protectees will be immediately investigated, tracked down and dismantled,” he added.

The Secret Service is collaborating with a number of federal and local law enforcement agencies on the investigation, including the Department of Homeland Security’s (DHS) Homeland Security Investigations, the Department of Justice (DoJ), the Office of the Director of National Intelligence (ODNI) and the New York Police Department (NYPD).





Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSelf-Replicating Worm Hits 180+ npm Packages to Steal Credentials in Latest Supply Chain Attack
Next Article Phoenix RowHammer Attack Bypasses Advanced DDR5 Memory Protections in 109 Seconds
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Look out for phony verification pages spreading malware

September 14, 2025

Find your weak spots before attackers do

November 21, 2025

Why the tech industry needs to stand firm on preserving end-to-end encryption

September 12, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.