Google added a feature to its Android mobile operating system that allows users to disable 2G connections to reduce the risk of being spoofed by a fraudulent cell tower.
Cellular simulators or “stingrays” pretend to be legitimate cell towers and entice telephones within their range to connect to them. In this way, attackers can carry out man-in-the-middle attacks that exploit the weaknesses of the outdated 2G standard to intercept device information, call recordings, voice and text content and browser history.
2G is the weapon of choice as it is more vulnerable than modern communication technologies such as 4G and 5G, which are more secure. 2G was standardized in the early 1990s at a time when mobility was not yet ubiquitous and the cybersecurity landscape was far less complex.
Two of the biggest problems are that 2G is protected by relatively weak encryption that can be cracked in real-time in transit, and there is no way to verify an authentic base station. That means it’s far…