1、February 2024GSMA Mobile Telecommunications Security Landscape GSMA Mobile Telecommunications Security LandscapeGSMA Mobile Telecommunications Security Landscape GSMA Mobile TelecommunicationsSecurity LandscapeThis is an information paper of the GSMASecurity Classification:Non-confidentialAccess to
2、and distribution of this document is restricted to the persons permitted by the security classification.This document is subject to copyright protection and is to be used only for the purposes for which it has been supplied and information contained in it must not be disclosed or in any other way ma
3、de available,in whole or in part,to persons other than those permitted under the security classification without the prior written approval of the Association.Copyright NoticeCopyright 2024 GSM AssociationDisclaimerThe GSM Association(“Association”)makes no representation,warranty or undertaking(exp
4、ress or implied)with respect to and does not accept any responsibility for,and hereby disclaims liability for the accuracy or completeness or timeliness of the information contained in this document.The information contained in this document may be subject to change without prior notice.Antitrust No
5、ticeThe information contain herein is in full compliance with the GSM Associations antitrust compliance policy.GSMA CTO Foreword 1 GSMA Fraud and Security Group Chair 2 Chair,GSMA Fraud and Security Group&CEO,Copper Horse Ltd 21.Key Points 32.Introduction 53.Attacks on Operators 7 Analysis 84.Attack
6、s on virtualised infrastructure 10 Analysis 105.Supply Chains 12 Analysis 126.Global Title Abuse and Interconnect 14 Analysis 157.Malware&Ransomware 16 Analysis 178.Spyware 18 Analysis 189.Mobile App Security 20 Analysis 2110.New and Repackaged Fraud Types 22 Analysis 2311.The emerging security oper