Categories: IntelligenceSecurity

Stingray surveillance devices used to spy on the Norwegian Parliament

A newspaper discovers that bad actors are spying on cell phone communications of Norwegian politicians using the StingRay mobile surveillance equipment.

The journalists of a daily newspaper in Norway have discovered a mobile phone surveillance equipment hidden around the Government and Parliamentary building and apparently there is no information on who has used it. Everyday we read about cyber attacks and surveillance malware used by threat actors to exfiltrate sensitive information from targeted systems, but it is not so common to read about mobile phone surveillance equipment used to spy on targets and left unattended at the crime scene. These devices are very expensive and typically occupy the size of a suitcase, the most sophisticated models can cost several hundred thousand dollars, and the fact that they are easily displaceable makes them useful for espionage activities.

The Aftenposten’s report claimed the newspaper has discovered an IMSI-catchers, also known as stingray, placed inside fake mobile phone stations near government and parliamentary buildings in Oslo. The Aftenposten reported the surprising discovery to the Norwegian National SecurityAuthority (NSM), which is responsible for the national and telecommunications security.

Readers that are interested to know the details of the StingRay technology, the cost of the appliances and their users, could give a look to my article “StingRay Technology: How Government Tracks Cellular Devices

Someone is spying on Government representatives, one the devices was discovered also near the residence of Minister Erna Solberg.

“StingRay is an IMSI-catcher (International Mobile Subscriber Identity) designed and commercialized by the Harris Corporation. The cellular-surveillance system costs as much as $400,000 in the basic configuration, and its price varies with add-ons ordered by the agency.”

The term StingRay is generically used today to refer any similar appliance used to spy on cell phone communications, IMSI-catchers are used by government entities to record conversations and track data traffic of any device in the nearby area.

“The IMSI-catcher is a surveillance solution used by military and intelligence agencies for telephone eavesdropping. It allows for intercepting mobile phone traffic and tracking movements of mobile phone users. Essentially, an IMSI catcher operates as a bogus mobile cell tower that sits between the target mobile phone and the service provider’s real towers. The IMSI catcher runs a Man In the Middle (MITM) attack that could not be detected by the users without using specific products that secure communication on mobile devices.”

In Norway, like in many other countries, the StingRay technology is allowed only to law enforcement and intelligence agencies. Local law framework only permits the NSM, the police, and the Police Security Service to use IMSI-catchers.

The department head at the Norwegian National SecurityAuthority, Hans Christian Pretorius, told to the Aftenposten that the security Agency has started its investigation.

“All the data are not ready yet, but we have also found signals from IMSI-catchers in Oslo.”

Who is behind the attack?

The attribution is quite difficult in these cases, anyway Arne Christian Haugstøyl, the head of Norway’s PST, referred to the The Local that both private actors and state-sponsored hackers could have been involved in the operation.

“I can’t, on the basis of these discoveries, say that it is a foreign intelligence agency, but I can say that we know that foreign intelligence agencies have this kind of capacity,” he said. “And in our preventive work we advise those looking after Norwegian interests not to talk about sensitive issues on mobile phones.”

The use of Stingray technology was a long debated in different countries. “StingRay technology raises serious

“StingRay technology raises serious privacy concerns because of the indiscriminate way it targets cellular devices in a specific area. The dragnet way in which StingRay operates appears to be in contrast with the principle of various laws worldwide.”I wrote in my previous post. “In the US, for example, the Fourth Amendment stands for the basic principle that the US government cannot conduct a massive surveillance operation, also indicated as “general searches”. The Supreme Court recently reiterated that principle in a case involving cell phone surveillance, and confirmed that law enforcement need a warrant to analyze data on the suspect’s cellphone.”

The mobile phone surveillance is a very concerning subject, there is a debated discussion on the used of StingRay IMSI-Catchers and other IMSI-Catcher technologies. Many organizations advocating individual rights are fighting to regulate the adoption of surveillance technologies, but the authorities are often deaf in the name of the Homeland Security.

On the other hand,many projects are proposing solutions to detect mobile surveillance activities, let’s remind for example the recently proposed Detekt tool to scan for state surveillance spyware on phones and PCs, and the app Android IMSI-Catcher Detector (AIMSICD) that was designed to locate and warn users of the presence of IMSI-Catchers.

Pierluigi Paganini

(Security Affairs –  IMSI catcher, StingRay)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

DOJ arrested the founders of crypto mixer Samourai for facilitating $2 Billion in illegal transactions

The U.S. Department of Justice (DoJ) announced the arrest of two co-founders of a cryptocurrency mixer…

3 mins ago

Google fixed critical Chrome vulnerability CVE-2024-4058

Google addressed a critical Chrome vulnerability, tracked as CVE-2024-4058, that resides in the ANGLE graphics…

5 hours ago

Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks

Nation-state actor UAT4356 has been exploiting two zero-days in ASA and FTD firewalls since November…

17 hours ago

Hackers hijacked the eScan Antivirus update mechanism in malware campaign

A malware campaign has been exploiting the updating mechanism of the eScan antivirus to distribute…

23 hours ago

US offers a $10 million reward for information on four Iranian nationals

The Treasury Department's Office of Foreign Assets Control (OFAC) sanctioned four Iranian nationals for their…

1 day ago

The street lights in Leicester City cannot be turned off due to a cyber attack

A cyber attack on Leicester City Council resulted in certain street lights remaining illuminated all…

1 day ago

This website uses cookies.