In the latest communications setback to hit the Russian military, the Security Service of Ukraine (abbreviated as SBU) claims to have captured a hacker who was helping to provide communications services for Russian troops inside Ukrainian territory, VICE reports.
The SBU shared details in a tweet and Telegram message posted at around 10AM local time (4AM ET), including pictures alleged to show the hacker and their communications system, though the reports have not been independently confirmed.
According to the SBU’s Telegram post, the hacker was helping to route calls from within Russia to the mobile phones of Russian troops in Ukraine, and also sending text messages to Ukrainian security officers and civil servants proposing they surrender.
Images shared by the SBU claim to show hardware and software being used for these activities, and appear to be consistent with a relay system for voice and SMS communications.
In a tweet thread, Cathal Mc Daid, CTO at Adaptive Mobile Security, explained the devices used and their significance. Mc Daid said that the system was comprised of a SIM box server that could switch among 128 different SIM cards, paired with GSM gateways for connecting voice calls and SMS messages to a local mobile network, and unknown software to handle messaging and call forwarding.
Mc Daid also said such systems were unreliable and should not be used for military communications.
The use of insecure, civilian-grade communications systems now seems par for the course for Russian troops operating in Ukraine. Since the invasion began, numerous reports have emerged of Ukrainian security forces intercepting messages sent between Russian military units, a feat made possible by the lack of encryption on Russian communications.
Early on in the invasion, Russian troops reportedly reduced their own ability to use encrypted phone handsets by destroying local 3G and 4G masts, knocking out the mobile data networks that the phones rely on. With the Russian military relying on unencrypted comms, Ukrainian intelligence services were able to intercept sensitive communications and in some cases broadcast them to the world — as happened with reports of the death of Russian general Vitaly Gerasimov.
Images from the conflict that were shared on social media also suggested that in some cases Russian troops were using unencrypted handheld radios for battlefield communications. The Russian Ministry of Defense previously implied that it had issued encrypted tactical radios to the majority of the Russian armed forces, but analysts at the Royal United Services Institute (a British defense and security think tank) observed there are indications that the delivery of the radios has been hampered by corruption.
The outdated and poorly maintained nature of Russian communications devices also appears to be mirrored by the condition of much of the heavy equipment being used by the Russian military, even as troops embark on crucial military operations like the assault on the Ukrainian capital, Kyiv. Reporting from the battlefield by the Washington Post indicates that some of the Russian tank units are operating Soviet-era T-72 vehicles, a model first produced more than 50 years ago.
However, in spite of many technical and logistical glitches, Russian forces heavily outnumber the Ukrainian military, and show no signs of lessening their assault as the war pushes into a dangerous new phase.
Source: https://www.theverge.com/2022/3/15/22979381/phone-relay-capture-russia-military-unencrypted-communications-ukraine