GSMA Mobile Telecommunications Security Landscape 2024 Report: Interactive Diagram

Mobile Telecommunications Threat Landscape Report 2024


Immerse yourself in the sixth annual Mobile Telecommunications Security Landscape report by exploring our interactive city diagram and discover more about last year’s security vulnerabilities and threats.

Click on each icon to see each threat in context & the solution offered, then read the relevant section of the report for the full picture.

Fill out the form at the bottom of the page to download the entire report.

Operator threat icon
Operator threats

Attacks on Operators

In order to establish and operate effective security defences, it is necessary to understand the assets that make up the network’s attack surface.

Virtualised infrastructure threat icon
Virtualised infrastructure threat icon

Virtualised infrastructure attacks

With the rollout of 5G, the industry is migrating to cloud-based network elements and infrastructure.

Supply Chain threat icon
Supply Chain threats

Supply Chains

A MNO’s supply chain can be broken down into a number of components – from hardware to software - the parties involved in putting together products and services and the upkeep and maintenance of a network.

Title abuse threat icon
Title abuse threats

Global Title Abuse and Interconnect

Signalling systems, such as Signalling System #7 (SS7), are required in some mobile networks to route calls, establish location and access account information and are an evolution of the signalling systems designed for older fixed networks but augmented to facilitate mobility and roaming.

Title abuse threat icon
Title abuse threats

Global Title Abuse and Interconnect

Signalling systems, such as Signalling System #7 (SS7), are required in some mobile networks to route calls, establish location and access account information and are an evolution of the signalling systems designed for older fixed networks but augmented to facilitate mobility and roaming.

Malware threat icon
Malware Chain threats

Malware & Ransomware

The wide reporting and severe nature of many malware and ransomware attacks mean this threat continues to be a major security consideration for MNOs and other enterprises.

Spyware threat icon
Spyware threats

Spyware

Commercial spyware is a form of malware that is designed to steal confidential data from the device or appliance it is running on or to access real-time service on the device.

App security threat icon
App security threats

Mobile App Security

Now there are more than 6.7 billion smartphones in use worldwide, with 5% growth year-on-year, the need for a strengthened mobile application security posture is more evident than ever.

New and Repackaged Fraud Types icon
New and Repackaged Fraud Type threats

New and Repackaged Fraud Types

Securing mobile infrastructure, devices, services and customers is an evolving activity, as threat actors constantly re-invent previous attack techniques, as well as inventing new attack types.