Star Path
Animated Circle

Your partner in telecom security

shield-left-1shield-left-2
slb-1slb-2
text-circleinner-icon

Here’s Ethon Shields story

Between 2011 and 2014, a technological revolution occurred that disrupted telecommunications: sofware-defned radio (SDR). These devices democratized access to the radio interface, which previously required a signifcant budget to access such tools.

This milestone was seen as a catalyst that would enable new tools for studying communications that were previously unimaginable. This paved the way to study and exploit security vulnerabilities in telecommunications networks, becoming part of a unique arsenal of hacking tools worldwide.

From this commitment to the technological change of SDR, along with prior experience in managed services within telecommunications operators and hacking information technologies, the idea of ETHON SHIELD was born. Company dedicated to exploring the security of telecommunications networks using SDR; including drones, connected cars, 5G networks and a large number of sectors expected to embrace new communication technologies.

main-bg-image
circle-icon

Our Mission & Values

Ethon Shield strongly bets on development and imagination, the pillars we consider necessary to make our way with our own footprint.

Our core values are  creativity, ingenuity, and independence.

Creativity

At Ethon Shield, we develop innovative tools and methodologies for telco hacking audits, ensuring our clients stay ahead of emerging threats.

Ingenuity

Our ingenuity is the practical application of creativity. The complexity of telco infrastructure demand innovative solutions and the ability to tackle challenges with clever approaches.

Independence

Ethon Shield operates independently from mobile network operators and manufacturers, allowing us to maintain an objective perspective in all our audits.

Independence

Ethon Shield operates independently from mobile network operators and manufacturers, allowing us to maintain an objective perspective in all our audits.

Ingenuity

Our ingenuity is the practical application of creativity. The complexity of telco infrastructure demand innovative solutions and the ability to tackle challenges with clever approaches.

Creativity

At Ethon Shield, we develop innovative tools and methodologies for telco hacking audits, ensuring our clients stay ahead of emerging threats.

Why Choose Us ?

  • Specialization

    Ethon Shield is totally specialized in the telecom sector, with  extensive knowledge and skills associated to the sectors infrastructure. Our focus  are audits that focus on protecting the business, products and communication  services.

  • Experience

    Backed by more than 40 years of accumulated experience in the telecom field, Ethon Shield has executed risk assessments services in large operators from Spain, Italy, UK, Norway or Sweden. Our audits also include assessment of commercial mobile, fixed, Wifi, TETRA, RF or IoT networks and services.

  • Neutrality

    Our independence and neutrality from manufactures and mobile network operators ensure an objective report free from third-party influences. By  maintaining this neutrality, we foster trust and transparency in our auditing  process, empowering our clients to make informed decisions that enhance their  security posture and operational effectiveness. Our assessments are designed  solely to protect our clients’ networks.

Research

Ethon Shield is a company that believes in constant research, development and  innovation, generating a unique methodology used in telco security audits.

During the last few years, Ethon Shield has focused on 5G research, which has led to  multiple publications that include thorough investigation in the 5G SIM cards, RAN  networks and CORE networks.

01/

SUCI Probing in the Wild
accordion-icon
July 2024

This paper unveils a vulnerability inherent in the 5G authentication and key agreement procedure that enables the correlation of the IMSI of a victim with the encrypted identity SUCI, labeled as the SUCI-Cracker attack. Through investigation and real-world analysis conducted across commercial 5G SA networks in Europe, the researchers demonstrate the feasibility of correlating IMSI values with encrypted SUCI identities using open-source software and SDR devices.

Download

02/

A Telco Odyssey 5G SUCI Cracker and SCTP Hijacker
accordion-icon
November 2022

This paper introduces multiple attacks on 5G networks and their practical implementation using open-source software.

  • SCTP-Hijacker:The SCTP protocol is still vulnerable to perform a radio node hijacking attack in 5G networks.
  • SUCI-Cracker:The AKA procedure in 5G is still vulnerable to probing attacks, where victims can be identified by relating an IMSI with its encrypted SUCI identity.
  • Downgrade attack:The renowned downgrade attacks still work on 5G networks.
  • SUPI-Catcher:Obtaining the 5G identity with open-source implementations is still possible.
Download

03/

Study of security in 5G mobile networks and attack vectors on subscriber identities
accordion-icon
July 2021

This paper has focused on one of the most renowned attacks on mobile technologies: the IMSI Catcher. The purpose of this attack is to steal the subscriber's identity in order to determine its location, in addition to being able to perpetrate numerous other attacks based on obtaining this number. Pre-5G technologies were vulnerable to these attacks because they sent the customer's identity in plane text, so with knowledge of the various network access procedures, it was possible to attack these vulnerabilities. This attack will be tested in the two main deployments that the fifth generation has, both 5G-NSA and 5G-SA.

Download

International Conferences