Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

U.S. Secret Service Dismantles 300 SIM Servers and 100,000 SIM Cards

Posted on September 23, 2025September 23, 2025 By CWS

The U.S. Secret Service has dismantled a large, subtle community of digital gadgets within the New York tristate space, thwarting what it described as an “imminent menace” to senior U.S. authorities officers and the company’s protecting operations.

The operation led to the seizure of over 300 SIM servers and 100,000 SIM playing cards that might have been used to launch large-scale telecommunications assaults, together with disabling mobile phone towers.

The invention was made as a part of a protecting intelligence investigation that uncovered a number of websites housing the tools. These gadgets had been strategically positioned inside 35 miles of the United Nations Basic Meeting, which is presently underway in New York Metropolis, heightening the urgency of the intervention.

Authorities imagine the community was able to finishing up operations that embrace disabling mobile phone towers, denial-of-service (DoS) assaults, and offering encrypted communication channels for legal enterprises and hostile actors.

Subtle Community of Malicious Units

The size of the operation underscores the potential for extreme disruption. Investigators discovered rooms stuffed with racks of SIM servers, also referred to as SIM banks.

These gadgets are designed to carry and handle hundreds of SIM playing cards concurrently, permitting operators to automate mobile actions, spoof caller IDs, and route communications via an enormous net of untraceable numbers.

This infrastructure may have been weaponized to overwhelm mobile networks, making a communications blackout in a important metropolitan space.

SIM card farm

Along with making nameless threats in opposition to high-profile people, the community’s capabilities offered a big threat to public security and nationwide safety.

The flexibility to disable mobile phone towers may cripple emergency providers, disrupt monetary markets, and sow widespread chaos, significantly throughout a high-stakes occasion just like the UN Basic Meeting, which brings quite a few world leaders to the town.

The U.S. Secret Service moved swiftly to dismantle the community given the timing, location, and the grave potential for disruption.

SIM card farm

Whereas the forensic examination of the seized gadgets continues to be in its early phases, preliminary evaluation has uncovered alarming connections.

In line with the Secret Service, early findings point out mobile communications between identified nation-state menace actors and people already on the radar of federal regulation enforcement.

This hyperlink suggests the operation could have been a part of a overseas intelligence or state-sponsored marketing campaign to undermine U.S. safety pursuits.

The investigation is being led by the U.S. Secret Service’s Superior Menace Interdiction Unit, a newly shaped part devoted to neutralizing probably the most vital and imminent threats in opposition to its protectees.

“The potential for disruption to our nation’s telecommunications posed by this community of gadgets can’t be overstated,” stated U.S. Secret Service Director Sean Curran.

“The U.S. Secret Service’s protecting mission is all about prevention, and this investigation makes it clear to potential unhealthy actors that imminent threats to our protectees shall be instantly investigated, tracked down and dismantled.”

The continued investigation entails shut collaboration with a number of key companions, together with the Division of Homeland Safety’s Homeland Safety Investigations, the Division of Justice, the Workplace of the Director of Nationwide Intelligence, and the NYPD, together with different state and native regulation enforcement businesses that supplied technical recommendation and help.

As forensics specialists proceed to investigate the seized {hardware}, extra particulars are anticipated to emerge in regards to the full scope of the community, its meant targets, and the overseas entities behind it.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Cards, Dismantles, Secret, Servers, Service, SIM, U.S

Post navigation

Previous Post: 2/3 of Organizations Fear Identity Attacks, But Blind Spots Remain
Next Post: Threat Actors with Fake Job Lures Attacking Job Seekers to Deploy Advanced Malware

Related Posts

Threat Actors Allegedly Listed Windows Zero-Day RCE Exploit For Sale on Dark Web Cyber Security News
AI-Powered Cybersecurity Tools Can Be Turned Against Themselves Through Prompt Injection Attacks Cyber Security News
Chinese Hackers Exploit SAP RCE Vulnerability to Upload Supershell Backdoors Cyber Security News
New Veeam Themed Phishing Attack Using Weaponized Wav File to Attack users Cyber Security News
Top 10 Best Privileged Access Management (PAM) Tools in 2025 Cyber Security News
Top Ransomware Actors Actively Attacking Financial Sector, 406 Incidents Publicly Disclosed Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Libraesva Email Security Gateway Vulnerability Exploited by Nation-State Hackers
  • Hackers Exploit Pandoc CVE-2025-51591 to Target AWS IMDS and Steal EC2 IAM Credentials
  • Kali Linux 2025.3 Released With New Features and 10 New Hacking Tools
  • State-Sponsored Hackers Exploiting Libraesva Email Security Gateway Vulnerability
  • Chrome High-severity Vulnerabilities Let Attackers Access Sensitive Data and Crash System

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Libraesva Email Security Gateway Vulnerability Exploited by Nation-State Hackers
  • Hackers Exploit Pandoc CVE-2025-51591 to Target AWS IMDS and Steal EC2 IAM Credentials
  • Kali Linux 2025.3 Released With New Features and 10 New Hacking Tools
  • State-Sponsored Hackers Exploiting Libraesva Email Security Gateway Vulnerability
  • Chrome High-severity Vulnerabilities Let Attackers Access Sensitive Data and Crash System

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News