US Secret Service Seizes SIM Farms Near New York, Citing Risk to Cellular Networks

CyberSecureFox 🦊

The US Secret Service has seized more than 300 SIM boxes and 100,000 SIM cards across the New York region (New York, New Jersey, and Connecticut). Authorities say the equipment was concentrated within a 35‑mile (56 km) radius of the United Nations General Assembly venue and posed an “immediate threat to national security”, including the theoretical ability to “disable New York’s cellular network.”

Locations and investigative context

Law enforcement reports indicate the SIM farm infrastructure was spread across more than five sites, many in abandoned apartment buildings. According to media briefings, the discovery is connected to an investigation into anonymous phone threats targeting senior US government officials. Investigators believe the capability of the seized systems extended well beyond phone-based intimidation and could facilitate broader telecom disruption and covert communications.

SIM farm threat model: from network overload to covert channels

Officials assess that the network could be used to disrupt mobile base stations, conduct DDoS-style telephony attacks, and enable encrypted, anonymized communications among operators. In practice, SIM farms are commonly deployed to mass-generate calls and SMS, bypass carrier tariffs, and obscure traffic origin—tactics that also complicate attribution during incidents.

Feasible attack scenarios

Mass synchronized calling and SMS floods that overload targeted switching elements, call centers, or specific routing points, degrading availability.

Automated campaigns using rapid SIM rotation to evade carrier anti-fraud filters and rate limits, sustaining malicious traffic at scale.

Covert communications leveraging distributed endpoints and geolocation spoofing to increase anonymity and resilience against takedown.

How SIM boxes work and why they are hard to detect

A SIM box is a multi-channel GSM/UMTS/LTE gateway that hosts tens to hundreds of SIMs and supports remote management, automated rotation, and traffic distribution. When aggregated, these gateways form a SIM farm that scales linearly in call and messaging capacity. Carriers typically rely on behavioral analytics, device fingerprinting, and geolocation anomaly detection to identify such systems. Adversaries counter with traffic normalization, dynamic IMSI/IMEI changes, and distributed load patterns—measures that reduce the effectiveness of static signatures and simple thresholding.

Attribution and the hybrid operations trend

Preliminary findings, as shared by officials, reference potential involvement of “government entities” and individuals “known to federal law enforcement,” leaving open the possibility of foreign intelligence activity. The case underscores a broader trend: telecom infrastructure as a vector in hybrid operations that blend technical disruption (telephony DDoS, signaling abuse) with psychological and social tactics (threat calls, disinformation).

Mitigations for carriers, enterprises, and government

Mobile network operators (MNOs): prioritize real-time anomaly detection, SIM geolocation correlation, outbound rate limiting, and ML-driven models tuned to SIM-box traffic patterns; strengthen cross-operator intelligence sharing and joint action with law enforcement. Industry guidance from telecom associations consistently recommends multi-signal detection (traffic behavior, device identity, routing metadata) to reduce false negatives.

Enterprises: harden voice/SMS channels by adopting MFA methods that do not rely solely on SMS (app-based or FIDO2), deploying voice anti-fraud gateways and call filtering, and exercising business continuity plans that assume temporary telecom congestion or unavailability.

Government agencies and critical services: improve interagency coordination, monitor combined threats that pair telephony floods with cyberattacks on IT services, and run regular exercises simulating mobile network overloads in coordination with carriers and emergency responders.

The New York case highlights how scalable SIM farms can pressure metropolitan communications at critical moments. Strengthened telecom monitoring, proactive anti-fraud controls, and layered authentication significantly reduce risk. Organizations should track developments in the investigation, reassess telecom resilience assumptions, and ensure continuity plans account for sustained call/SMS floods and anonymized traffic patterns that complicate attribution and response.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.