Stealth Phones: your complete guide
  • Home
  • The List
  • The Black List
  • About
  • Contact
  • Blog

Beware Anonymous SIM Scams

4/5/2021

0 Comments

 
Anonymous SIM card scam
​If you cannot convince them, confuse them. This is the basic for selling lies. And very basic for anonymous SIM card scam.

Preliminaries

​There is no way to make a phone call from your cell phone without a SIM card, unless you are calling emergency numbers or you are using app voice calls via WIFI (as Skype or WhatsApp). But because scammers are trying to sell you a SIM that pretend to be "anonymous", that SIM might use a cell tower. Also, even when using data voice calls instead of regular voice calls, your phone will connect to nearest cell tower (data connection channels instead of voice channels). Unless using WIFI, there is no way to circumvent a cell tower if you want to communicate. A cell tower means mobile network, servers, SS7 vulnerabilities and exploits, IMSI Catchers, GSM Interceptors, location tracking and monitoring. Least but not last, mass surveillance.

The test

​Are you a happy buyer of one of those Anonymous SIM cards? Are you sure that IMSI is protected and your SIM security is "hardened"? Well, time has come now for a small and quick test.

Most of people have no idea what IMSI is, and also no idea on how to get it from their own SIM card. Moreover, they have no idea what can be done when someone is getting IMSI from your SIM card. So let's start testing. No need for any technical skills, special knowledge or payments.

Test no. 1

​Anonymous SIM card vendors pretend that card security is "hardened" and IMSI is not revealed to interception systems due to some security tricks.
Whether you have a classy Android or swanky iPhone, you can test your new bought "anonymous" SIM card, right now. Just go to Google Play or App Store and install any app that shows your SIM card info. Example: Whats My IMSI.
On iPhone is even simple: go to Settings menu and from there you pick "Mobile Data". Choose "SIM Applications" and that's pretty much you have to do.

Got your IMSI now? Good. Now you can throw away your "anonymous" SIM. And have a look on your window: your "protected" calls might actually "call" the police straight in front of your gaff.

The IMSI you can see is being used by your phone when connecting to any cell tower, in order to make/receive calls and messages. There is no other way around. The phone cannot connect directly to any "telephone switchboard", as scammers pretend. Because "telephone switchboard" is not a cell tower. Your phone call is routed first trough local mobile network, then trough SS7 network, to recipient mobile network. In this particular case, your phone call is also routed trough your "anonymous" SIM issuer servers located in Russia, before reaching recipient local network. Hence, instead of "hardened" security you've got less security than you have expected. And sure, with an extra payment which will make you think that is serious yet affordable security.

Test no. 2

Google for SS7 attack, SIM Toolkit attack, IMSI Catcher to see how IMSI can be retrieved over the air and then what can they do with it.

The business

​Buy cheap pay as you go SIM cards and sell them as anonymous SIM cards, with 500% profit margin.

​The SIMs behind the business


Straight forward: there are no anonymous SIM cards. This is technically impossible. All of them are just a big time scam that take advantage on lack of knowledge from regular people. And nothing more.

Fact: there is no SIM card without an IMSI.
Fact: there is no connection to a cell tower without IMSI being used for connection purposes.
Fact: even data only SIM cards have an IMSI assigned by the manufacturer.
Fact: there are so called IMSI catchers, designed especially for call/SMS interception based - as its name says - on IMSI.
Fact: if you can call whatever number or you can receive calls, that means your phone is connected to a cell tower, by using voice/data channels.
Fact: once connected to a cell tower, almost ANY cell phone location can be (and it is) tracked by various technologies and systems, taking advantage on mobile network weaknesses or mobile network nodes (SS7).
Fact: once connected to a cell tower, any phone call can be (and it is) intercepted, no matter if voice call is routed on standard voice channels (regular voice call) or on data channels (as Skype, IM, WhatsApp, etc.).
Fact: not the SIM card is choosing the cell tower to connect on it, but the phone. This is the way that all mobile networks are designed (no matter if 2G, 3G, 4G, etc.), a SIM card being only used to identify a certain subscriber.
Fact: the phone number is not stored on the SIM card. Phone number is stored on mobile network servers (HLR/VLR) and cannot be altered/changed directly from the phone/SIM. A phone number can be altered/changed ONLY by using data connection and 3rd party servers. Some particular "russian SIM cards" are using standard voice channels that still route the call trough some russian server, where in fact take place voice changing, and only then the call is routed to call recipient.
Fact: ANY SIM card is encrypted by default, using comp128 algorithm. There is no other encryption that a SIM card support. This is meant for anti-cloning purposes. Some early comp128 versions has been compromised, old SIM cards (until 2012) being easy to clone.
Fact: ANY regular phone call on ANY mobile network (no matter if 2G, 3G, 4G, etc.) is encrypted by default. Otherwise, anyone with a radio receiver can intercept that call. A SIM card CANNOT ad another layer of encryption on top of existing one, nor additional encryption.
Fact: ANY SIM card is trackable and any phone calls and SMSs done with a SIM card can be intercepted.
Fact: IMSI is not the same with phone number, nor with ICCID. IMSI is stored on SIM, since phone number is stored on carrier servers.
Fact: IMSI is not printed on SIM, but ICCID.
Fact: anyone can figure out its own SIM card IMSI, by using freely available apps (both on Google Play and App Store). If you average Joe can do this, then law enforcement or hackers can do that remotely, over the air.
Fact: IMSI change is possible by sending special requests to SIM issuer (the mobile network that issued that particular SIM). The request cannot be sent directly by the SIM user but by other company, in his name (used for example when porting a phone number). Changing IMSI this way is not a standard procedure, despite the fact that IMSI change is mentioned on GSMA and 3GPP procedures. Fraudulent MVNO companies (mostly russian) are taking advantage on this procedure, enforcing the law because the MNO doesn't care, changing SIMs IMSI based on user direct request.

Started back in 2014, anonymous SIM card scam refers to a few types of SIM cards that are being sold to people without a decent knowledge regarding mobile networks:

1. Pay as you go SIM cards (aka prepay SIM)

Some European countries as well as non European ones still issue pay as you go SIM cards with no need to show any personal ID and with no prior registration. This type of SIMs are considered "anonymous" just because there is no connection between user name and phone number. There are no other "special" features or "security hardened" things, whatever that means. At first sight, using a pay as you go SIM (eventually issued by a foreign carrier) looks as an advantage for SIM user. But stepping down on real life, this is what is happening: when a suspect is using whatever SIM, law enforcement ground teams are using IMSI Catchers and/or GSM Interceptors that collect both SIM IMSI and phone IMEI, for further tracking and monitoring. Hence, doesn't matter if the suspect is using a pay as you go SIM: IMSI catcher has done the job, matching all together: suspect identity, SIM identity (IMSI) and phone identity (IMEI). Simple and effective. A good article regarding this type of anonymous SIM scam can be found here.

2. SIM cards that have so called "multi IMSI" option.

This is nothing unusual, and are not adding any additional security to phone calls or location tracking. Just google it by yourself. Multi IMSI SIM cards are sold worldwide by various carriers as SIM cards for frequent travelers which can have up to 4 different IMSIs, corresponding to 4 different phone numbers. The user can choose which IMSI (phone number) is used at a time, by local low rates policies. Nothing to do with additional security or dynamic IMSI change. This type of "anonymous" SIM cards create a false security feeling just because user can alternatively choose from 4 phone numbers to use. Any multi IMSI SIM card can be tracked and intercepted as any other SIM card.

3. Russian "anonymous" SIM cards.

These are SIMs issued by russian MVNOs, which have assigned 1 or multiple IMSIs (up to 4). To place "anonymous" calls, the phone (along with the SIM) will connect to the closest cell tower, by disclosing both IMSI and IMEI. There is no other way around. IMSI and IMEI have to be used in order to connect to the network. Hence, no anonymity: since IMSI and IMEI are disclosed, a wide range of tracking procedures (SS7, GSM Interceptors) are possible, also call interception and SMS interception are just a kids play. Going further, the call is rooted from local mobile network (which is the first weak link that instantly disclose user identity), to russian MVNO servers, where phone number and voice are eventually changed (if user choose to use voice changing and phone number changing), and then the phone call is finally reaching the recipient number. What this clowns are trying to hide from you by taking advantage on your lack of knowledge regarding GSM network standards and specifications is the call route: instead of standard call route (simplified: cell phone > cell tower > core network HLR/VLR > network switch SS7 > russian MNO > russian MVNO servers > russian MNO > SS7 switch > recipient network HLR/VLR > recipient local cell tower > recipient cell phone), they claim that the call originating from your cell phone does not connect to any surrounding cell tower but to some sort of "telephone switchboard", which obviously is not technically possible. Do not forget that even when using data connection to place a IM call (Skype, WhatsApp, etc.), your phone will connect to THE CELL TOWER, by using the same IDs: IMSI and IMEI. In other words, unless you are using WIFI, any call will go trough nearest cell tower, no matter which SIM you are using. With a lot of nonsense blah blah and using apparently a technical vocabulary just to make you think they are professionals and/or skilled hackers, a vocabulary that in the end of the day will probably convince you by confusing you, scammers succeed to sell SIM cards as "anonymous" SIM cards.

We all know that SS7 network is compromised, but it takes more than a few keystrokes to abuse the SS7 network: it takes expertise, money and more important - SS7 access. But from what we have seen, once attackers have all 3 they are making sophisticated use of SS7, because once you have this ability, you want to exploit it fully. The real problem with these unscrupulous russian MVNOs is the access they have to SS7 nodes based on contracts they have with other international carriers, access that make available for them a wide range of SS7 exploits, including call interception and location tracking.

 * Anomalous, but not malicious traffic. This can be everything from malfunctioning nodes, attempting to send for all subscribers rather than their own, to unusual implementations of legitimate services, to anything else which is not known to be malicious. The skill here is in identifying this and making sense of what is malicious and what isn’t – not always easy to understand.
 * Malicious attacks, up to a medium-level complexity. These are the more well-known location tracking, fraud and information harvesting attacks, and were the main type of attacks that operators encountered when they started to investigate SS7 security in depth. As time has gone on, the perception of ‘simple’ has risen in complexity to cover more and more types of attacks.
 * Malicious attacks, of advanced complexity. This is the type of attack that takes investigation to even identify in the first place, and once identified requires detailed understanding of what the attacker is trying to achieve and how, in order to build consistent defense against it. These are the most advanced type of attacks they will increase in complexity as time goes on.

We are actually seeing a progression over time (i.e. over the last 2 years), where some of the attackers who have access to the SS7 network have progressed to trying to use more and more sophisticated methods to achieve what they want, especially now that a large number of operators have begun to implement defense. Most relevant example: ULIN.

One more thing: as always when something is too nice to be true, you never know who is really hiding behind that servers. You have no means to check that russian MVNOs and its hidden strings that eventually lead to local intelligence services.

4. Writable/Programmable blank SIM cards, widely available on Alibaba and other Chinese web shops, also on eBay and Amazon, at really low prices that comes in bundle with read/wright device and software. This way, you can make your own SIM card, with any IMSI.
This is all you need:
a. A programable blank SIM card
b. SIM card Reader/Writer device
c. Software (usually 128k Milenage algorithm and XOR algorithm, Matching the standards of GSM11.11, GSM11.12, GSM11.14, GSM11.17)
The (big) problem consist in Ki (encryption key) which need to be written on that new SIM. You need to know the Ki key, and there is no way to retrieve this key 99.9% of the time from another SIM card, because it is only known by the operator itself. This is why SIM cloning (comp128 v2, v3, v4) is not successful.
Ki problem can be easily solved by a malicious MVNO, which know the Ki and can program its own blank SIM cards.
Chinese vendors has solved this: SIM factory can program the SIM for you when ordering in bulk, including custom printing as you can see on most "anonymous" SIM cards. See it in action:

Cons

​Even if Ki is known, once written, the new "anonymous" SIM card will encounter real security issues that make it more vulnerable than a regular SIM, nulling this way the IMSI change function:
a. does not support GSM 11.14: digital cellular telecommunications system (Phase 2+) - specification of the SIM Application Toolkit for the Subscriber Identity Module - Mobile Equipment(SIM - ME) interface.
b. does not support GSM 03.48: security mechanisms for SIM Application Toolkit - Stage2 (GSM 03.48 version 8.8.0 Release 1999).
This mean that the SIM card is vulnerable to a wide range of remote SIM Toolkit attacks.
c. comes with STK menu that supports various applications, which can be updated by OTA download. That means you are not in control of your "anonymous" SIM card: various and potential dangerous executables can be downloaded and executed on your SIM, without your consent and acknowledgement.

The people behind the business

Just google it. Crowds of scammers using tens of websites, eBay and Amazon accounts are trying to scam you big time with "anonymous" SIM cards. You can even call them, asking more explicit about how anonymous SIMs work. No doubt, you will get as many explanations as scammers are. Every single one will come up with his own evasive explanations, sometimes even hilarious for an advised person. Those are "professional experts" type. The other ones - "honest" seller type - will simply reply that they are only selling those SIMs, and more explanations can be found on manufacturer website.

The victims

​Judging only by the number of items sold via eBay and Amazon, there are thousands of fooled people. And their number is still on the rise.

Phone number changing / substitution

Beside billing, phone number changing is a feature that work. On the other phone you are calling will appear always another phone number that is calling. At first sight, this is a stunning security feature for most of users, which will certainly impress the buyer that can see a live demo of the feature. But:
Phone number changing take place on their servers, so the phone number will be changed only when routed call will arrive on their servers, on its way to called cell phone. The call is leaving your cell phone with the same IMSI and phone number every single time, and changes are done only when your phone call hits the server.
From the point of view of an IMSI Catcher or SS7 attack, NOT the phone number is relevant, but the IMSI. This is why interception systems are called "IMSI Catchers" and not "Phone number catchers".
And yes, your cell phone location can be tracked and your calls can be intercepted as any other ones. From law enforcement point of view, changing phone number have no relevance when it comes to call interception and location tracking just because the phone number is NOT STORED on SIM card. Phone number changing is actually the single feature that can be tested by the user, which will convince any skeptical person to buy a anonymous SIM card.

Find out more

source

Even a most technical study on Anonymous SIM card scams

​Back in 2014, some Russian white hat hackers have revealed Anonymous SIM card scam. Read below their study and conclusions.
anonymous_sim_scam.pdf
File Size: 6930 kb
File Type: pdf
Download File

0 Comments

Untraceable cell phones. SRSLY?

4/1/2021

0 Comments

 
Picture

​Test your "secure" phone. Now.

Before everything, let’s face it: who do you really fear?
There are not so many hackers around that can actually track your cell phone, because of few simple reasons: expensive hardware needed, lack of knowledge regarding GSM stack and SS7 protocol effective exploits, not to mention that hackers have no interests on you, average Joe. Excepting your worried parents and jealous girlfriend, no one wants to know your (cell phone) geo-location. Tracking a cell phone is not a simple “push button” situation when is done by a hacker. That involve deep and extensive knowledge, pretty expensive hardware, time and not least, an considerable interest on you, average Joe. Which obviously is not the case unless you are just another skilled hacker or a high profile person.
The situation became serious when you did something bad or even illegal. Then, you became a target for law enforcement and/or intelligence agencies. And there is no way to hide your (cell phone) location. They have not only the legal ability to track down your cell phone at any time, but have also technological and human resources to do that, not to mention training and expertise.
In case you think that your own cell phone is secure, its time for 2 simple tests.

TEST No. 1: NETWORK TESTING BY EMERGENCY CALL.

Read more here.
0 Comments

A new scammer: http://blackstone-security.jimdo.com

10/21/2015

6 Comments

 
blackstone-security.jimdo.com scam alert
Stealth phones scam in progress on blackstone-security.jimdo.com
Recently discovered new stealth phones scam on blackstone-security.jimdo.com have some pretty funny "pluses" than other competitor scammers. They claim that the stealth phone they sell have no more that 10 (yes, ten!) "clandestine operational functions", as you can see on the picture above.
There is the same old scam: a cracked and non working firmware installed on wrong cell phones (Samsung G600) that will give you only a cell phone that looks like a stealth phone but with no working functions. Sounds familiar? Sure it does: we have revealed this scam since last year.

This sneaky scammer is trying to mislead buyers by selling the same 7 functions stealth phone firmware installed on Samsung G600 cell phones, by simply inventing some additional functions. The firmware used to make his counterfeit stealth phones is absolutely the same as the one you can download for free from our website, for testing purposes: click here to download 7 functions Samsung G600 firmware.

Lame: copy/paste scammer

What else the lame scammer did? Well, proving that he is a lazy ass, an ignorant when it comes to websites or just a little theft (we think that he is a bit of all), he stole the text and pictures from the x-cellular.com website. Looks familiar? Sure it does: there was another scammer who stole text and pictures from the original manufacturer website, called Sohail Hussain aka Steven Adams (Jd Mobile Unlocking Service, private held company). Click here for more info.
Selling fake stealth phones is something, but stealing from others is something else. But when you put all together this facts, the only conclusion you can get is that the scammer have no idea about how things are done on cellphone interception field and have no idea on how stealth phone works. Buying from this scammer is like buying medicine from a quack and not from a pharmacy.

We had a bit of fun with this copy/paste scammer: seeing that he copied also the "About Us" text from x-cellular.com (including pics) and pretending to have a
"background in signal intelligence and direct experience of working with GSM, Security phones developers had a significant head start", we have sent him a mail asking simple programming questions, just to make sure he knows at least Java programming language which is also the language used to build the stealth phone firmware. No reply whatsoever, and we'll not expect one by obvious reasons. There are no developers related to this scam. In fact there is no team at all, but only a scammer trying to fool people.

And sure, they claim (actually a text copied from x-cellular.com website)
that "the development staff consists of individuals spanning different languages, regions, industries, and nationalities. We are experts in offensive GSM security , cybercrime and security intelligence." Experts...

The scammer is selling also his counterfeit stealth phones on eBay, under the nickname www-kpex-de

www.kpex.de stealth phone scam on eBay
www.kpex.de stealth phone scam on eBay
And yes, the scammer call all this scams as "Advanced Solutions". No doubt, those are solutions to get some money from ignorant people.

What other scam he sell?

Remember the Anonymous SIM card scam that we have revealed last year? Well, based on the principle "monkey see, monkey do", this scammer is selling sell so called anonymous SIM cards, as the other scammers do. No doubt, there is one thing that scammer knows: how to copy others. And he think that is the business key to success. Or at least to have some pocket money that comes from uninformed or ignorant buyers.
SIM card scam on http://blackstone-security.jimdo.com
SIM card scam on http://blackstone-security.jimdo.com
 You can have the complete picture of the scam developed on blackstone-security.jimdo.com when you realize that the webstore has been built on a free platform. (jimdo.com). Why that? Someone who sell security solutions (and not any solutions but "advanced solutions" as he claim) cannot afford a domain name and a decent website when (probably) selling products worth hundreds of euro? Or does he hide his ass under the anonymity offered by a free platform website? Whatever the reasons are, you have to avoid buying from this scammer.
A clear thing, you can not buy security from someone who steal the others hard work, selling cracked/unlicensed firmware and having no idea about how cell phone interception works, pretending to be "a team of skilled programmers".

Update (22nd November 2015):

Realizing that his scam has been revealed, the scammer did the same as the one who ran imeichanger.com, antitap.com and secretgsm.com: has closed down the website located at http://blackstone-security.jimdo.com/
Following our marketing advice, the scammer has bought from jimdo.com his own domain name (antispymob.com), and now he is redirecting the visitors to his new website, called http://www.antispymob.com/   
Apparently the scammer will continue to run his scams on this new website. We will keep you informed about future scam development.

On the scammer eBay account (User ID www-kpex-de) he uses a stolen picture from x-cellular.com website, trying to mislead buyers that the fake phones he sell are enabled with "New updated GUI interface". Despite the fact that he have no idea what GUI means, he is fool enough to use the Xcell logotype on the phone homescreen when selling his fake stealth phones. This is why anyone should ask him before buying about  XCell security seals on the phone backside. Just ask him to send you a photo with the phone backside, along with phone IMEI number. Then you can simply ask XCell guys is that details are genuine or not. Simple as that.
www-kpex-de selling fake stealth phones on eBay, stealing Xcell GUI and misleading buyers
www-kpex-de selling fake stealth phones on eBay, stealing Xcell GUI and misleading buyers
Just to make sure that we're not wrong, we have contacted XCell Technologies, asking if they have any reseller within Germany and The Netherlands. The answer was negative, there is no XCell reseller for these counties. You can do the same, asking about Germany and The Netherlands XCell reseller: you will get the same response.
However, the scammer is trying to hide behind a company called Ennetcom (http://www.detectnu.nl/?page=http%3A//detectnu.home.xs4all.nl/opdrachtform.htm) pretending that the fake stealth phones he sell are manufactured by detectnu.nl.
And here comes the ridiculous lie: how can a company like Ennetcom that sell only BlackBerry secure solutions (and not even the phones itself), a company that is not talking nor offer any dynamic IMEI phones, manufacturing dynamic IMEI phones and sell them only on a eBay account and (until few days ago) on an obscure and dubious web page?! You cannot see any references about dynamic IMEI phones on the Ennetcom (detectnu.nl) web page. Lets be honest: Ennetcom (detectnu.nl) are not at all manufacturers but only a BlackBerry solutions resellers, and nothing else.
No doubt, there is a logical fracture in the scammer thoughts: there is no manufacturer that is not selling his products on his own website, but only other companies products. Make sense to you?

And yes, there is another stupid thing that the scammer is trying to promote: a stealth phone which have the XCell Technologies logotype (the famous X), manufactured by detectnu.nl, a company that in a strange mode, does not say anything about dynamic IMEI stealth phones and actually does not produce anything but only reselling Blackberry secure services. Does it make any sense for you?
Detectnu stealth phone scam
Detectnu.nl stealth phone scam
stealth phone scam
Stealth phone scam on eBay. Seller: www-kpex-de
As a "very serious" and professional business that "produce" sell a lot of "secure" cell phones, guess what else this scammer is selling to make some pocket money: paintball masks and USB cables. A veritable businessman that is doing businesses on a large scale. Expect a professional customer service and explanations from someone that is selling this king of products? We hope not.
Picture
One last thing: a website will never be a manufacturer, as the scammer claim. But only a manufacturing company can produce something. A website is only a marketing platform, a web store.
6 Comments

The truth about antitap.com, imeichanger.com and secretgsm.com

6/12/2015

1 Comment

 
stealth phone scam: antitap.com, imeichanger.com and secretgsm.com
stealth phone scam: antitap.com, imeichanger.com and secretgsm.com
Trying to dismantle the scam behind antitap.com, imeichanger.com and secretgsm.com, we found out the following facts:

  • Behind all this three scam websites hides an italian scammer
  • There is no company behind (as trader or manufacturer), but only a guy that buy cheap and sell high, making good money from people
  • There is no postal address, no phone number and no contact details, all three websites being a classical online scam
  • There is no company PayPal account, but only a personal PayPal account used to sell the fake products.
  • There is no "producer" as the scammer states, but only a seller
  • There is no customer support since the scammer have no clue about how stealth phones work and how cell interception work
  • There are no product user manuals
  • There is no general guarantee for any of the products sold on all three websites
  • All three websites are owned from the beginning by the same italian scammer. The websites was never owned by any "russian guy"
  • On all three websites are being sold counterfeit stealth phones (IMEI change phones) that does not work as described by the scammer
  • There are no real anti tapping / anti IMSI catcher / anti interception features on any cell phones that scammer sell, but only words used to fool people, with no factual support
  • There are no demo movies to show phones functions and capabilities, being fake products
  • The scammer is selling software applications obtained for free from iTunes and Google Play Store. The applications are pre-installed on the phones he sell, pretending to sell "stealth phones"
  • The scammer mislead people about real phones capabilities, seriously endangering buyers personal security
  • There is no "version 4" Samsung stealth phone, being only a hilarious marketing trick used by the scammer to fool uninformed and naive buyers
  • The scammer has been caught previously, counterfeiting Samsung G600 IMEI stickers, misleading and fooling buyers about "stealth phones" he sell. More info here
  • All scammer eBay accounts has been successively closed down due to buyers complaints
  • This scammer has started his mobile phones scams since 2006
More blog entries about the scams on antitap.com, imeichanger.com and gsmsecret.com:
  1. Another seller, busted: fake stealth phones for sale 
  2. Anonymous SIM card scam
  3. A comprehensive view on stealth phones scam                               

How all this started: previous scams

Please note that most of the screenshots below has been taken from gsmhosting.com forum and few other websites where the scammer is pretty active.

The amateur scammer behind antitap.com, imeichanger.com and secretgsm.com websites is an italian guy that lives in Monaco, sometimes reported in Swiss. He uses the nickname "cryptone" on most forums since 2008, and sometimes "Luca" only on italian forums.

Early years

In his early years he has started his scams as spy-phone software dealer, on the black market. Back in 2008 he deals the illegal software only on italian forums and websites, taking advantages on italian people that - as you probably know from your trips or interactions - are pretty ignorant when it comes to english language. So, they had to pay a price for that ignorance, buying spy-phone software at high rates. As you know, selling and using spy-phone software is considered to be illegal in most of the countries, even when it comes to spy your own wife or child.
antitp.com, imeihnger.com nd secretgsm.com scam
selling illegal spy-phone softwre
Then in 2008 he has discovered gsmhosting.com forum, starting to post offers for spy-phone software.
antitap.com, imeichanger.com and secretgsm.com scam
selling illegal spy-phone software for BlackBerry devices
antitap.com, imeichanger.com and secretgsm.com scam
selling illegal Symbian spy software generator
antitap.com, imeichanger.com and secretgsm.com scam
selling illegal spy software genertor
Like now, the scammer has used in the past multiple sites for selling illegal software:
nokia-spy.com/index.html
bberryspy.com
spyphonegenerator.weebly.com

Nokia 1100 scam, a short story for the scammer

Bank fraud and selling fake phones - this scammer gets in
Picture
In case you weren't already convinced of a certain model of Nokia 1100's can be used for bank fraud by reprogramming the phone in a way that allow the attacker to extract your mobile transaction authentication number -- provided you live in a country like Germany or Holland that use mTANs -- and use it to get into your bank account and transfer funds.

So, this opportunity sounds good enough to the scammer to get involved in it, making some money by fooling people. When he first hear of this scam, posted on gsmgosting.com forum that he want to know more about this scam:

antitap.com, imeichanger.com and secretgsm.com scam
scmmer searching info about new scam
In a short time the scammer realize that he can exploit the market demand for Nokia 1100 by buying cheap Nokia 1100 which are not RH 16-18 series, and counterfeit the software or even the backside IMEI label:
antitap.com, imeichanger.com and secretgsm.com scam
scammer attempts to counterfeit Nokia 1100 RH
Because he didn't succeed to counterfeit Nokia 1100 RH by software means, he has simply counterfeit the backside IMEI label:
antitap.com, imeichanger.com and secretgsm.com scam
counterfeiting IMEI label for Nokia 1100
And then he just start selling counterfeit Nokia 1100 on forums, web shops and eBay:
antitap.com, imeichanger.com and secretgsm.com scam
selling counterfeit Nokia 1100
antitap.com, imeichanger.com and secretgsm.com scam
selling counterfeit Nokia 1100

Preparations for change IMEI phones scam

You probably know that the scammer behind antitap.com, imeichanger.com and secretgsm.com is posing now in a security professional, running a bunch of websites and selling high grade security related products pretending that he knows how that products work and how cell phone interception work.
Just to have fun on his approach, vision and knowledge regarding cell phone interception, please have a look below, on how he name an IMSI Catcher or GSM interceptor: "IMEI phishing machine". We think this is self explanatory and need no more proofs about his "professionalism". Do you expect professional customer support when buying and using a stealth phone from this illiterate when it comes to cell phone interception? We hope not.
antitap.com, imeichanger.com and secretgsm.com scam
"IMEI phishing machines". Truly professional
Then suddenly he have heard somehow about dynamic IMEI phones made by XCell Technologies. He couldn't probably afford to buy one to start replicate it, presuming that he know how to do it (which we doubt). So, he started to ask round for similar but cheaper ones:
antitap.com, imeichanger.com and secretgsm.com scam
searching for cheap counterfeit IMEI change phones
antitap.com, imeichanger.com and secretgsm.com scam
Decided to make money from nothing by fooling people, the italian scammer wants to sell even phones that apparently change IMEI (only on phone screen) and not in a real mode. This is yet another proof of the scammer intentions to fool people:
antitap.com, imeichanger.com and secretgsm.com scam
italian scammer looking for a way to fool people with fake IMEI change phones
The real story of antitap.com, imeichnger.com and secretgsm.com:

At this stage, from our records comes out that he contacted a Bulgarian hacker and together they put money and bought an XCell dynamic IMEI phone, whose firmware was hacked and extracted by the Bulgarian hacker. The hacker name is Zlatin Penchev from Stara Zagora, and we have his complete story about how he cracked and extracted the XCell firmware and how starting to sell the cracked (and non working) firmware together with the italian scammer. In fact even the italian scammer admits he worked with a Bulgarian hacker:
antitap.com, imeichanger.com and secretgsm.com scam
Obviously, he didn't lose the Bulgarian hacker contact: the hacker has dumped the scammer just because the scammer has no idea about how stealth phones should be replicated and sold to make some pocket money. So, the scammer has started to figure out by himself how to flash the cracked XCell firmware on a phone, in order to clone a real XCell stealth phone. But seems like his attempts to counterfeit XCell stealth phones were unsuccessful at first, because the scammer does not have the necessary knowledge nor quite right tools.
antitap.com, imeichanger.com and secretgsm.com scam
italian scammer using the cracked firmware on the wrong platform (Samsung G600)
Fake it to make it: please note that the same scammer has been caught in the past using fake G608 IMEI stickers on his fake G600 stealth phones, just to create the appearance of a genuine XCell stealth phone. More about that fake IMEI stickers, here.
antitap.com, imeichanger.com and secretgsm.com scam
italian scammer having no clue (in 2014!) about how to install the cracked firmware on his counterfeit stealth phones
Because of using a cracked and non working firmware installed on the wrong platform (Samsung G600 instead of G608), there are a lot of malfunctions and bugs that starts from the moment of flashing (installing) the firmware on the phone:
antitap.com, imeichanger.com and secretgsm.com scam
italian scammer using cracked (non working) firmware on the wrong platform (G600) is getting bugs and major malunctions
After his own statements, the italian scammer use the same empirical tool (Onenand downloader) to flash the cracked firmware on the phones, as the other scammer sells on eBay along with the cracked firmware (click here for details). So, no wonder that he got burned out his phones:
antitap.com, imeichanger.com and secretgsm.com scam
italian scammer using cracked (non working) firmware on the wrong platform (G600) is getting bugs and major malunctions

Stealth phone scam in progress

Despite the fact that the italian scammer sell counterfeit non working stealth phones, he start advertising on forums about his scam:
antitap.com, imeichanger.com and secretgsm.com scam
italian scammer selling counterfeit stealth phones on his website antitap.com
antitap.com, imeichanger.com and secretgsm.com scam
italian scammer selling counterfeit stealth phones on his website antitap.com
He also sell counterfeit stealth phones on his main web shops: antitap.com, imeichanger.com and secretgsm.com.
An interesting fact that demonstrates on antitap.com, imeichanger.com and secretgsm.com are being sold counterfeit non working stealth phones: please have a look on the thread dates: since 2013 the scammer sell stealth phones, but in 2014 he still ask for help in flashing stealth firmware on his counterfeit stealth phones. No need for more proofs, scammer own declarations are more than enough to demonstrate the scam.
antitap.com, imeichanger.com and secretgsm.com scam

What other scams can you find on antitap.com, imeichanger.com and secretgsm.com?

Buy cheap, sell high. This seems to be the the guideline followed by the italian scammer. Nothing bad up here, the wrong things and the scam starts when he consider himself nothing but a "legit producer", making confusions between producer and seller. We will not analyze his marketing strategies nor price policy since is not our business. But we will have a look on the products he sell.

Anonymous SIM card scam
We have posted already our conclusions on so called anonymous SIM card, on a previous blog entry. Click here for more details.

Other so called "stealth phones" that he sell
Before talking about other scams, you should know that all Android cell phones that he sell as "stealth phones" are not at all stealth, as scammer claims. The scammer is taking again advantages on unskilled and

unknowledgeable people that have no clue about how cell phone works, how and what a software application can do, selling simple Android phones that the scammer has pre installed several free software applications that can be easily found in abundance on Play Store, by anyone.
antitap.com, imeichanger.com and secretgsm.com scamStealth Samsung S4 scam
Stealth Samsung S4 Duos scam.
What the scammer did? Well, he simply installed on a standard Samsung S4 phone, a free app called Private Text Messaging & Calls. This app can be downloaded and used for free, from Play Store. Click here. Why paying more to a scammer since you can have all this for free, on your Android phone?
What else he did? By using copy/paste, he added some text to his website, copied off the Play Store app page. This is how he launched his product called "Samsung S4 stealth Phone". Pretty easy, right? But not smart enough. We really wonder how many naive people he managed to fool until now.

Please note that the phone does not have ANY anti tapping capabilities nor detection of call interception.

antitap.com, imeichanger.com and secretgsm.com scamStealth Samsung S5 scam
Stealth Samsung S5 scam.
The same scam as above. The scammer has installed the same app (Private Text Messaging & Calls) on a standard Samsung S5. And nothing more. Download for free the app: click here.

Please note that the phone does not have ANY anti tapping capabilities nor detection of call interception.

antitap.com, imeichanger.com and secretgsm.com scamEncrypted stealth phone scam
Encrypted smart phone scam
This is actually a very cheap China made cell phone called DOOGEE TITANS DG150 3.5" (can be bought from here with only 75$) which is not encrypted at all, by default. The phone can be encrypted by the user, as any other Android device, for free.
On this device, the italian scammer has installed the same free app called Private Text Messaging & Calls which can be downloaded from Google Play. Click here.
The scammer is selling this device with 450€, making a good profit on ignorant people.

Please note that the phone does not have ANY anti tapping capabilities nor detection of call interception.

antitap.com, imeichanger.com and secretgsm.com scamDual SIM stealth phone scam
Entry level dual sim burner phone: a scam.
This is actually a cheap NGM feature phone called Stealth, that can be bought with only £91.00 from here. The italian scammer is selling the device with 250€.
Please note that the device will not alert you when your calls and messages are being intercepted. The scammer just sell lies to you.

Please note that the phone does not have ANY anti tapping capabilities nor detection of call interception.

Picture
Stealth iPhone 5 scam
Italian scammer is selling ordinary iPhone 5 phones which he installed a free application called CoverMe Private Texting Messenger, which is similar to
Private Text Messaging & Calls, available for Android devices, being released by the same developer - CoverMe Inc.
You can download and install for free CoverMe Private Texting Messenger for iPhone: click here - iTunes link.
No need to pay 650€ for an ordinary iPhone 5.

Please note that the phone does not have ANY anti tapping capabilities nor detection of call interception.

antitap.com, imeichanger.com and secretgsm.com scamUltra Tough Anti Tapping Phone: scam
Ultra Tough Anti Tapping Phone: scam
The so called Anti Tapping phone sold by the italian scammer on his websites (antitap.com, imeichanger.com and secretgsm.com) is actually a cheap Android device made in China by OINOM, which can be purchased with only 299$ from Aliexpress.com: click here. Scammer price: 550€.
The scammer has installed on this phones the same free app called Private Text Messaging & Calls which can be downloaded from Google Play. Click here.

Please note that the phone does not have ANY anti tapping capabilities nor detection of call interception.

antitap.com, imeichanger.com and secretgsm.com scamVHF Stealth Dual SIM Anti Tapping Phone: scam
VHF Stealth Dual SIM Anti Tapping Phone: scam
This so called Anti Tapping phone is actually a China made Android phone called Snopow M8 which can be bought from Aliexpress.com with only 199$: click here.
Scammer price: 390€.
The scammer has installed on this phones the same free app called Private Text Messaging & Calls which can be downloaded from Google Play. Click here.

Please note that the phone does not have ANY anti tapping capabilities nor detection of call interception.

antitap.com, imeichanger.com and secretgsm.com scamZOPO anti interception phone ZP1000 Android: scam
ZOPO anti interception phone ZP1000 Android: scam
This so called "anti interception" phone can be bought for only 172$ from Zopo store: click here.
Scammer price: 399€.
The scammer has installed on this phones the same free app called Private Text Messaging & Calls which can be downloaded from Google Play. Click here.

Please note that the phone does not have ANY anti tapping capabilities nor detection of call interception.

antitap.com, imeichanger.com and secretgsm.com scam

Conclusions

All three examined websites are selling counterfeit and/or non working phones (claimed to be stealth phones), along with free software applications for which the scammer asks for money.
We strongly advise you to keep away from all three websites: antitap.com, imeichanger.com and secretgsm.com. There is nothing that you can buy for your privacy and call security, but only scams and lies.
in case that you been a scam victim on these sites, you might contact us for further assistance.

Our advice: always buy the original. As we did, in the end of the day.
1 Comment

Free Samsung G600 Stealth Firmware, 7 functions

6/2/2015

3 Comments

 
free Samsung G600 stealth firmware 7 functions
This software is being distributed as a research material and teaching tool for security purposes, and not as a working software. Can not be considered under any circumstances as malware distribution. The real malware distributors that are selling counterfeit stealth phones made based on the suh software are: antitap.com, imeichanger.com, secretgsm.com, gsm-interceptor.co.uk, eBay scammers and others.
This software is provided "as is" and "with all faults." We makes no representations or warranties of any kind concerning the safety, suitability, lack of viruses, inaccuracies, typographical errors, or other harmful components of this software. There are inherent dangers in the use of any software, and you are solely responsible for determining whether this
software is compatible with your equipment and other software installed on your equipment. You are also solely responsible for the protection of your equipment and backup of your data, and we will not be liable for any damages you may suffer in connection with using, modifying, or distributing this software.
USE OF SOFTWARE INDICATES YOUR ACCEPTANCE OF THE TERMS OF THIS AGRE
EMENT, IF YOU DO NOT AGREE TO ALL THESE TERMS DO NOT INSTALL OR USE THE SOFTWARE.

We offer for free the firmware (Stealth Anti Tapping Samsung G600 firmware 7 functions) that we've bought from an eBay seller, but before downloading please read the text below. Downloading link at the end of this post.

A counterfeit stealth phone (made up by using cracked firmware) is a ticking bomb in your pocket. Unfortunately you find out that you have been fulled by the scammer when usually is way too late: you "stealth" phone has been wiretapped and you got busted.

The story

Back in 2013, some scammers has sold on eBay an older version of the XCell firmware called "Stealth Samsung G600 firmware 7 functions". Of course a cracked version, unlicensed and especially a non-working one: once installed on a Samsung G600, the phone freezes and a black screen appear. Causes were the wrong indication by installing the firmware on Samsung G600 and not G608, and that the broken version lacks some external files that a full dump cannot achieve. Of course, the lack of hardware modifications necessary to the proper functioning was leading in the end, to an unusable and faulty phone.

Not to mention that not incidentally, JD Unlocking Services (interceptor.co.uk gsm) was no stranger to this scam: he was one of those which sell XCell cracked firmware, along with the device needed to install the firmware on the phone. All priced at £ 3,000.
One by one, eBay accounts were closed down following complaints of deceived buyers.

The newcomer : even worse than his predecessors

In early 2015 has appeared a newcomer on eBay, a scammer that sell the same cracked XCell Stealth Samsung G600 firmware 7 functions. Same scam, same fraud, same wrong installation indications regarding Samsung G600. Of course, the same result: the phone does not work. Only the price is different (and kinda desperate): $49.00.
stealth phone firmware 7 functions
Stealth phone Samsung G600 firmware scam
Looking more like making some pin money or a doggy sale than a business, a very low price reveals from the beginning that it is a scam or in the best case, a desperate sale of something that worth nothing.
The single way to clear up the situation was pretty much straight forward:  we have bought the firmware and we have tested it after installing following scammer indications, on Samsung G600.

Please note that this kind of scammers frequently change eBay accounts by adding new ones, since the old accounts are being successively closed down due to buyers complaints or even by the scammer itself, just to cover up his traces.
stealth phone firmware Samsung G600 7 functions
Stealth phone firmware scam, Samsung G600 firmware 7 functions scam
The firmware

The file is called "G600 full dump 7.bin" which reveals how the firmware was extracted from the phone: using a Z3X Box or NSPro and "full dump" function (read firmware). Please note that the latest versions of XCell Dynamic IMEI v2 Stealth Phone is no longer vulnerable to attack via USB, a full dump being impossible because of active security filters.
To clarify the cracked firmware version sold by scammer, we proceeded to analyze the source code. What we have found we didn't liked at all:
Samsung G600 stealth phone firmware 7 functions
Samsung G600 stealth phone firmware 7 functions that contains malware
Samsung G600 stealth phone firmware 7 unctions
Samsung G600 stealth phone firmware 7 functions that contains malware, sending SMS to premium rates numbers
The cracked firmware contains several added command lines that will send SMS to premium rate numbers, generating costs when using the phone.

We have also discovered the error that makes the interception alerts (detecting lack of A5/1 and A5/2 encryption) to not work:
Samsung G600 stealth phone firmware 7 functions
Stealth phone firmware Samsung G600, non functional due to wrong cracking and recompiling
This change was probably made only to maintain appearance of firmware functionality, by displaying on the main screen those alert icons, without being functional itself (no network protocol).

The refund

Obviously, after a few hours from purchase we've got a quick refund from scammer, without asking any questions. Probably he is afraid of account suspended or closed, following complaints.
Samsung G600 stealth phone firmware 7 functions
The scammer has refund the money following our complaints
Samsung g600 stealth phones firmware 7 functions
The conclusion

Instead of trying cheap tricks by using cracked software to "defend" your privacy, you better use licensed software and genuine products. Counterfeit products has never deliver real security. When it comes about your calls security, thing are even more sensitive an you have to use only trusted products.

A counterfeit stealth phone is a ticking bomb in your pocket. Unfortunately you find out that you have been fulled by the scammer when usually is way too late: you "stealth" phone has been wiretapped and you got busted.

To not go through eBay's refund procedure or escalating claim, we offer you for free this firmware, as were sold by scammer:
DOWNLOAD NOW
If the firmware from the first link does not work, try this one:
DOWNLOAD NOW
Why do we do this?

The reason why we offer this firmware for free, is fighting counterfeiting. You can try this firmware on your own phone, just to experience a cracked firmware. We will not be held responsible for any loss, incidental or consequential damage, or loss arising out of installation and firmware use. You install the software at your own risk.

Also, probably some other "entrepreneur" will buy this cracked firmware and it will resell it not with $49, but with $19. And the next one will resell it only with $5. So we have not taken it step by step: we burned stages and we offer you for free this firmware.

Our advice

Our advice is a pretty simple and effective one: always use the original.

Update:

This scammer has added on eBay the same fake firmware, at lower price. This time, only $25. Also, he changed his location to Germany.
samsung g600 stealth phone irmware 7 functions
Samsung G600 stealth phone firmware scam, on eBay

Update 1.07.2015:
We have identified another scammer on eBay, selling fake Samsung G600 stealth firmware.

danielius2010 Located in Lithuania, selling fake Samsung G600 stealth firmware on eBay:
counterfeit stealth phones
eBay scammer danielius2010, selling fake G600 stealth firmware
3 Comments

And again: another repair shop guy, another fake stealth phone, another eBay scam

6/1/2015

1 Comment

 
counterfeit stealth phone
eBay Stealth Phone scam
This time the scammer is trying to fool you by posing innocent and genuine: he sell a phone that does not know how it works (but it sells), although claiming to be an experienced repairman when it comes about cell phones. This is what he say about the "stealth phone" he sell:

"We came across one of these handset's in a job lot purchase and it took us a day or two to realise how special it was.
For a repairman, it took quite long. Moreover, we are sure that even now he have no idea how phone work, since he nave no clue about how cellular interception work.

We are now reproducing these handsets, via the software that was loaded on it.
He wanna say that he is reproducing now a fake stealth phone.

We have not used these handsets, so do not know how to use the settings of the features, we recommend you do some research on the internet or read the link that was in the listing.
If he have no clue about how settings need to be done, how will deliver customer service? This looks like a smart way to sell a fake stealth phone: "we do not know how to use it".

The Special features do not work with Vodafone or Lebara sim cards.
Wrong. Vodafone SIM cards work with no problem, no matter if contract or prepay. But there is a thing that he don't know about what SIM cards are compatible with XCell Stealth Phone.

Prior to dispatch we wipe down all handsets with a baby wipe, to clean the handset and fragrance them.
This is the most important thing when it comes about cell phone security: to be fragrant. This is the most hilarious one.

Now you can realise the level of knowledge have an eBay seller that pretends to have a solid background in repairing, unlocking and servicing of mobile phones, since 2009:
counterfeit stealth phone
eBay Stealth Phone scam
Have fun here.
1 Comment

Another seller, busted: fake stealth phones for sale

5/31/2015

0 Comments

 
This time: the guy behind imeichanger.com, secretgsm.com and antitap.com
Article disclaimer:
All data and information provided on this article is for informational purposes only, being widely available and collected off the Internet. We have taken website screenshots that might not be available at the time you read this blog entry, being removed by the website owner. All information is provided on an as-is basis. Read our Blog disclaimer.

The reputation (which we doubt that even exist before by some certain reasons) of antitap.com, imeichanger.com and secretgsm.com has been irremediably lost by these dirty actions of the guy behind these sites. We strongly recommend to avoid this websites.

The websites owner got caught using fake IMEI labels to fool the buyers that he sell proper and working stealth phones, and because of that he removed the pictures off his websites. That was too late, we have recorded him as scammer and all proofs are posted below and will remain available on our website, for anyone who wants to know the truth about this particular scammer.
fake stealth phone
Counterfeit stealth phone by antitap.com
We have discovered recently another website that is offering "stealth phones" on cheap prices. Apparently, this vendor is selling stealth phones that comes on the right platform: G608.
fake stealth phone on antitap.com
A fake IMEI sticker, for a fake stealth phone. By antitap.com
Getting IMEI from a fake stealth phone The thing that caught our attention in the mention "ANTITAP" on the back label, as you can see in the screenshot attached. Being an unusual and irregular mention on any mobile phone label and even more for a phone produced by Samsung, we proceeded to investigate this inscription. Thus, we used a software application called Barcode Scanner (an Android application freely available on Play Store) for reading bar code label. You can do this as well.
fake stealth phone on antitap.com
The IMEI barcode shows the fake label: Samsung G600, and not G608. Busted.
By scanning the bar code directly from our PC screen, we've got this result: The digits you can see in the photo above are just the phone IMEI. This bar code containing phone IMEI is present on any mobile phone.
We've proceeded further, in order to identify the phone model, by correlating IMEI that appears on the label. By parsing the IMEI code on a online IMEI analysing tool (www.imei.info), we've got this result:
fake stealth phone on antitap.com
Checking fake IMEI
Checking up the IMEI:
Picture
And surprise: IMEI belongs to Samsung G600. Busted! So, the IMEI claimed to belong to a Samsung G608 actually belongs to a Samsung G600, which is the wrong platform used by scammers to sell fake stealth phones. Simple as that.

A genuine Samsung G600 back label looks like this:
genuine stealth phone
Proper Samsung S/N: 11 digit
Please note the structure of Serial Number: 11 digit, as Samsung official says.

We did not stop there and asked an Samsung official about this label (IMEI and S/N). Here is his response: samsung_reply.pdf Download File

SAMSUNG  ELECTRONICS  CO.,LTD. 
416 Maetan3-Dong Yeongtong-gu, Suwon city, Gyeonggi-Do, Korea 442-742


Date:  Jan12, 2015 

RE:  Request of Information for IMEI 355683044004277

To: Mr. XXXXXXXXXXXXXXX 

The IMEI 355683044004277 belongs to an Samsung SGH-G600 that was produced by Samsung Electronics in 2007.

The serial number R1VPANTITAP is wrong an is not specific to Samsung S/N. Serial numbers used for Samsung G600 and Samsung G608 series are having 11 (eleven) digit, a sequence of letters and numbers but not only letters.

We are happy to assist you in your academic study. Please do not hesitate to contact us for further assistance.

Sincerely,
SEOUNG HO PARK
SAMSUNG ELECTRONICS CO.,LTD.

We also find that FCC ID A3LSGHG606 from that fake Samsung G608 belongs actually to Samsung G600:
fake samsung g600 stealth phone
FCC ID belongs to Samsung G600
This particular scammer is trying to fool buyers and taking advantage of the lack of information of most of you, when it comes to special mobile phones called stealth phones. This scammer sell fake stealth phones, making them to look like original ones (XCell) by sticking a false label on the back of the phone. And nothing more. No hardware modifications, no filters, nothing that can be named a real and working stealth phone.

Moreover, this scammer is trying to convince the website visitors and potential buyers that Samsung Electronics has built the "stealth phone" that he sell. Nothing could be more wrong: Samsung has never built stealth phones but only regular cellular phones.
The real IMEI change stealth phones are being built based on a patent that belong to XCell Technologies, the manufacturer company. The phones are manufactured only by XCell Technologies and sold directly to consumers or through various resellers and regional dealers, under various brand names or even as no name stealth phones for discrete use, considering XCell reputation and brand awareness.
You can easily identify a real XCell stealth phone by checking up the security seal and other things mentioned in the previous post.

Conclusions

If the low price is the only choice maker, you should think once again before buying a cheap stealth phone from a dubious seller: is that you want? A fake stealth phone is as useful as a real one? It will work the same? Will really protect your privacy? The answers are found in comparative tests presented in the previous post.

And not at last: our advice is just to avoid www.imeichanger.com and secretgsm.com, if you really care of your calls privacy.

fake stealth phones on antitap.com
Fake Samsung G608 sold by antitap.com
Update 30.05.2015:
The websites owner (imeichanger.com, antitap.com and secretgsm.com) has removed by some obvious reasons (he got caught using fake IMEI labels to fool the buyers that he sell proper and working stealth phones) the pictures that shows fake IMEI sticker. Right now he is only stating that the phones he sell are Samsung G608, as you can see on above screenshot.
Just for your own knowledge, if you want to challenge this scammer to disclose the real Samsung platform, you might ask him certain questions. Please contact us for further information.

Another hilarious and cheap trick used by this funny scammer (trick actually used before by the same person) is pretending out of the blue that he sell nothing but IMEI stealth Phone v4 (?!). Why this? Well, there is a simple and straight forward explanation: since XCell Technologies has recently released the real v3 Stealth Phone (please see their promo video), the scammer think that by simply claiming that he sell the newest version (v4), he will boost his sales. Since XCell Technologies - the real manufacturer - is clearly showing what the differences are between previous version (v2) an actual version (v3) on their videos (video 1, video 2) and webpage, the scammer is just stating that he sell v4 version. Only words with no facts behind. Not even a few pictures to support false claims. Moreover, he has used the same stolen pictures on phone description (please note that picture shadow used by XCell Technologies). 
Just to have fun on what he will find appropriate to explain in what exactly consist the changes that his "v4" is having you might challenge him to reply to your questions. Because we did and we had a lot of fun.

As a conclusion, what you should be sure is that there is no real "v4" version, but only words, a ridiculous and strange marketing strategy to sell something fake and obsolete.
fake stealth phones on antitap.com
Fake v4 version sold by antitap.com
Here is the real and the latest version of stealth phone developed by the genuine manufacturer, XCell Technologies. Please note the clearly spotted differences between the latest version (v3) an the previous one:

What else?
Well, as before there is no product manual, but only few heterogeneous and promiscuous explanations copied off the XCell website. Because XCell Technologies has understood do not disclose some crucial functions and how to be used to general public but only to its users, the scammer that have no clue about how the phone work and how cell phone interception is actually performed, has simply skipped the explanations about Channel lock and Unping functions. Also, he have no clue about how to proper use the IMEI change function. Actually there is no user instructions but only a promiscuous and hard to understand phone description. The conclusions are yours, and are more than relevant.

Following our investigations, we found that the website is run by a private person. There is no company behind website.
Hence the risk of buying off this site any products offered for sale. On Contact page there is only a contact form, with no postal address or other details regarding company location, things which should arouse suspicions straight away, to anyone. No wonder this scammer is confusing a website with the company itself, which beyond being a funny approach it relives his business understanding. We'll be back with more info.
0 Comments

The truth exposed: Stealth Phones, fake vs. real ones

5/30/2015

0 Comments

 
The ultimate test
Before reading any explanation, please watch the video footage below. It is self explanatory.
This is the supreme test that any scammer or fake stealth phones vendor will hide from you.

The video contains a test done with a SIM card that was intercepted (taped) at that time, tested on two stealth phones (aka change IMEI phones, untraceable phones or dynamic IMEI phones) that looks the same but
are essentially different: a fake and a real one.

First we have tested the fake stealth phone. Although the SIM card was intercepted, no call interception alarm was triggered.
The second time we have tested the intercepted SIM card on a real stealth phone. Interception alarm was triggered as soon as the SIM card has been inserted into the phone. Also during the call was displayed call interception alarm: an open padlock red that persists throughout the call.

Picture
Preliminaries.

We are a team of three mobile communications professionals from an European University.  Read more about us.

Elaborating an academic study about security of mobile communications, our team bought among others a stealth phone via the Internet, as anyone else would do: by choosing the lowest price. We regretted this later, because at that time the low price was only one that made ​​the difference.


Our case.

Current market shows a relative abundance of stealth phones, most of them sold by private individuals on traditional online sales channels (Internet consumer-to-consumer direct sales). A person interested in buying such a phone is no doubt attracted by the lower price, as the only selection criterion, in the absence of significant information about stealth phones and how mobile wiretap works.
Many buyers have already made this wrong choice, and now their mobile calls security is seriously affected. Why? Because they bought a cell phone that just looks like a stealth phone without actually having stealth phone functions: only apparently stealth functions are present on the phone, but they do not work properly, as vendors claim.
Why this situation? Because a stealth phone needs not only special software, but also substantial hardware changes that make the software run properly. Both software and hardware changes are patented by a Swiss based company, XCell Technologies LLC. This company (and their resellers and distributors) are only able to deliver a true stealth phone, 100% functional.
From technical explanations provided by the company representatives we understand that malfunction also come from the wrong choice of phone platform. While legitimate manufacturer use Samsung G608 platform, those fake stealth phones use cheaper Samsung G600 platform, which is simply not compatible 100% with the software (see Photo 1). We have to mention that the two phones Samsung G600 and G608 looks apparently identical, but have significant structural differences.
fake stealth phones
Photo 1
Picture
Have you ever wondered why some stealth phones are sold by private individuals? The answer is unequivocal and straightforward: on these phones is installed a cracked software, which not work properly, is unstable and is a fraud, in the end of the day. Also, these phones are not hardware modified in any way, which makes the software installed to be useless, giving only the appearance of a stealth phone, not the functionality of a real stealth phone.
In fact, people who sell these fake stealth phones do not know anything about the phone function, nor about the ways in which mobile phones are wiretapped (intercepted). They are limited to installing the cracked software on the phone and copying brief explanations and images from legitimate manufacturer webpage, trying to look more real, informed and professional.
Those who buy a fake stealth phone from a private person (as we did in the first instance) will have to face other problems, too: the lack of elementary customer service  or worse,completely wrong explanations about stealth phone functions that will seriously affect the security of mobile calls. Also there is no product guarantee or eventual replacement or repair. The fake stealth phone bought by us got stuck after a few weeks of testing and we were lucky that we managed to make the film. Repair or replacement was refused repeatedly by the vendor, and the website where we've bought has not taken any action against him. Vendor says he only sells phones, not repair nor replace them because it's just a private person and he do not provide additional information about the phone, for those who bought it. But when it comes to personal security and mobile communications, such an approach is totally wrong.

For these reasons we had to buy another stealth phone, to be able to continue our study on mobile communications security. This way we found XCel Technologies, a legitimate company that manufacture and sells these real stealth phones. Before buying the phone we have asked about operating conditions and repair or replacement in case of failure. We received a prompt and professional customer service, every single time. This company replaces any defective mobile phone, the general warranty term is two years, common to any other mobile phone. Until now, however, was not the case for any fixes, the phone works perfectly and does the job, as you can see in the video.

Customer service responses has helped us in our research on mobile communications security, through understanding the ways in which the mobile phone is monitored, tracked and wiretapped, the way it works IMSI catchers (aka StingRays in US) and possibility to detect them. Our study results will be published soon on the University website. Our study conclusions promises to be extremely interesting.
Other differences.

Besides that wiretapping alerts do not work at all, fake stealth phones differ from real ones not only from functional point of view but as legal aspects too. Fake stealth phones differ from real ones by the following aspects:

For legal protection of hardware changes, on real stealth phones are applied security seals, on the inside of the phone. See Photo 2, below.

fake stealth phones
Photo 2: Security seals
Real stealth phones have engraved the manufacturer logo (see Photo 3), because they can not be legally sold as original Samsung phones, since hardware and software changes that has been done are beyond the control of Samsung Electronics Co. From this point of view XCell Technologies comply with local law and international copyright law, without any export restriction of their products. Legitimate manufacturer sell stealth phones that are Samsung modded cell phones.
fake stealth phones
Photo 3
fake stealth phones
Photo 4
Another visible difference: fake stealth phones are using shoddy packaging, a ridiculous copy of the original packaging, as can be seen in the Photo 4. We've got information from other fake stealth phone users that some vendors sell these handsets even in paper envelopes or wrapped in bubble foil without any other packaging.
Since a real stealth phone have software and hardware changes, can not be sold as a genuine Samsung phone in the original packaging,  because basically is another product. The packaging used by the legitimate manufacturer is a quality one, unique and distinctive.

What else a scammer or fake stealth phone vendor will use to make you think that is selling a genuine stealth phone?
Well, some of them are trying to use some counterfeit IMEI stickers on the phone backside, trying to give a genuine appearance to their fake stealth phones.Sure, a sticker will not make a fake stealth phone, genuine. In fact not the sticker is important in our opinion, but the phone functions. And fake stealth phone functions does not work at all, as we have clearly demonstrated in the test above.
Others will try to lure you with attractive and suspiciously low prices.
It's too good to be true? If you find yourself asking this question, then probably yes, it is not true.
Others will try to use marketing methods that looks pretty hilarious when it comes to secure phones, as the guy behind imeichanger.com, anti-tap.com and secretgsm.com has done in the past: offering a free t-shirt for every handset that he sold. The same guy has been caught in the past, using fake G608 IMEI stickers, trying to fool people that he is selling proper stealth phones and not fake ones.
From then, his business reputation was pretty much ruined and now is trying to promote the idea that the sites and business owner has changed, trying to escape of such a bad reputation.. Please see our blog.

ounterfeit stealth phonesCounterfeit stealth phones
Conclusions. 

The low price can often be a trap, and in this particular case can be a very dangerous one: it will cost your personal security and will disclose secrets that you think you defend by using a fake stealth phone.

A counterfeit stealth phone is a ticking bomb in your pocket. Unfortunately you find out that you have been fulled by the scammer when usually is way too late: you "stealth" phone has been wiretapped and you got busted.

Trying to help those who want to buy a stealth phone, we asked XCell Technologies to notify us the resellers and distributors list. Company representatives were pretty reserved on the subject, saying that permission to disclose these details is not a part of distribution agreement, emphasizing that some resellers sell these phones under their own trademark and do not wish these details to be made public.
As you can guess, private individuals selling fake stealth phones does not fall into this category.





Picture
0 Comments

    Author

    Stealth-phones-guide.com

    Archives

    April 2022
    January 2022
    April 2021
    March 2021
    March 2019
    August 2016
    February 2016
    October 2015
    June 2015
    May 2015

    Categories

    All
    10 Functions Scam
    2016 Stealth Phones
    2019 Stealth Phones
    2021 Stealth Phones
    2022 Fake Stealth Phones
    2022 Scam Alert
    ABC Limited Scam
    Android Stealth Phone
    Android Ultra Secure Stealth Phones
    Anonymous Sim Card Scam
    Anti Eavesdropping
    Anti Interception
    Anti Stingray
    Antitap.com
    Anti Wiretapping
    AUDIO VIDEO INTELLIGENCE CORPORATION
    Authentic Stealth Phone
    Basic Stealth Phone
    Blackstone-security Scam
    Call Encryption Fail
    Cell Phone Interception
    Change Imei Free Software
    Change Imei Phone
    Change IMSI
    Change Voice
    Change Voice Scam
    Counterfeit Change Imei Phones
    Counterfeit Untraceable Phones
    Couterfeit Stealth Phones
    Deniz Ok Scammer
    Dual SIM Stealth Phone
    Dynamic Imei Phone
    EBay Stealth Phone Scam
    Encrypted SIM Cards
    Encrypted Smart Phone Scam
    Entry Level Dual Sim Burner Phone Scam
    Fake Imei Changer
    Fake Stealth Phones
    Fix.mobile.to.work
    Free Samsung G600 Stealth Phone Firmware 7 Unctions
    Free Stealth Phone Firmware
    Genuine Stealth Phones
    Gsm-interceptor.co.uk
    Imeichanger.com
    JD Mobile Unlock Service
    MLSP
    Multi IMSI SIM Card
    Multy Layer Security Protocol
    Multy-Layer Security Protocol
    Nokia Stealth Phones
    OneTech International Co
    Original Stealth Phone
    Phone Number Change
    Real Change Imei Phone
    Real Stealth Phones
    Real Untraceable Phone
    Russian SIM Cards
    Samsung G600 Stealth Firmware
    Secretgsm.com
    Sectelworld@protonmail Scam
    Sec_tel_world Scam
    Secure Cell Phone
    Secure_gsm Scam
    Secure SIM Cards
    Secure Wifi Router Scam
    SHX Trading SRO
    Siemens R32 Scam
    Siemens-sl-75-scam
    Siemens Stealth Phone Scam
    SMS Encryption
    Spdirect
    Spoofing Phone Number
    Spystore Ireland
    Stealth IPhone 5 Scam
    Stealth Phone
    Stealth Phone Free Software
    Stealth Phone Scam
    Stealth Phones.com
    Stealth-phones.com
    Stealth Phones New Release
    Stealth Phone Software
    Stealth Phones That Work
    Stealth Phones Trick
    Stealth Phone V4 Scam
    Stealth Samsung S4 Duos Scam
    Stealth Samsung S5 Scam
    Stealthtronic.com
    Test Your Secure Cell Phone
    Ultra Secure Messaging
    Ultra Tough Anti Tapping Phone Scam
    Untraceable Cell Phones
    Untraceable Phone
    Untraceable Phone Free Software
    Untraceable Phone Scam
    Untraceable Phone Scam Wiretapping Detection
    VHF Stealth Dual SIM Anti Tapping Phone Scam
    Voice Call Encryption Fail
    Voice Changer
    Voice Encryption
    Wifi Hotspot Scam
    Wiretapping Detection
    Witz.end.solutions
    XCell Basic V3
    XCell Stealth Phones
    XCell Technologies 2016
    XCell Technologies New Release
    ZOPO Anti Interception Phone Scam

    RSS Feed

Stealth Phone Scam: a reality that you need to know