Kuwait Smishing Triad Rogue Cell Towers Target Banks and Telecoms

Feb & Aug 2025 · KD 4M protected

HIGH

By Karim El Labban · ZERO|TOLERANCE

In two separate operations in February and August 2025, Kuwaiti authorities dismantled mobile

fraud cells operating rogue Base Transceiver Stations - portable fake cell towers - from

vehicles circulating through Kuwait City and the Salmiya district. The operations resulted in

the arrest of eight foreign nationals: six Chinese nationals in the first operation and two

Nigerian nationals in the second. Both cells were operating hardware capable of intercepting

legitimate mobile network traffic and injecting fraudulent SMS messages impersonating Kuwaiti

banks and financial institutions into the devices of nearby citizens.

Cybersecurity firm Resecurity linked the operations to the “Smishing Triad,” a well-documented

transnational fraud network with confirmed activity in over 121 countries. The Kuwait operations

represent two of the most technically sophisticated smishing interdictions in the Gulf in 2025,

and the August arrest marked the first confirmed instance of Kuwait’s Communications and

Information Technology Regulatory Authority (CITRA) directly triggering a major cybercrime

enforcement operation through its own network monitoring capabilities.

## Key Facts

  • .**What:** Rogue cell towers in vehicles sent fake bank SMS to steal credentials in Kuwait.
  • .**Who:** Banking customers in Kuwait City and Salmiya targeted via spoofed messages.
  • .**Data Exposed:** Banking credentials and OTPs intercepted through fake BTS towers.
  • .**Outcome:** Eight foreign nationals arrested; KD 5 million in funds protected by police.

## What Happened

In two separate operations five months apart, Kuwaiti authorities dismantled mobile fraud cells operating rogue Base Transceiver Stations from vehicles circulating through Kuwait City's commercial districts.

The first operation, on February 13, 2025, was triggered by concurrent alerts from multiple Kuwaiti telecom companies and banking institutions reporting anomalous SMS patterns.

Signal-tracking by the Cybercrime Combating Department located a vehicle in the Farwaniya area carrying BTS hardware and a six-person crew of Chinese nationals with forged identity documents.

A Kuwaiti citizen and Egyptian expatriate were subsequently arrested for visa trafficking. The equipment seized included BTS hardware, a laptop managing injection campaigns, and databases of mobile numbers from previous regional operations.

The second operation, on August 10, 2025, marked a significant development: it was initiated not by telecom or bank alerts but by CITRA's own network monitoring systems detecting suspicious intrusions into Kuwait's telecommunications infrastructure.

CITRA filed a formal law enforcement referral, and signal-tracking located a vehicle in the Salmiya district operating rogue BTS equipment. Two Nigerian nationals were arrested after a failed vehicle pursuit.

Cybersecurity firm Resecurity attributed both operations to the Smishing Triad, a transnational fraud network with confirmed activity in over 121 countries.

The Cybercrime Combating Department reported protecting KD 4 million (approximately $13 million USD) in citizen funds targeted in related December 2024 operations, and an additional KD 1 million ($3.2 million USD) during January through May 2025. The total KD 5 million in protected funds establishes the financial scale of the rogue BTS threat to Kuwaiti banking customers.

The August operation was the first confirmed instance of CITRA directly triggering a major cybercrime enforcement operation through its own monitoring capabilities - a concrete operational output of the DPPR Decision 26/2024 framework functioning as intended.

## Operation One: The Farwaniya Cell (February 13, 2025)

The first operation unfolded on February 13, 2025, when Kuwait’s Cybercrime Combating Department

began receiving concurrent alerts from multiple Kuwaiti telecom companies and banking institutions.

The alerts described an anomalous pattern of SMS messages appearing to originate from official

bank sender IDs but containing phishing links directing recipients to credential-harvesting pages.

The volume and geographic clustering of complaints pointed to a localized emission source rather

than a conventional internet-based smishing campaign operating from overseas infrastructure.

A rogue BTS - also known as an IMSI catcher or “stingray” device - works by broadcasting

a cell tower signal stronger than legitimate towers in the vicinity. Mobile phones within range

automatically connect to the strongest available signal without any user action or authentication

requirement on the device side. Once connected, the rogue BTS can intercept unencrypted SMS

traffic passing through it and, more relevantly in this case, inject arbitrary SMS messages

directly into connected handsets with any sender ID the operator chooses to configure. The

spoofed sender ID is indistinguishable from a legitimate bank message in the recipient’s

message thread, appearing alongside genuine historical communications from the same institution.

Signal-tracking operations by the Cybercrime Combating Department located the rogue BTS

emission source to a vehicle circulating through the Farwaniya area of Kuwait City. The

vehicle was stopped and a six-person crew of Chinese nationals was arrested. Biometric scanning

during the arrest process revealed that the individuals were carrying forged identity documents

and falsified residency records. The investigation subsequently identified a Kuwaiti citizen and

an Egyptian expatriate who were arrested separately on charges of visa trafficking - indicating

that the cell had an established support network facilitating their presence in Kuwait on

fraudulent documentation.

The equipment seized from the vehicle included the BTS hardware itself, alongside a laptop

infrastructure used to manage the injection campaigns, databases of mobile numbers acquired

from previous smishing operations in the region, and logs suggesting the cell had been

operational for a period preceding the February 13 arrests. The Cybercrime Combating Department

noted that its intervention had protected KD 4 million (approximately $13 million USD) in

citizen funds that had been targeted in related December 2024 operations, and an additional

KD 1 million (approximately $3.2 million USD) protected during the January through May 2025

period, figures that establish the scale of the financial exposure that rogue BTS operations

represent to Kuwaiti banking customers.

Resecurity’s attribution of the February cell to the Smishing Triad is consistent with

the operational profile of that network, which has been documented operating rogue BTS hardware

from vehicles in multiple countries across Europe, Asia, and the Middle East. The Smishing

Triad is not a single organization in the conventional sense but rather a loosely federated

criminal ecosystem that provides shared technical infrastructure - including BTS hardware,

phishing page templates, and stolen data aggregation services - to criminal cells operating

in various countries under localized targeting parameters. The Kuwait operation’s targeting

of Kuwaiti-specific bank brands and the use of Arabic-language phishing pages calibrated to

Kuwaiti financial institutions suggests either a sophisticated localization capability within

the Smishing Triad ecosystem or the engagement of local criminal partners with knowledge

of the Kuwait banking landscape.

## Operation Two: The Salmiya Cell (August 10, 2025)

The August 10, 2025 operation differed from its February predecessor in one significant and

consequential respect: it was initiated not by alerts from telecom companies or banks, but

by CITRA’s own network monitoring systems detecting suspicious intrusions into Kuwait’s

telecommunications networks. CITRA filed a formal report with law enforcement based on its

own technical detection, and the resulting signal-tracking operation located a vehicle in

the Salmiya district of Kuwait City operating rogue BTS hardware.

The arrest of the two Nigerian nationals operating the August cell was complicated by an

active flight attempt - the driver of the vehicle attempted to flee when approached by

authorities, resulting in a collision with other vehicles before the cell was successfully

apprehended. The rogue BTS equipment was seized, and the investigation established that

the August cell had been targeting telecom customers in the Salmiya area in a pattern

consistent with the February operation: spoofed bank SMS messages directing recipients

to credential-harvesting infrastructure.

The significance of the August operation lies in what it reveals about the maturation of

Kuwait’s regulatory and enforcement posture. CITRA’s ability to independently detect

unauthorized intrusions into telecom network infrastructure and translate that detection into

an actionable law enforcement referral represents exactly the kind of proactive regulatory

function that its recent governance framework was designed to enable. The DPPR Decision 26/2024,

which mandated 24-hour breach notification obligations for telecommunications operators

effective January 1, 2025, had created new reporting channels and presumably enhanced

information-sharing protocols between CITRA and the Cybercrime Combating Department. The

August operation can reasonably be read as the first concrete operational output of that

enhanced regulatory framework functioning as intended.

The choice of Salmiya as the operational area for the August cell is worth noting from an

intelligence perspective. Salmiya is one of Kuwait’s most densely populated commercial

and residential districts, with a high concentration of expatriate residents who may be

less familiar with specific Kuwaiti banking security conventions and therefore more susceptible

to convincingly spoofed SMS messages appearing to originate from their banking institutions.

The geographic targeting of the cell suggests either operational intelligence about victim

demographics or a systematic approach to maximizing the density of potential victims per

hour of rogue BTS operation.

## Technical Anatomy of the Rogue BTS Attack

The rogue BTS attacks documented in Kuwait exploit a fundamental architectural weakness in

the 2G (GSM) mobile network protocol that has been understood by security researchers since

the early 2000s but has never been fully remediated due to the cost and complexity of legacy

network upgrades. GSM does not implement mutual authentication between mobile devices and

base stations - a handset will connect to any tower broadcasting the right network identifiers

at sufficient signal strength without verifying the tower’s legitimacy. This design decision,

made when the primary concern was call quality rather than security, created a permanent attack

surface that portable hardware costing a few thousand dollars can exploit.

Modern 4G LTE and 5G networks implement substantially stronger authentication mechanisms

that make full IMSI catcher attacks significantly more difficult, though not impossible.

However, many devices and many carriers in the region continue to fall back to 2G for SMS

delivery even in areas with 4G coverage, a legacy compatibility mechanism that preserves

the attack surface for rogue BTS operations. Attackers operating the hardware documented

in the Kuwait cases did not need to defeat 4G security - they only needed to be more

attractive to handsets than the weakest available signal in their operational area, which

in practice means broadcasting at sufficient power to pull nearby devices onto their

2G-emulated network for the duration of SMS injection.

The smishing payload itself - the fraudulent SMS message - typically directs the recipient

to a phishing page designed to harvest banking credentials, one-time passwords, or card

numbers. The sophistication documented in the Smishing Triad’s operations includes real-time

OTP relay infrastructure that allows the operator to use harvested credentials immediately,

before the victim has time to detect the fraud and contact their bank. In the Kuwait cases,

the banks’ fraud monitoring systems appear to have been an important detection layer, as

the initial alerts that triggered the February investigation came from the banks themselves

observing anomalous credential use patterns consistent with a phishing campaign targeting

their customers in a specific geographic area.

For organizations operating in Kuwait, the rogue BTS threat model has direct implications

for SMS-based authentication systems. Any organization that relies on SMS-delivered one-time

passwords as a factor in multi-factor authentication for employee access, customer login,

or transaction authorization is exposed to the scenario documented in these Kuwait cases,

where a rogue BTS can intercept and relay OTPs in real time. The National Institute of

Standards and Technology has for years recommended against SMS as an authentication factor

precisely because of this vulnerability, and the documented Smishing Triad operations in

Kuwait provide a vivid regional illustration of why that guidance exists. Organizations

should be accelerating migration from SMS OTP to authenticator application-based or

hardware token-based second factors for any access path involving sensitive systems or

financial transactions.

## Regulatory Framework and CITRA’s Evolving Role

Kuwait’s primary legal instrument for cybercrime is Law No. 63/2015, the Cybercrime Law,

which establishes criminal penalties for unauthorized access to computer systems and networks,

data interception, and electronic fraud. The operation of rogue BTS hardware for the purpose

of intercepting SMS traffic and injecting fraudulent messages falls squarely within the

unauthorized access and interception provisions of Law 63/2015, and the arrests in both

the February and August operations were processed under its authority. Maximum financial

penalties under the law reach KWD 20,000, though the criminal proceedings in cases of this

severity typically emphasize custodial sentences rather than fines, and the deportation

of foreign nationals after sentence completion is the standard outcome for cases involving

non-resident criminal actors.

CITRA’s DPPR Decision 26/2024 is the more operationally significant recent development

in Kuwait’s cybersecurity governance posture. Effective January 1, 2025, the decision

mandated that telecommunications operators report security breaches to CITRA within 24 hours

of detection. This notification requirement creates two important operational dynamics.

First, it compels telecom operators to invest in detection capabilities sufficient to

identify breaches quickly, since the clock starts running from detection rather than from

occurrence. Second, it creates a centralized information flow to CITRA that enables the

regulator to correlate signals across multiple operators - a capability that is critical

for detecting rogue BTS operations, which affect all operators whose customers are within

the device’s range simultaneously.

The August 2025 operation demonstrated this correlation capability in practice. CITRA’s

ability to independently detect suspicious intrusions into telecom networks suggests that

the regulator has developed or deployed monitoring infrastructure that goes beyond receiving

operator notifications - it implies active visibility into telecom network anomalies that

can be generated without waiting for an operator to identify and report a breach. This

represents a significant maturation of Kuwait’s regulatory enforcement posture and positions

CITRA as an active operational participant in cybercrime response rather than a passive

recipient of compliance reports.

For telecommunications operators in Kuwait, the DPPR Decision 26/2024 framework creates

concrete compliance obligations with real enforcement consequences. The 24-hour notification

window is demanding - it requires not just incident detection but also internal triage,

escalation, and regulatory reporting within a single business day. Organizations that have

not invested in the Security Operations Center capabilities, automated anomaly detection,

and pre-drafted regulatory notification templates necessary to meet this timeline are exposed

to regulatory sanctions in addition to the customer and reputational harm that follows a

smishing incident. The Kuwait cases suggest that CITRA has both the technical visibility

and the institutional willingness to hold operators accountable when their networks are

being used as attack infrastructure against their customers.

## Pattern Recognition: The Smishing Triad’s Gulf Expansion

Resecurity’s documentation of Smishing Triad activity in 121 countries places the Kuwait

operations within a global pattern of rogue BTS deployment that has accelerated significantly

since 2023. The availability of relatively affordable BTS hardware through gray market

channels, combined with the persistent GSM vulnerability that enables the attack, has

lowered the barrier to entry for criminal cells willing to operate what is essentially

a physical piece of telecommunications infrastructure in a moving vehicle. The operational

security requirements are manageable - keep the vehicle moving to avoid triangulation,

use the hardware for short deployment windows, and have false documentation prepared

in the event of a traffic stop.

The Gulf region presents specific characteristics that make it an attractive operational

environment for Smishing Triad-affiliated cells. High smartphone penetration rates, high

per-capita banking engagement including active mobile banking use, large expatriate populations

with established banking relationships who may be less familiar with specific fraud indicators,

and dense urban environments where a single vehicle can cover populations of hundreds of

thousands within a short operational window all contribute to the potential yield of a

rogue BTS operation in Kuwait, the UAE, or Qatar compared to many other operational

environments.

The use of members from different nationalities across the two Kuwait operations - Chinese

nationals in February and Nigerian nationals in August - is consistent with the Smishing

Triad’s documented model of recruiting operational cells from existing criminal networks

in different countries and providing them with centrally-developed technical tooling and

targeting databases. The shared technical infrastructure means that law enforcement interdiction

of a single cell does not disrupt the network’s overall capacity; new cells can be

activated relatively quickly using the same hardware and software stack. This resilience

to operational takedowns is a characteristic of franchise-model criminal networks that

Kuwait’s Cybercrime Combating Department and CITRA will need to account for in their

longer-term strategic response to the threat.

Effective long-term mitigation of the rogue BTS threat in Kuwait and the broader Gulf region

will require a combination of technical, regulatory, and enforcement measures working in

concert. On the technical side, telecom operators should be accelerating the deprecation

of 2G network fallback for SMS delivery and implementing IMSI catcher detection systems

in their network monitoring infrastructure. On the regulatory side, CITRA’s demonstrated

willingness to take an active enforcement role should be supported with the legal frameworks

necessary to impose meaningful consequences on foreign nationals operating illegal telecommunications

infrastructure. On the enforcement side, the intelligence-sharing protocols between CITRA,

the Cybercrime Combating Department, and international counterparts including Interpol should

be deepened to enable the kind of proactive threat intelligence that can disrupt Smishing

Triad cells before they deploy hardware in Kuwait rather than after.

The two Kuwait Smishing Triad operations in 2025 demonstrate that rogue BTS smishing

has moved from a theoretical threat to a documented operational reality in the Gulf.

The KD 5 million in protected funds and the eight arrests represent successful enforcement

outcomes, but the underlying vulnerability in GSM network architecture that enables the

attack cannot be patched without fundamental infrastructure changes. For banks, telecom

operators, and any organization using SMS-based authentication in Kuwait, the documented

threat should accelerate migration away from SMS OTP and investment in IMSI catcher

detection capabilities.

01

ZERO|TOLERANCE Advisory

The Kuwait rogue BTS operations demonstrate that smishing has evolved from a remote, internet-based threat into a physical infrastructure attack that bypasses every network-level defense a telecom operator can deploy.

The difference between an organization whose customers lose credentials through rogue BTS smishing and one whose customers are protected is not the security of the telecom network - it is the authentication architecture the organization chooses to deploy.

The first and most urgent control is the elimination of SMS as an authentication factor for any system involving financial transactions or sensitive data access.

SMS one-time passwords delivered through a rogue BTS can be intercepted and relayed in real time, before the victim has any opportunity to detect the fraud.

The National Institute of Standards and Technology has recommended against SMS as an authentication factor since 2017. Banks, government agencies, and enterprises operating in Kuwait should migrate to authenticator application-based TOTP (such as Google Authenticator, Microsoft Authenticator, or Authy) or, for high-privilege accounts, FIDO2 hardware security keys that cryptographically bind the authentication to the legitimate service and cannot be phished or intercepted regardless of the network path.

This migration is not optional - it is the single control that renders the entire rogue BTS attack chain commercially worthless.

The second control falls on telecom operators: deploying IMSI catcher detection systems within their radio access networks.

Solutions from companies such as ESD America (CryptoPhone), GSMK, or open-source projects like SnoopSnitch can detect the radio-frequency anomalies characteristic of rogue BTS operation - signal strength surges, authentication downgrades from 4G/5G to 2G, and IMSI/IMEI harvesting patterns.

Integrating these detection capabilities into the operator's network monitoring infrastructure would enable automated alerting to both the operator's SOC and CITRA when rogue BTS activity is detected, reducing the time between deployment and interdiction from days to hours.

The third control is accelerating the deprecation of 2G network fallback for SMS delivery. The entire rogue BTS attack vector exploits a fundamental weakness in the GSM protocol: the absence of mutual authentication between handsets and base stations.

Modern 4G LTE and 5G networks implement substantially stronger authentication, but many devices and carriers continue to fall back to 2G for SMS delivery.

Telecom operators should work with CITRA to establish a timeline for disabling 2G SMS fallback in areas with adequate 4G/5G coverage, eliminating the protocol-level vulnerability that makes rogue BTS operations possible.

The fourth control is customer security awareness: banks should deploy in-app push notification authentication instead of SMS OTP, and should educate customers that legitimate banking institutions will never send SMS messages containing links.

The fifth control is regulatory: CITRA should mandate that all telecom operators implement continuous RF monitoring for unauthorized base station emissions as a license condition, creating a detection mesh across Kuwait's mobile network coverage area.

RELATED ANALYSIS

Cisco Systems: ShinyHunters Claim 3M Salesforce Records, 300+ GitHub Repos, and AWS Data in Triple-Vector Extortion
Mar 31, 2026 · 3M+ records claimed · 300+ repos · April 3 deadline
Oracle's Dual Breach: 6M Cloud SSO Records Stolen, 80 Hospitals Compromised - and a Denial That Collapsed Under Evidence
Mar 21, 2025 · 6M records · 140K tenants · 80 hospitals
TriZetto/Cognizant: 3.4M Patient Records Stolen in 11-Month Healthcare Supply Chain Breach
Feb 6, 2026 · 3.4M patients · 11-month dwell · ~24 lawsuits
Infinite Campus: ShinyHunters Breach K-12 Platform Serving 11M Students via 10-Minute Vishing Attack
Mar 18, 2026 · 11M students · 3,200+ districts · 46 states
Crunchyroll: 6.8M Users Exposed After Infostealer Malware Compromises TELUS Support Agent's Okta Credentials
Mar 12, 2026 · 6.8M users · 100GB stolen · $5M ransom
MORE DATA BREACHES →