FindArticles FindArticles
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
FindArticlesFindArticles
Font ResizerAa
Search
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
Follow US
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
FindArticles © 2025. All Rights Reserved.
FindArticles > News

Secret Service Busts SIM Server Ring That Targeted Cell Towers

Bill Thompson
Last updated: October 25, 2025 9:52 am
By Bill Thompson
News
8 Min Read
SHARE

The U.S. Secret Service says it has aggressively shut down a quiet network of SIM server farms near New York City—a big enough operation that investigators’ right-hand rule applies, meaning it was likely in place to degrade if not disable hospital and other cell phones nearby. The ring was said to have fueled huge numbers of mass mock calls, involving swatting threats on senior U.S. officials, as well as being used to disguise comms for both nation-state operators and criminal entities.

What Investigators Found Across the New York Region

Investigators seized over 300 SIM servers with some 100,000 cards in various “electronic safe houses,” the Secret Service said. Some of the systems were concealed in rented apartments and “inconspicuous commercial locations,” located densely around the region including Queens, New Jersey, Armonk and Greenwich as part of a ring surrounding critical cell towers.

Table of Contents
  • What Investigators Found Across the New York Region
  • How SIM Server Farms Operate and Enable Abuse
  • Why Disabling Cell Towers Endangers Public Safety
  • Attribution and Motives Behind the SIM Server Ring
  • How Carriers and Agencies Are Responding
  • What to Watch Next in the SIM Server Farm Case
A professional shot of a Secret Service agent in sunglasses standing beside a black presidential vehicle with flags, with a Marine One helicopter in the background on a tarmac by a city and water. Filename : secret serviceagent marine one.png

Early indications are that suspected state-linked operators were in communication with people already identified by federal law enforcement. The same tool was used to make swatting calls to lawmakers, causing emergency deployment on fabricated hostage or shooting situations, CNN reported.

Many of the servers, importantly, were located in the same area as the United Nations campus, and this prompts worries that the network might have been constructed as a plan for disruption of connectivity during high-profile events or deny encrypted channels for operatives in close proximity.

How SIM Server Farms Operate and Enable Abuse

SIM server farms — they’re also known as SIM boxes or banks — cram thousands of SIMs into rack-mounted gateways that can generate voice calls and texts on an industrial scale. In the world of fraud, they are often used to avoid carrier fees or to blitz out one-time passcodes and spam. SIM box abuse has long been highlighted by the GSMA as a major telecom fraud vector.

But at the volume described by the Secret Service, these systems are capable of more than evading tariffs. When coordinated, they can inundate a local radio access network with signaling, obscure the source of calls and automate pervasive campaigns such as organized spoofing or harassment. The seized gear, the investigators said, could also push targeted denial-of-service effects at cell sites — overwhelming resources and degrading service without physical sabotage.

SIM farms are a different technology from IMSI catchers. The former generate or retransmit traffic through valid SIM keys; the latter are interception devices that impersonate base stations. Both can be abused, but they abuse very different parts of the cellular ecosystem.

Why Disabling Cell Towers Endangers Public Safety

Cellular networks underpin public safety. The FCC points out that most 911 calls in the United States come from mobile phones. Even isolated service disruptions can delay emergency response, interrupt Wireless Emergency Alerts and impede coordination among first responders. CISA designates the sector as a National Critical Function specifically because outages cascade through transportation, healthcare, financial and government functions.

New York region map marking locations where investigators found key evidence

In cities, networks are powered by thick grids of 4G and 5G sites that can divide their time between delivering capacity and coverage. A concentrated signaling flood or call storm in a couple of neighborhoods is enough to upset this balance and, for thousands of people, swamp the radio network with dropped calls, failed texts and compromised data sessions. As attacks become increasingly sophisticated, and potentially more damaging to national security, defenses need to scale as quickly as the threats do — though not in terms of how quickly things get blown up.

Attribution and Motives Behind the SIM Server Ring

The location of the money and command structure remains to be pieced together by investigators. The pattern that is beginning to emerge fits a hybrid motive set: political harassment and intimidation through swatting; communications cover for operators; as well as a dormant capability to disrupt networks during politically sensitive moments, with proximity to diplomatic centers suggesting a tradecraft of espionage and call patterns that mimic techniques used in criminal spam and toll bypass efforts.

The F.B.I., which runs a National Swatting Virtual Command Center, has documented an increase in the use of coordinated hoaxes in recent years. Stack a SIM farm on top of internet-based calling and those bad actors have a far more difficult hoax to trace and one that can quickly scale out; in particular when the likely rotation of SIMs is spatially distributed and automated at the server side.

How Carriers and Agencies Are Responding

Carriers already use analytics to identify SIM box patterns—call terminations outside the norm, unusual IMEI–IMSI pairings, and high-velocity SMS traffic—and increasingly collaborate with law enforcement on takedowns. STIR/SHAKEN is a standard for caller ID authentication in IP voice networks that attempts to thwart spoofing among other nefarious tactics; of course, baddies combine many techniques to skirt around filtering.

CISA and the FCC have recommended that carriers harden their signaling planes, share indicators of compromise, and practice dealing with outages alongside emergency services. Tabletop exercises are now a standard part of planning by government facilities and event planners, and scenarios on cellular degradation have been added alongside threats like physical violence or cyberattack.

What to Watch Next in the SIM Server Farm Case

The forensics on that, mapping SIM inventories to traffic, tracing payments and correlating call metadata — all of which will be required eventually to get a handle on the attack — would identify whether this was something state-ordered or a criminal service for hire. Expect more seizures as teams trace up the supply chain — server vendors, apartment leases, power and backhaul contracts and the resellers that provisioned bulk SIMs.

The bigger lesson is strategic. Modular tools that make for legitimate scale in telephony and data need only cyber platforms to be turned against their owners, elected officials and the everyday security of citizens. Exposing a 100,000-card ring on America’s most crowded airwaves highlights that the front lines for defending critical infrastructure now involve racks of plastic cards — and the software smart enough to use them.

Bill Thompson
ByBill Thompson
Bill Thompson is a veteran technology columnist and digital culture analyst with decades of experience reporting on the intersection of media, society, and the internet. His commentary has been featured across major publications and global broadcasters. Known for exploring the social impact of digital transformation, Bill writes with a focus on ethics, innovation, and the future of information.
Latest News
Harmattan AI Raises $200M Series B, Becomes Defense Unicorn
When the Samsung Galaxy S26 Will Go on Sale in Stores
Comprehensive Edubrain.AI Review: Everything You Need to Know About This Homework Tool
Klipsch Atlas HP-1 Leaves Sony And Bose For Dead
Galaxy Z Flip 8 Camera Specs Seemingly Remain Unchanged
Thinking About Proposing in Arizona? Here’s What Actually Matters
A Practical Guide to Migrating from Traditional CMS to Headless Architecture
How Phishing Scams Bypass 2FA and How You Can Stop Them
Emerson introduces offline voice-controlled appliances
Microsoft Lens shutdown imminent: app usable only for weeks
Golden Globes 2026 Biggest Moments Leave Hollywood Stunned
Smart Glasses Give Birth to Latest Phone IMEI Theft Scam
FindArticles
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
  • Corrections Policy
  • Diversity & Inclusion Statement
  • Diversity in Our Team
  • Editorial Guidelines
  • Feedback & Editorial Contact Policy
FindArticles © 2025. All Rights Reserved.