SIM card tracking flaw lets spies locate you, VPN won’t help

Zaid Al-Mansouri
By
Zaid Al-Mansouri
AI-powered tech writer covering smartphones, wearables, and mobile technology.
12 Min Read
SIM card tracking flaw lets spies locate you, VPN won't help — AI-generated illustration

A hidden SIM card tracking flaw lets spies and covert surveillance actors pinpoint your exact location without your knowledge, and no VPN can stop it. Unlike GPS tracking or stalkerware apps that require your device to be actively using location services or malicious software to be installed, this attack happens silently at the cellular network layer—completely invisible to you and completely beyond what any VPN can protect against.

Key Takeaways

  • SIM cards continuously communicate with cell towers, revealing location data every 30 seconds or less, even when GPS is off.
  • SimJacker attacks exploit SIM Toolkit (STK) commands sent via SMS to retrieve location data from thousands of devices remotely.
  • IMSI catchers impersonate cell towers to capture SIM identities and downgrade connections to insecure 2G networks for tracking.
  • VPNs cannot block SIM-to-tower signaling because the exploit operates at the cellular layer, not the IP/internet layer.
  • Commercial surveillance tools exploiting these flaws have been actively deployed by government-linked firms for years.

How SIM Card Tracking Works Without Your Knowledge

Your SIM card is constantly talking to cell towers. Every few seconds—sometimes as frequently as every 30 seconds—it silently broadcasts its presence and location data to the nearest tower. This happens whether your GPS is on or off, whether you’re making calls or sending texts, and whether your phone is actively in use or sitting idle in your pocket. Telecom companies log this information automatically as part of network operations. The problem is that this same constant chatter creates a permanent surveillance channel that spies can exploit.

Location tracking via cell towers uses triangulation from three or more towers catching your SIM’s signal. Your phone automatically connects to the strongest nearby tower, and when multiple towers detect your device, they can calculate your position with surprising accuracy. The SIM card’s International Mobile Subscriber Identity (IMSI)—the unique identifier baked into every SIM—is the key that makes this possible. This is not a theoretical risk. Covert surveillance actors have been weaponizing this vulnerability for years.

SimJacker: The SMS-Based SIM Hijacking Attack

In 2019, security researchers at AdaptiveMobile Security disclosed SimJacker, an active exploit that turns your SIM card into a tracking beacon via a single malicious SMS message. The attacker sends you a text containing hidden SIM Toolkit (STK) instructions—essentially spyware commands that your SIM executes silently without any notification. Your phone receives the message, your SIM processes the embedded commands, and location data gets exfiltrated. You never see anything happen. The researchers documented that attackers had already obtained location information from thousands of devices over extended periods without the knowledge or consent of the targeted users.

What makes SimJacker particularly dangerous is how simple it is to execute. The malicious SMS can instruct your SIM to send location data, setup calls, launch a browser, retrieve local information, or run commands—all triggered by a $10 GSM modem that any attacker can purchase online. The attack is not blocked by antivirus software, does not require you to click anything, and does not appear in your message history. By the time you receive the SMS, the damage is already done. The researchers noted that during the attack, the user is completely unaware that they received the attack, that information was retrieved, and that it was successfully exfiltrated.

IMSI Catchers: Rogue Cell Towers That Impersonate Networks

A second class of SIM card tracking attack uses IMSI catchers—rogue devices that impersonate legitimate cell towers to trick phones in the area into connecting to them. These devices capture your SIM’s IMSI and can downgrade your connection to insecure 2G networks, which enables attackers to log your location and expose your calls and text messages. The barrier to entry is shockingly low. Security researchers have built functional IMSI catcher demonstrations using devices costing around $50, making this attack accessible to law enforcement, criminals, and government agencies alike.

Once an IMSI catcher has your device’s attention, it logs your location continuously and can enable further surveillance. Unlike SimJacker, which requires sending a targeted SMS, IMSI catchers work passively on anyone in range. They are portable, affordable, and difficult to detect without specialized equipment. This is why they are a favorite tool of both legitimate law enforcement and unauthorized surveillance operators.

Why Your VPN Cannot Help You

VPNs encrypt your internet traffic and hide your IP address from websites and services you visit. They are genuinely useful for privacy against internet-level monitoring. But they are completely useless against a SIM card tracking flaw because the attack operates at the cellular network layer, not the IP or data layer. Your VPN runs on top of your cellular connection—it cannot intercept or block the silent communication between your SIM card and cell towers.

When your SIM card broadcasts its location to towers, it is doing so as part of the cellular protocol itself, before any VPN encryption even takes place. The exploit happens in the telecom signaling system, which sits below everything else on your device. A VPN cannot see it, cannot block it, and cannot prevent it. This is a fundamental architectural limitation. Your SIM card’s conversation with the network is separate from your device’s internet traffic, and that is precisely why these attacks are so effective.

Active Exploitation by Government-Linked Firms

These are not theoretical vulnerabilities being discussed in academic papers. SimJacker exploits have been actively used by a private company working with governments for at least two years as of 2019, across multiple countries. This means surveillance operations using these techniques are happening right now, targeting real people, in the real world. The researchers who disclosed SimJacker emphasized that this attack is unique because the malicious SMS could logically be classified as carrying a complete malware payload—specifically spyware.

The fact that these exploits remain active and unpatched years after disclosure underscores a hard truth: your carrier cannot easily fix this problem, and your device manufacturer cannot either. The vulnerability sits in the SIM card firmware and the telecom signaling protocols themselves. Carriers would need to upgrade their infrastructure, SIM card vendors would need to patch firmware, and governments would need to enforce those upgrades—none of which has happened at scale.

What Separates SIM Tracking From Other Surveillance Methods

Traditional GPS tracking requires your device to have GPS enabled and often relies on apps or software that must be installed first. Stalkerware apps need physical access to your phone to install. But SIM card tracking requires none of these preconditions. It does not need your permission, does not need you to install anything, does not need GPS to be on, and does not need you to make a call or send a message. It works 24/7, silently, at the network level.

This makes SIM card tracking fundamentally different from and more dangerous than the surveillance methods most people worry about. You can disable GPS. You can scan for stalkerware. You can use a VPN. But you cannot turn off your SIM card’s communication with cell towers without disconnecting from cellular service entirely. That is the trap.

Can You Reduce Your Exposure?

Complete elimination of SIM card tracking is not realistic without abandoning cellular service altogether. However, reduction is possible. Using Wi-Fi calling instead of cellular calls, minimizing cellular data usage, and keeping your phone in airplane mode when you are not actively using it all reduce the frequency of SIM-to-tower communication. Some users have also explored switching carriers or using prepaid SIM cards to reduce tracking history, though this offers only marginal protection against targeted attacks like SimJacker.

The hard truth is that these mitigations are inconvenient and incomplete. A determined attacker with access to SimJacker or IMSI catcher technology can still locate you if they target you specifically. The only real protection would be systemic—carriers patching vulnerabilities, governments enforcing security standards, and manufacturers implementing stronger SIM card protections. None of that is happening at the speed the threat requires.

Is there a way to block SIM card tracking completely?

No. SIM card tracking happens at the cellular network layer, below the operating system level of your device. You cannot block it with software, settings, or VPNs. Turning off cellular service is the only way to stop it, but that disconnects you from phone calls and mobile data entirely.

Can a VPN protect me from SIM card tracking?

No. VPNs encrypt internet traffic but do not affect SIM-to-tower communication. The exploit operates at the cellular signaling layer, which sits beneath your VPN connection. A VPN cannot intercept or block these attacks.

How often does my SIM card transmit location data?

Your SIM card communicates with cell towers constantly, sometimes as frequently as every 30 seconds. This happens automatically as part of normal cellular network operations, regardless of whether you are actively using your phone.

The SIM card tracking flaw reveals a gap in mobile security that most users do not even know exists. Your carrier has your location data constantly. Spies can exploit your SIM card to access it silently. And the tools we rely on for privacy—VPNs, encryption, privacy settings—cannot help. Until carriers and governments take these vulnerabilities seriously enough to patch them, the only honest answer is that your location is trackable by anyone with the right tools and the will to use them.

This article was written with AI assistance and editorially reviewed.

Source: TechRadar

Share This Article
AI-powered tech writer covering smartphones, wearables, and mobile technology.