SIGNAL

Mobile AI agent attack engine — 5G, SS7, Diameter. Own the channel. Own the agent.
8
Subsystems
527
Tests Passing
SS7
Protocol Coverage
5G NR
Network Coverage
pip install red-specter-signal
Mobile AI agents trust the network / SS7 has no authentication / 5G NR NAS messages are unauthenticated / JWT tokens cross cellular bearers in plaintext / IMSI harvesting enables agent impersonation / Diameter Rx has no mutual TLS / You've never tested your agent over cellular Mobile AI agents trust the network / SS7 has no authentication / 5G NR NAS messages are unauthenticated / JWT tokens cross cellular bearers in plaintext / IMSI harvesting enables agent impersonation / Diameter Rx has no mutual TLS / You've never tested your agent over cellular

Nobody Tests the Bearer Layer

Mobile AI agents communicate over networks designed before AI existed. SS7, Diameter, GTP-U, 5G NAS — none of these carrier-layer protocols were designed with agent trust models in mind. You've tested the agent. You've never tested the channel it rides on.

Invisible Attack Surface

Your AI agents communicate over mobile networks. SS7, Diameter, GTP-U, 5G NAS — none of these carrier-layer protocols have been included in your threat model. You've tested the agent. You've never tested the bearer.

SS7 Has No Authentication

SS7 MAP was designed in 1975. There is no authentication at the protocol level. ATI queries expose location. SRI-SM redirects intercept SMS. SendIMSI harvests IMSI numbers. Every AI agent using SMS for MFA is exploitable.

Diameter Is Unauthenticated at the Application Layer

The Diameter Rx interface exposes IMS session state. Without mutual TLS — which most operators don't enforce — AVP spoofing is trivial. Session hijacking, QoS manipulation, identity impersonation: all possible from the Diameter plane.

JWT Tokens Cross Cellular In Cleartext

Mobile AI agent APIs authenticate with Bearer tokens. When those tokens traverse SS7 redirect chains or GTP-U tunnels, they're interceptable. Algorithm confusion attacks on HS256 tokens complete the credential theft chain.

IMSI Harvesting Enables Agent Impersonation

IMSI numbers are the root identity on cellular networks. Once harvested via Diameter, an attacker can simulate SIM swap attacks, forge Diameter AVPs, and impersonate the agent's mobile identity to upstream systems.

5G Doesn't Fix the Problem

5G NR introduces new attack surfaces: NAS registration abuse, SMC bypass, idle-mode attacks, network slice hopping. Private 5G (NPN) deployments have even weaker authentication than public networks. SWARM5G coordinates multi-agent attacks across slices.

The SIGNAL Armoury

Eight subsystems. Each one attacks a different layer of the mobile AI agent stack. RECON and REPORT require STANDARD clearance. All offensive subsystems require FORGE clearance.

# Subsystem Clearance What It Does
01 RECON STANDARD Mobile AI agent enumeration. SS7 MAP topology mapping, Diameter interface fingerprinting, 5G NR gNB discovery, agent API endpoint discovery, JWT/token analysis.
02 INTERCEPT FORGE SS7 MAP interception — location tracking (ATI/SRI), call/SMS redirection. Diameter Rx man-in-the-middle. 5G NAS passive capture. Agent-to-agent communication interception over cellular bearer.
03 EXTRACT FORGE Credential and session token extraction. Bearer token harvesting, OTP interception via SS7 redirect, IMSI extraction via Diameter. JWT algorithm confusion exploitation.
04 INJECT FORGE Payload injection over mobile channels. SMS prompt injection, push notification hijacking, false sensor data injection into location-aware AI agents.
05 IMPERSONATE FORGE Mobile agent identity spoofing. IMSI cloning simulation, forged Diameter AVPs, SIM swap emulation against agent authentication flows.
06 DRAIN FORGE Agent resource exhaustion. Diameter flooding, GTP-U tunnel abuse, battery drain via malformed wake signals, CPU exhaustion via crafted 5G NAS messages.
07 SWARM5G FORGE Multi-agent swarm coordination over 5G network slices. Distributed attack orchestration, network slice hopping for evasion, NPN private 5G pivot.
08 REPORT STANDARD WARLORD-compatible JSON report. CVSS scoring, MITRE ATLAS mapping, carrier impact assessment, per-finding remediation guidance.

One Command. Every Surface.

Run every offensive subsystem in sequence against the mobile target, then build a unified signed report:

$ signal-tool recon --target 10.0.1.50 --adapter mobile
[RECON] SS7 MAP endpoints: 3
[RECON] Diameter Rx exposed: 10.0.1.50:3868
[RECON] 5G NR gNB: IMSI prefix 23415
[RECON] Agent API: api.agent.internal:8443 (JWT HS256)
[INTERCEPT] SS7 ATI query: location acquired
[EXTRACT] Bearer token captured: eyJhbGci...
[INJECT] SMS prompt injection: delivered
SCAN COMPLETE | 6 findings | Report signed ✓

Adaptive Escalation

If the mobile channel resists, SIGNAL escalates. From SS7 MAP to Diameter to GTP-U — it pivots across protocol layers until the bearer yields or the library is exhausted.

Statistical Rigour

CVSS v3.1 scoring, MITRE ATLAS mapping, carrier impact assessment. Not guesswork — every finding quantified, categorised, and evidenced against the protocol stack.

Ed25519 Signed

Every report cryptographically signed with Ed25519. RFC 3161 timestamped. SHA-256 evidence chains. Tamper-evident by design — defensible in any jurisdiction.

AI Shield Integration

Every mobile channel finding generates an AI Shield Mobile blocking rule. SIGNAL findings become runtime protection for your deployed mobile AI agents. One pipeline from testing to production.

8
Attack Subsystems
527
Tests Passing
SS7+5G
Protocol Coverage
0
Failures
7
Protocol Layers

Every Carrier Layer. Every Protocol.

Mobile AI agents expose an attack surface that extends far beyond the application layer. SIGNAL maps and exploits the full carrier stack — from legacy SS7 MAP all the way up to 5G NR NAS and private NPN deployments. Each protocol layer is a distinct attack vector with its own exploitation techniques.

SS7 MAP

  • ATI location queries
  • SRI-SM interception
  • SendIMSI harvesting
  • SMS redirection
  • Call forwarding abuse

Diameter

  • Rx interface exposure
  • AVP spoofing
  • Session hijacking
  • QoS manipulation
  • Identity impersonation

5G NAS

  • NAS registration abuse
  • SMC bypass
  • Idle-mode attacks
  • Network slice hopping
  • NPN pivot

GTP-U

  • Tunnel injection
  • Bearer token capture
  • Traffic redirection
  • TEID enumeration
  • GTP flood abuse

JWT / OAuth2

  • Algorithm confusion
  • HS256 key brute-force
  • Token harvesting
  • Refresh token abuse
  • Bearer interception

Offensive. Defence. Report.

SIGNAL is Stage 54 of the Red Specter NIGHTFALL offensive pipeline. Test the mobile channel before you deploy your AI agent over it. Findings feed directly into AI Shield Mobile as runtime blocking rules and into redspecter-siem for enterprise SIEM correlation.

Stage 53 — Swarm Intelligence
PHANTOM SWARM
Autonomous multi-vector swarm intelligence
Stage 54 — Mobile AI Attack
SIGNAL
Mobile AI agent attack engine — own the channel
Defence — Mobile Layer
AI Shield Mobile
Runtime protection for mobile AI agents
Stage 55 — Inference Servers
FOUNDRY
Inference server exploitation engine
Stage 56 — Supply Chain
ADAPTER
LoRA/PEFT supply chain weaponisation
Orchestration
WARLORD
Autonomous campaign orchestration
SIEM Integration
redspecter-siem
Findings feed directly into Splunk, Sentinel, QRadar
Output
REPORT
WARLORD-compatible JSON with Ed25519 signature
Defence — All Layers
AI Shield
Defend everything the NIGHTFALL suite tests

Every Finding Mapped

6/6

MITRE ATLAS Coverage

  • AML.T0043 Craft Adversarial Data
  • AML.T0048 Backdoor ML Model
  • AML.T0040 Network Traffic Capture
  • AML.T0051 LLM Prompt Injection
  • AML.T0056 LLM Jailbreak
  • AML.T0044 Spear Phishing
Cryptographic

Report Integrity

  • Ed25519 digital signatures
  • SHA-256 evidence chains
  • RFC 3161 timestamps
  • Tamper-evident by design
  • AI Shield policy generation
  • Machine-ingestible JSON output
Mobile

Protocol Stack

  • SS7 MAP
  • Diameter Rx
  • 5G NAS
  • GTP-U
  • SIP/IMS
  • MQTT/CoAP
  • JWT/OAuth2

Security Distros & Package Managers

Kali Linux
.deb package
Parrot OS
.deb package
BlackArch
PKGBUILD
REMnux
.deb package
Tsurugi
.deb package
PyPI
pip install
macOS
pip install
Windows
pip install
Docker
docker pull

Authorised Use Only

Red Specter SIGNAL is intended for authorised security testing only. Unauthorised use against systems, networks, or mobile infrastructure you do not own or have explicit permission to test may violate the Computer Misuse Act 1990 (UK), Computer Fraud and Abuse Act (US), Communications Act 2003 (UK), and equivalent legislation in other jurisdictions. Mobile network testing requires explicit carrier authorisation in addition to target system authorisation. Always obtain written permission before conducting any security assessments. Apache License 2.0.

Pure Engineering
Zero External Tools. Zero Wrappers.

Most mobile security testing tools are thin wrappers around open-source stacks. SIGNAL is actual engineering. Every protocol handler, every injection technique, every IMSI extractor, every JWT exploiter — written from scratch in pure Python. Direct socket access to carrier protocols. Zero subprocess calls. Zero external tool dependencies.

8
Attack Subsystems
7
Protocol Layers
0
Subprocess Calls
0
External Dependencies
Enterprise Integration
Enterprise SIEM Integration — Native

Export every mobile channel finding directly to your SIEM. One flag. Native format translation. Ed25519 signatures and RFC 3161 timestamps preserved across every export.

Splunk
HEC • CIM Compliant
Sentinel
CEF • Log Analytics API
QRadar
LEEF 2.0 • Syslog
signal-tool recon --target 10.0.1.50 --adapter mobile --export-siem splunk
Ed25519 Cryptographic Override
SIGNAL UNLEASHED

Cryptographic override. Private key controlled. One operator. Founder's machine only. All offensive subsystems — INTERCEPT, EXTRACT, INJECT, IMPERSONATE, DRAIN, SWARM5G — require FORGE clearance gated by Ed25519 dual-sign.

STANDARD Clearance
RECON + REPORT — available on pip install
FORGE Clearance
All offensive subsystems — Ed25519 key required
27 Clearance Levels
Granular control over every attack capability