` Thousands Of T-Mobile Private Calls Leaked After $800 Hack Cracks Satellite Encryption - Ruckus Factory

Thousands Of T-Mobile Private Calls Leaked After $800 Hack Cracks Satellite Encryption

Enoc Soto – Facebook

Your phone calls are raining down from space right now. Someone with a backyard satellite dish could be listening. UC San Diego researchers showed this in late 2024 and finally went public in October 2025. Three months later, as 2026 begins, many critical systems are still only partially fixed.

Their $800 setup captured the numbers, call recordings, and texts of 2,700 T-Mobile customers in nine hours—broadcast in the clear, for anyone to intercept.

The $800 Weapon

a satellite dish sitting on top of a building
Photo by Kevin Kandlbinder on Unsplash

The equipment isn’t exotic. A satellite dish ($185), mounting hardware ($140), a motorized antenna ($195), and a USB tuner card ($230). Researchers placed it on a university rooftop in La Jolla, California, and waited. Within hours, they’d intercepted military secrets, corporate credentials, and intimate personal communications.

This is the same technology sitting on millions of American roofs for television. Millions of people own the equipment needed to conduct mass surveillance from space.

Nine Hours, 2,700 Lives

red heart shaped illustration on black surface
Photo by Martin Sanchez on Unsplash

In a single nine-hour window, the equipment captured phone numbers and call content from 2,700 T-Mobile customers using satellite backhaul in remote areas. But researchers weren’t targeting civilians.

They were stunned by what else was revealed by those signals: the locations of US military vessels, Mexican military helicopter missions, corporate email servers with login credentials, power grid control systems, offshore oil commands, and passenger Wi-Fi from airlines.

Half The Sky Exposed

LinkedIn – Edwin Kappert

Here’s what wakes security experts at 3 a.m.: approximately 50 percent of all geostationary satellite signals carrying sensitive data operate completely unencrypted. Fifty percent. Half of the world’s military communications, financial transactions, and critical infrastructure commands broadcast openly.

Researchers examined 39 satellites and 411 transponders. They only scanned 15 percent of global geostationary satellites from San Diego.

Military Secrets From Space

Command pallet for the Joint Airborne Communications Center Command Post JACC CP and Command and Staff Palletized Airborne Node CASPAN 12 person variant
Photo by U S Army on Wikimedia

US Navy vessel positions are transmitted unencrypted. Mexican military helicopters are broadcasting coordinates. Coast Guard operations. Law enforcement coordinating across borders. All accessible. The researchers documented vessel identities, communication protocols, and operational schedules.

Military strategists realized with horror that any nation with satellite capability—dozens of them—had been collecting this intelligence for years.

Mexico’s Power Grid Wide Open

Workers of the Federal Electricity Commission CFE working to reestablish electric service on the Boulevard de las Naciones Images of the impact of Hurricane Otis Acapulco Guerrero Mexico
Photo by Own work on Wikimedia

Mexico’s Federal Electricity Commission serves 50 million people. Researchers found their internal communications completely unencrypted over satellites. Repair schedules. Grid vulnerabilities. Control system passwords. SCADA data.

An adversary could identify weaknesses, plan targeted attacks, and potentially blackout entire regions. Mexico’s critical infrastructure—electricity for millions—is exposed to anyone with a receiver.

Banks And Retailers Broadcast

a building with a sign that says sanco national mexico
Photo by Alex Quezada on Unsplash

Walmart Mexico. Santander Mexico. ATM networks. All are using unencrypted satellite links. Researchers captured login credentials, inventory data, financial transactions, and customer records. One compromised credential cascades across supply chains and financial institutions.

The scale of potential damage rippled through entire economic ecosystems. Hackers could have drained accounts. Criminals could have coordinated theft.

The Moment Of Horror

Assistant Professor Dave Levin Selected to Serve on National
Photo by Cs umd edu

Dave Levin, University of Maryland professor leading the research, recalled: “When we saw all this, my first question was, did we just commit a felony? Did we wiretap?” They hadn’t. They were passively receiving signals broadcast openly to 40 percent of Earth’s surface.

The implication haunted them: if they found it so easily, who else had been listening? How many adversaries had already discovered this months or years ago?

The Entire Planet Broadcasts

satellite dish to listen wireless communication reception satellite satellite dish satellite dish satellite dish satellite dish satellite dish satellite satellite satellite
Photo by ChristophMeinersmann on Pixabay

Each geostationary satellite’s footprint covers approximately 40 percent of the Earth’s surface simultaneously. From Atlantic to Pacific. From North Africa to South America. One continuous beam carrying classified military data, corporate secrets, and personal communications.

Position a receiver in Europe and intercept various forms of intelligence. Move it to Asia and capture entirely different secrets.

The NSA Warning

Aerial photograph of the National Security Agency by Trevor Paglen Commissioned by Creative Time Reports 2013
Photo by Trevor Paglen on Wikimedia

The National Security Agency issued a cybersecurity advisory in May 2022, warning that most satellite links operate unencrypted, relying on “frequency separation or predictable frequency hopping” instead of encryption. The NSA knew. They warned the industry publicly. And nothing changed.

Three years passed. Companies ignored it. Agencies did nothing. The vulnerability remained overhead, humming silently, waiting for someone curious enough to look up and discover it.

Security Through Invisibility

NASA Industry to Collaborate on Space Communications by 2025 - NASA
Photo by Nasa gov

Aaron Schulman, UC San Diego professor leading the research, explained the fatal assumption: “They assumed that no one was ever going to check and scan all these satellites and see what was out there. That was their method of security. They just really didn’t think anyone would look up.”

The entire satellite communications industry bet on invisibility rather than encryption. Hope that nobody checks. Pray that nobody cares. It’s security through wishful thinking.

Easier Than Stealing A Car

A concept image created for a blog post on cyber criminals shows a hacker in a room of computer screens This image is released under Creative Commons Licensing We invite you to use the image freely with attribution in the form of a link to the copyright holder s website at https
Photo by Microbiz Mag on Wikimedia

Matt Blaze, cryptographer at Georgetown University: “This was not NSA-level resources. These were DirecTV user-level resources. The barrier to entry for this sort of attack is extremely low.” Thousands of technically skilled people globally could replicate this.

Criminals. Foreign intelligence agencies. Hackers with a cause. All that is needed is $800 and a rooftop.

The Copycat Inevitability

UMBC Researchers Build Next-gen Satellite Tech To Examine Earth s
Photo by Umbc edu

Blaze predicted the cascade: “By the week after next, we will have hundreds or perhaps thousands of people, many of whom won’t tell us what they’re doing, replicating this work and seeing what they can find up there in the sky.”

Researchers faced a choice: hide the methods or force industry action.

T-Mobile’s Emergency Response

SIM card T-Mobile Poland
Photo by Warszawska r g Szerokiej w Tomaszowie Mazowieckim w wojew dztwie dzkim PL EU CC0 on Wikimedia

T-Mobile moved quickly after researchers notified the company in late 2024. Within weeks, T-Mobile encrypted all satellite backhaul communications and announced additional protections for customer signaling traffic.

The company emphasized the issue affected fewer than 50 cell sites out of 82,000 nationwide—a tiny fraction. T-Mobile could only prevent future breaches, not undo past exposure.

The Mixed Response

Photo by Cs umd edu

AT&T Mexico encrypted its links immediately. Walmart and Santander began remediation. However, when researchers conducted a follow-up scan in February 2025, they found that not all operators had taken action.

Some critical infrastructure owners have still not fully encrypted their satellite links—more than a year after being notified.

Enemies Already Listening

Detective in thought examining evidence board in a dimly lit office environment
Photo by cottonbro studio on Pexels

Intelligence agencies from Russia to China almost certainly exploited these unencrypted channels for years, researchers believe. Not just months—potentially a decade. They could have mapped U.S. military movements and tracked corporate expansion.

The question isn’t whether adversaries found this vulnerability. It’s: what did they do with what they found? What do they still possess?

Why Encryption Never Happened

X – Smithers

Satellite operators understood encryption was needed. But bandwidth constraints, power limitations, vendor licensing costs, and legacy equipment compatibility created perfect inertia. Cost-benefit analysis suggested risk was low—nobody was looking, right?

Encryption required expensive upgrades. So they kept transmitting in the clear, betting on obscurity rather than cryptography.

Every Layer Must Encrypt

hacking cyber blackandwhite crime security internet computer hacker virus data network technology password digital online attack protection hack laptop secure safety web information code criminal phishing business man binary access malware firewall lock thief fraud privacy system encryption black business black computer black virus black laptop black data black online black network black internet black digital black security black company black information black web black businessman black code black safety black coding hacking cyber hacker hacker hacker hacker hacker code fraud
Photo by iAmMrRob on Pixabay

Application-level protection. Network-level encryption. Satellite beam-level, where available. Organizations must treat satellite links as unencrypted public wireless networks requiring multi-layered defense. Financial institutions need end-to-end encryption. Military systems need authenticated channels. Power grids need segmentation and monitoring.

The days of assuming satellite communications were somehow protected are finished. Encryption isn’t optional anymore. It’s the only sensible choice.

The Largest Breach Ever Revealed

earth space satellites tracking satellite symbol graphic satellite satellite satellite satellite satellite
Photo by 12019 on Pixabay

This disclosure, made public last October, represents the largest documented exposure of unencrypted satellite communications ever revealed. Researchers estimate 85 percent of global satellite communications remain unexamined from their location—meaning vastly larger vulnerabilities exist worldwide.

Three months later, the industry faces a reckoning: encrypt everything or accept that adversaries are listening. There’s no middle ground.

Everyone’s Looking Now

earth world map continents world map land satellite image satellite map dark night
Photo by WikiImages on Pixabay

For years, the satellite industry assumed nobody would look up. UC San Diego and University of Maryland researchers have proven that assumption to be catastrophically wrong. Since the October disclosure, governments are looking. Security agencies are looking. Adversaries are definitely looking.

The invisible highway overhead, once assumed to be secure, is now understood to be completely exposed. The question isn’t whether people will look up anymore. It’s: what will we do about what we find?

Sources

Don’t Look Up: There Are Sensitive Internal Links in the Clear on GEO Satellites
ACM SIGSAC Conference on Computer and Communications Security (CCS ’25), October 202

Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data
Wired, October 13, 2025

Researchers find a startlingly cheap way to steal your secrets from space
CyberScoop, October 13, 2025

Researchers find Mexican satellite data is unencrypted, hackable
Mexico News Daily, October 16, 2025