Company Details
gsma-security-and-fraud
None employees
2,304
517
gsma.com
0
GSM_2846792
In-progress

GSMA - Security and Fraud Company CyberSecurity Posture
gsma.comThe GSMA Security and Fraud team supports the wider mobile industry against emerging cyber threats and provide the means for all to converge around common solutions.
Company Details
gsma-security-and-fraud
None employees
2,304
517
gsma.com
0
GSM_2846792
In-progress
Between 700 and 749

GSF Global Score (TPRM)XXXX

Description: **UK Lawmakers Press Apple and Google Over Stolen Smartphone Protections** UK legislators grilled Apple and Google in a House of Commons hearing over their failure to implement measures that would allow stolen smartphones to be remotely locked, reset, or blocked from accessing cloud services—a request repeatedly made by the Metropolitan Police. During the session, MPs expressed frustration over what they perceived as resistance from the tech giants, suggesting commercial incentives may be influencing their stance. Apple and Google, however, argued that such measures could introduce new fraud risks, including account takeovers and blackmail attempts. **The Scale of the Problem** The Met Police reported a sharp rise in smartphone thefts, with 80,000 devices stolen in London in 2024—up from 64,000 in 2023. Apple devices account for roughly 80% of stolen phones, with an estimated annual replacement value of £50 million ($67 million). Most stolen devices are funneled through criminal networks and resold abroad, primarily in Algeria, China, and Hong Kong. **Current Limitations** While the GSMA industry association allows stolen phones to be blocked at a network level using their IMEI (International Mobile Equipment Identity) numbers, this only covers about 10% of global networks. The Met Police has proposed an international cloud-level block, where reported stolen devices would be barred from accessing Apple or Google services. Security experts argue this could drastically reduce resale value and theft incentives. **Industry Responses** Apple’s Gary Davis acknowledged the risks of IMEI-based blocking, citing concerns over fraud vectors, including impersonation attacks that could lead to account deletions or blackmail. Google’s Simon Wingrove noted that Android devices can already be locked or wiped via the *Find My Device* app, but it remains unclear whether this prevents stolen phones from being reused with new accounts. **Potential Solutions** Dion Price, CEO of Trustonic—a company that provides remote locking for supply chain distributors—suggested a government-regulated system using IMEI data already collected for trade and tax purposes. Such a system could enable near-instant global locking of stolen devices, but only if phones are registered at first activation. The debate highlights the tension between security, user protection, and commercial interests as lawmakers push for stronger anti-theft measures.


GSMA - Security and Fraud has 21.95% more incidents than the average of same-industry companies with at least one recorded incident.
GSMA - Security and Fraud has 28.21% more incidents than the average of all companies with at least one recorded incident.
GSMA - Security and Fraud reported 1 incidents this year: 1 cyber attacks, 0 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
GSF cyber incidents detection timeline including parent company and subsidiaries

The GSMA Security and Fraud team supports the wider mobile industry against emerging cyber threats and provide the means for all to converge around common solutions.


At Vodafone, we believe that connectivity is a force for good. If we use it for the things that really matter, it can improve people's lives and the world around us. Through our technology we empower people, connecting everyone regardless of who they are or where they live, we protect the planet a

Fundada em 1975, a Telemont Engenharia de Telecomunicações S/A é líder na prestação de serviços de implantação, manutenção e operação de redes de telecomunicações. São 7,7 milhões de acessos de voz, 3 milhões de ADSL e dados e 63 mil km de fibra óptica operados pela empresa. Através da Telemont I

Pakistan’s number one digital operator and the largest internet and broadband service provider with over 70 million subscribers nationwide. With a legacy of more than 27 years, Jazz maintains market leadership through cutting-edge, integrated technology, the strongest brands and the largest portfoli
Huawei is a leading global provider of information and communications technology (ICT) infrastructure and smart devices. With integrated solutions across four key domains – telecom networks, IT, smart devices, and cloud services – we are committed to bringing digital to every person, home and organi

AXIATA GROUP BERHAD 242188-H (199201010685) In pursuit of its vision to be The Next Generation Digital Champion, Axiata is a diversified telecommunications and digital conglomerate operating Digital Telcos, Digital Businesses and Infrastructure businesses across a footprint spanning ASEAN and Sout

Lumen connects the world. We digitally connect people, data and applications – quickly, securely and effortlessly. Everything we do at Lumen takes advantage of our network strength. From metro connectivity to long-haul data transport to our edge cloud, security, and managed service capabilities, we

Somos una empresa orgullosamente mexicana, líder en tecnología, telecomunicaciones y entretenimiento. Estamos siempre a la vanguardia con el objetivo de llevar a nuestros clientes lo mejor en conectividad, ya sea para que estén cerca de los que más quieren ó puedan alcanzar el éxito profesion
Globe is a leading full-service telecommunications company in the Philippines and publicly listed in the PSE with the stock symbol GLO. The company serves the telecommunications and technology needs of consumers and businesses across an entire suite of products and services including mobile, fixed,

A TIM é a empresa de telefonia móvel que mais cresce no Brasil. Atualmente, possui mais de 13 mil colaboradores em todo o país que trabalham entregando serviços inovadores e de qualidade em telefonia móvel, fixa e internet banda larga. É uma companhia feita de pessoas criativas, com energia real
.png)
As the telecommunications sector in Asia rapidly moves towards 5G technology, cloud-native architectures, and digital services,...
Asia's telecom operators face escalating cyber threats as 5G and digital services expand. Explore how regulations, AI-powered security,...
The GSMA has highlighted the need for a more robust, investment-focused strategy to expedite Indonesia's digital transformation and...
The mobile industry, supported by the GSMA, calls for harmonised, risk-based and collaborative policy frameworks to strengthen global cyber...
PLDT Enterprise and Nabstract partnered to enhance digital security with SmartSafe SilentAccess, offering real-time authentication, fraud...
Together, KPN, Odido and Vodafone have taken an important step in strengthening digital security and combating online fraud by launching innovative,...
GSMA Intelligence estimates a $500 billion opportunity for telecom operators from the enterprise digital transformation market.
Mobile scam cases rise across ASEAN, with the GSMA urging telecom providers to step up as consumer trust in digital channels begins to...
Malaysian operators plan to launch a federated network service through the GSMA Open Gateway initiative to combat fraud and digital identity...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of GSMA - Security and Fraud is https://www.gsma.com/security/.
According to Rankiteo, GSMA - Security and Fraud’s AI-generated cybersecurity score is 712, reflecting their Moderate security posture.
According to Rankiteo, GSMA - Security and Fraud currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, GSMA - Security and Fraud is not certified under SOC 2 Type 1.
According to Rankiteo, GSMA - Security and Fraud does not hold a SOC 2 Type 2 certification.
According to Rankiteo, GSMA - Security and Fraud is not listed as GDPR compliant.
According to Rankiteo, GSMA - Security and Fraud does not currently maintain PCI DSS compliance.
According to Rankiteo, GSMA - Security and Fraud is not compliant with HIPAA regulations.
According to Rankiteo,GSMA - Security and Fraud is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
GSMA - Security and Fraud operates primarily in the Telecommunications industry.
GSMA - Security and Fraud employs approximately None employees people worldwide.
GSMA - Security and Fraud presently has no subsidiaries across any sectors.
GSMA - Security and Fraud’s official LinkedIn profile has approximately 2,304 followers.
GSMA - Security and Fraud is classified under the NAICS code 517, which corresponds to Telecommunications.
No, GSMA - Security and Fraud does not have a profile on Crunchbase.
Yes, GSMA - Security and Fraud maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/gsma-security-and-fraud.
As of December 24, 2025, Rankiteo reports that GSMA - Security and Fraud has experienced 1 cybersecurity incidents.
GSMA - Security and Fraud has an estimated 9,766 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Total Financial Loss: The total financial loss from these incidents is estimated to be $50 million.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with trustonic (provides locking technology for smartphones), and law enforcement notified with metropolitan police engaged with apple and google, and communication strategy with public statements by apple and google to uk parliament..
Title: UK Legislators Question Apple and Google Over Lack of Smartphone Theft Protections
Description: UK Members of Parliament expressed concerns that Apple and Google have not implemented measures to remotely lock, reset, and block stolen smartphones from accessing cloud services, as requested by the Metropolitan Police. The tech companies cited potential fraud vectors and commercial incentives as reasons for their reluctance.
Type: Policy and Compliance Issue
Threat Actor: Criminal gangs
Motivation: Financial gain through resale of stolen devices
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Financial Loss: £50 million ($67 million) annual replacement value of stolen phones in London
Systems Affected: Smartphones (primarily Apple iPhones)
Operational Impact: Traumatic disconnection for users, potential data access by criminals
Brand Reputation Impact: Potential reputational damage to Apple and Google due to perceived inaction
Identity Theft Risk: Potential risk if data is accessed by criminals
Average Financial Loss: The average financial loss per incident is $50.00 million.

Entity Name: Apple
Entity Type: Technology Company
Industry: Consumer Electronics and Software
Location: Global (UK affected)
Size: Large
Customers Affected: Approximately 64,000-80,000 stolen Apple phones in London (2023-2024)

Entity Name: Google
Entity Type: Technology Company
Industry: Consumer Electronics and Software
Location: Global (UK affected)
Size: Large
Customers Affected: Unknown number of stolen Android phones in London

Third Party Assistance: Trustonic (provides locking technology for smartphones)
Law Enforcement Notified: Metropolitan Police engaged with Apple and Google
Communication Strategy: Public statements by Apple and Google to UK Parliament
Third-Party Assistance: The company involves third-party assistance in incident response through Trustonic (provides locking technology for smartphones).

Sensitivity of Data: Potential access to cloud services (e.g., Google Photos, Drive, Gmail, Apple iCloud)
Personally Identifiable Information: Potential risk if cloud data is accessed

Lessons Learned: Need for collaboration between tech companies, law enforcement, and regulators to address smartphone theft and resale. Potential for IMEI-based blocking systems to reduce theft incentives.

Recommendations: Implement an international cloud-level blocking system for stolen smartphones using IMEI numbers., Establish a regulatory or government body to oversee smartphone registration and locking mechanisms., Enhance fraud detection to prevent misuse of IMEI-based blocking systems., Improve coordination between tech companies, law enforcement, and telecom providers to track and block stolen devices.Implement an international cloud-level blocking system for stolen smartphones using IMEI numbers., Establish a regulatory or government body to oversee smartphone registration and locking mechanisms., Enhance fraud detection to prevent misuse of IMEI-based blocking systems., Improve coordination between tech companies, law enforcement, and telecom providers to track and block stolen devices.Implement an international cloud-level blocking system for stolen smartphones using IMEI numbers., Establish a regulatory or government body to oversee smartphone registration and locking mechanisms., Enhance fraud detection to prevent misuse of IMEI-based blocking systems., Improve coordination between tech companies, law enforcement, and telecom providers to track and block stolen devices.Implement an international cloud-level blocking system for stolen smartphones using IMEI numbers., Establish a regulatory or government body to oversee smartphone registration and locking mechanisms., Enhance fraud detection to prevent misuse of IMEI-based blocking systems., Improve coordination between tech companies, law enforcement, and telecom providers to track and block stolen devices.
Key Lessons Learned: The key lessons learned from past incidents are Need for collaboration between tech companies, law enforcement, and regulators to address smartphone theft and resale. Potential for IMEI-based blocking systems to reduce theft incentives.

Source: The Register

Source: UK House of Commons Science, Innovation and Technology Committee
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: The Register, and Source: UK House of Commons Science, Innovation and Technology Committee.

Investigation Status: Ongoing (policy discussion and technical evaluation)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public statements by Apple and Google to UK Parliament.

Stakeholder Advisories: UK Parliament committee urging Apple and Google to implement IMEI-based blocking for stolen devices.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was UK Parliament committee urging Apple and Google to implement IMEI-based blocking for stolen devices..

Root Causes: Lack Of Standardized Imei-Based Blocking System For Cloud Services, Potential Commercial Incentives For Tech Companies (E.G., Revenue From Cloud Services And Replacement Devices), Fraud Risks Associated With Imei Spoofing Or Misuse,
Corrective Actions: Evaluate Feasibility Of Imei-Based Cloud Blocking With Fraud Prevention Measures, Explore Regulatory Or Government-Led Solutions For Smartphone Registration And Locking, Improve Collaboration Between Tech Companies, Law Enforcement, And Telecom Providers,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Trustonic (provides locking technology for smartphones).
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Evaluate Feasibility Of Imei-Based Cloud Blocking With Fraud Prevention Measures, Explore Regulatory Or Government-Led Solutions For Smartphone Registration And Locking, Improve Collaboration Between Tech Companies, Law Enforcement, And Telecom Providers, .
Last Attacking Group: The attacking group in the last incident was an Criminal gangs.
Highest Financial Loss: The highest financial loss from an incident was £50 million ($67 million) annual replacement value of stolen phones in London.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Trustonic (provides locking technology for smartphones).
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Need for collaboration between tech companies, law enforcement, and regulators to address smartphone theft and resale. Potential for IMEI-based blocking systems to reduce theft incentives.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Improve coordination between tech companies, law enforcement, and telecom providers to track and block stolen devices., Enhance fraud detection to prevent misuse of IMEI-based blocking systems., Implement an international cloud-level blocking system for stolen smartphones using IMEI numbers. and Establish a regulatory or government body to oversee smartphone registration and locking mechanisms..
Most Recent Source: The most recent source of information about an incident are The Register, UK House of Commons Science and Innovation and Technology Committee.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (policy discussion and technical evaluation).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was UK Parliament committee urging Apple and Google to implement IMEI-based blocking for stolen devices., .
.png)
Marshmallow is a lightweight library for converting complex objects to and from simple Python datatypes. In versions from 3.0.0rc1 to before 3.26.2 and from 4.0.0 to before 4.1.2, Schema.load(data, many=True) is vulnerable to denial of service attacks. A moderately sized request can consume a disproportionate amount of CPU time. This issue has been patched in version 3.26.2 and 4.1.2.
KEDA is a Kubernetes-based Event Driven Autoscaling component. Prior to versions 2.17.3 and 2.18.3, an Arbitrary File Read vulnerability has been identified in KEDA, potentially affecting any KEDA resource that uses TriggerAuthentication to configure HashiCorp Vault authentication. The vulnerability stems from an incorrect or insufficient path validation when loading the Service Account Token specified in spec.hashiCorpVault.credential.serviceAccount. An attacker with permissions to create or modify a TriggerAuthentication resource can exfiltrate the content of any file from the node's filesystem (where the KEDA pod resides) by directing the file's content to a server under their control, as part of the Vault authentication request. The potential impact includes the exfiltration of sensitive system information, such as secrets, keys, or the content of files like /etc/passwd. This issue has been patched in versions 2.17.3 and 2.18.3.
Fedify is a TypeScript library for building federated server apps powered by ActivityPub. Prior to versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2, a Regular Expression Denial of Service (ReDoS) vulnerability exists in Fedify's document loader. The HTML parsing regex at packages/fedify/src/runtime/docloader.ts:259 contains nested quantifiers that cause catastrophic backtracking when processing maliciously crafted HTML responses. This issue has been patched in versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2.
Authenticated Remote Code Execution (RCE) in PluXml CMS 5.8.22 allows an attacker with administrator panel access to inject a malicious PHP webshell into a theme file (e.g., home.php).
An issue was discovered in Xiongmai XM530 IP cameras on firmware V5.00.R02.000807D8.10010.346624.S.ONVIF 21.06. The GetStreamUri exposes RTSP URIs containing hardcoded credentials enabling direct unauthorized video stream access.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.