Google Warns Android Users: Avoid Unsafe Networks Behind Rising SMS Attacks
Share
Google warns Android users about a surge in SMS blaster attacks that exploit unsafe networks. These fake cell sites, known as Stingrays, trick phones into connecting and push out thousands of malicious texts. Disabling 2G connectivity is one of the most effective ways to stop such attacks.
The Growing Threat to Android Devices
Google warns Android users to avoid unsafe networks that could allow attackers to send malicious SMS messages directly to their phones. According to the company, scammers are now using cell-site simulators, or False Base Stations (FBS), to intercept connections and deliver spam or fraud messages at scale.
These devices, often referred to as “portable mobile phone stations,” can fit in a backpack. They imitate legitimate cell towers, making nearby smartphones connect automatically. Once connected, they can inject text messages, bypassing the filters that normally detect and block fraud attempts.
This unsafe networks Android warning follows a rise in SMS-based cyberattacks across the U.S., where malicious texts are increasingly being used to steal credentials, financial data, or install spyware.
How SMS Blaster Threats Work
Google describes the SMS blaster threat Android users face as a repurposed surveillance tool. Originally designed for law enforcement and intelligence gathering, these simulators are now being used by cybercriminals to distribute scam messages on a large scale.
“These attacks completely bypass the carrier network,” Google explains, “avoiding all the sophisticated network-based anti-spam and anti-fraud filters.”
Most of these scams rely on forcing phones to connect to older 2G networks, which lack modern encryption and authentication. Once downgraded, a hacker can intercept the connection and perform a man-in-the-middle attack, injecting fake SMS payloads directly into the device.
What Google and Samsung Are Doing
To mitigate these network security threats Android, Google and Samsung have introduced stronger security controls across their devices and operating systems.
Google first rolled out a modem-level toggle in Android 12, allowing users to disable 2G manually. This feature, initially available on Pixel devices, effectively blocks communication with outdated and vulnerable networks. The company later expanded this in Android 16 with Advanced Protection Mode, which automatically disables 2G connections for users enrolled in higher security tiers.
Beyond network settings, Google has strengthened its ecosystem through Play Protect, Safe Browsing, and RCS (Rich Communication Services) encryption. Together, these tools detect harmful apps, block malicious links, and protect modern messaging channels from cellular network vulnerability Android exploits.
Samsung has followed suit. Its Maximum Restrictions setting lets users disable 2G, while enterprise customers using the Knox security platform can enforce this at scale. Knox now offers deeper baseband and SIM control, helping corporate users defend against fake cell tower attacks. Samsung’s Secure Wi-Fi feature further encrypts user data when connected to public or untrusted networks.
With several Android manufacturers adopting similar protections, the ecosystem is gradually closing long-standing gaps that allowed attackers to exploit legacy network weaknesses.
A U.S.-Centric Surge in SMS Scams
According to cybersecurity firm Bitdefender, between March and September 2025, the United States received nearly 37% of global spam, making it the world’s primary target for text-based scams. Within that, 45% of spam messages were fraudulent or malicious.
The firm’s telemetry shows that 10% of U.S. users received at least one SMS scam in the last two months. Bitdefender notes, “This evolution makes SMS scams targeting American consumers uniquely deceptive and harder to detect.”
What makes these campaigns more effective is their use of AI-generated personalization. Attackers now include real names, locations, or social media data in text messages, making fake alerts appear legitimate. Bitdefender warns that this level of personalization “blurs the line between a real promotion and attempted fraud.”
Officials Warn of Impersonation Scams
Public agencies are also sounding the alarm. North Carolina’s Attorney General recently warned citizens to “be on alert for potential scams while the federal government remains shut down.” Scammers use national events like shutdowns, wildfires, or missed jury summons notices to make their messages appear urgent.
New York Secretary of State Walter Mosley said he’s personally received such texts. “I’ve seen messages sent under the name of a make-believe state agency to make it sound official,” he said, noting that if he receives them, millions of others likely do too.
The FBI advises all mobile users to delete scam texts immediately without clicking any links, regardless of how official they look.
Apple’s Limited Defense Against 2G Attacks
While Google warns Android users to disable 2G networks, Apple’s approach is more restrictive. The company doesn’t offer a dedicated “disable 2G” option in regular settings. Instead, it relies on Lockdown Mode, introduced in iOS 16, which is designed for users at high risk of targeted attacks—like journalists or government officials.
When activated, Lockdown Mode disables 2G and 3G cellular connections and enforces stricter security defaults. It blocks unsecured Wi-Fi networks, disables most message attachments and link previews, restricts incoming FaceTime calls from unknown contacts, and limits advanced features such as SharePlay and Live Photos.
While effective at blocking legacy network threats, Lockdown Mode comes with trade-offs. Everyday functions are limited, and features like image previews or embedded links stop working. Wired’s review called it a “necessary but heavy-handed tool,” while TechCrunch noted that its notifications often confuse users about what was blocked or why.
Apple intentionally avoids offering a simple, always-on 2G toggle outside of Lockdown Mode. That means average users can’t selectively disable 2G while keeping full device functionality. As Techlicious points out, Apple’s security approach is all-or-nothing—secure but not practical for daily use.
This difference underscores Android’s advantage: a user-friendly, granular setting that neutralizes the same threat without limiting usability.
How to Stay Protected
Here are a few practical steps to avoid falling victim to network security threats Android users face:
- Disable 2G: Go to Settings → Network & Internet → SIMs → Allow 2G and turn it off.
- Avoid connecting to unknown networks: Use only trusted mobile or Wi-Fi networks.
- Be skeptical of urgent texts: Don’t click on links, even if they appear official.
- Keep Android updated: Security patches often include fixes against network-level exploits.
- Report scam messages: Forward suspicious texts to your carrier or cybercrime helpline.
The cellular network vulnerability Android users face today is a reminder of how old technologies remain a weak link. Criminals don’t always need sophisticated zero-day exploits; sometimes, exploiting legacy systems is enough.
These SMS blaster campaigns show how tools once used for surveillance are now being abused for profit. And with AI-driven personalization, the next phase of phishing might not come by email but through a message that feels real, timely, and urgent.
Conclusion
The rise of SMS blaster threat Android campaigns highlights a critical shift in cybercrime. Attackers are moving beyond apps and emails, exploiting outdated mobile networks instead. Google’s unsafe networks Android warning isn’t just for Pixel users—it’s for everyone who carries a smartphone.
The fix is simple: turn off 2G. It’s the most effective defense against this new wave of text-based attacks.
FAQs
- Why is Google warning Android users now?
Because the number of SMS-based attacks using fake cell sites has increased significantly in 2025. Attackers use 2G networks to bypass modern encryption. - How do I disable 2G on my Android phone?
Go to Settings → Network & Internet → SIMs → Allow 2G and toggle it off. This feature is available on Android 12 and newer. - Can iPhone users be affected too?
Yes, but Apple doesn’t allow manual 2G blocking. Lockdown Mode can block older connections but restricts usability. - Are these attacks linked to AI?
Yes. Many scam messages now use AI to personalize content with real names or local data, making them harder to detect. - What should I do if I get a suspicious text?
Don’t click on links or reply. Delete it and report it to your carrier or local cybercrime unit.
