Mobile phone antennas at sunset; fhm, Getty Images Surveillance campaigns use commercial surveillance tools to exploit long-known telecom vulnerabilities Researchers said it’s the first-ever mapping of attack traffic to mobile operator signalling infrastructure. 3 hours ago By Tim Starks