Do you remember the “olden times”, before the use of mobile phones and, later on, smartphones became common practice? It seems hard to imagine life without telecommunications. We are long used to engaging in e-banking, online-shopping, e-government, etc. and we are also used to onetime passwords over SMS for transaction confirmation that regulate access to the required networks. As mobile communication determines the functionality of our lives to an ever-increasing extent, attacks on mobile networks can have severe consequences. Upsetting subscribers and causing churn may be one of the more benign disturbances unlike dire effects on national critical infrastructure (civil, energy, agricultural, healthcare..) and wider industrial processes. Criminals can reap huge benefits from exploiting network vulnerabilities through signaling attacks.