* [Blog](https://www.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www.paloaltonetworks.com/blog/corporate/) * [IoT](https://www.paloaltonetworks.com/blog/category/iot/) * Let's Prevent 5G "Boundle... # Let's Prevent 5G "Boundless Connectivity" From Providing "Boundless Opportunity" for Cybercriminals [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2017%2F07%2Fsp-lets-prevent-5g-boundless-connectivity-providing-boundless-opportunity-cybercriminals%2F) [](https://twitter.com/share?text=Let%E2%80%99s+Prevent+5G+%E2%80%9CBoundless+Connectivity%E2%80%9D+From+Providing+%E2%80%9CBoundless+Opportunity%E2%80%9D+for+Cybercriminals&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2017%2F07%2Fsp-lets-prevent-5g-boundless-connectivity-providing-boundless-opportunity-cybercriminals%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2017%2F07%2Fsp-lets-prevent-5g-boundless-connectivity-providing-boundless-opportunity-cybercriminals%2F&title=Let%E2%80%99s+Prevent+5G+%E2%80%9CBoundless+Connectivity%E2%80%9D+From+Providing+%E2%80%9CBoundless+Opportunity%E2%80%9D+for+Cybercriminals&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www.paloaltonetworks.com/blog/2017/07/sp-lets-prevent-5g-boundless-connectivity-providing-boundless-opportunity-cybercriminals/&ts=markdown) \[\](mailto:?subject=Let’s Prevent 5G “Boundless Connectivity” From Providing “Boundless Opportunity” for Cybercriminals) Link copied By [Terry Young](https://www.paloaltonetworks.com/blog/author/terry-young/?ts=markdown "Posts by Terry Young") Jul 13, 2017 3 minutes [IoT](https://www.paloaltonetworks.com/blog/category/iot/?ts=markdown) [Service Providers](https://www.paloaltonetworks.com/blog/category/service-providers/?ts=markdown) [5G](https://www.paloaltonetworks.com/blog/tag/5g/?ts=markdown) [Mobility](https://www.paloaltonetworks.com/blog/tag/mobility/?ts=markdown) The 5G network evolution will greatly benefit subscribers, service providers and, oh yes, cybercriminals as well. A recent report published by the GSMA described the 5G era as an age of "boundless connectivity" and "intelligent automation." With society relying more and more on mobile connectivity and cheap computing power spurring widespread adoption of digital "things," mobile networks will need to quickly ramp up to provide the bandwidth, low latency, and higher connection rates to meet future performance and connectivity needs. All this change while driving down network capital and operating costs through network consolidation, shared networks, integration with fixed networks and evolution to virtualized architectures. That's a lot of transformation! But who will secure this massive mobile ecosystem in the future? Certainly not consumer subscribers -- they are notoriously lax in taking even minimal security measures to protect their phones or privacy. IoT suppliers also have little financial incentive to build in security, and it has only been recently that they have been prodded into more security-focused design. And since they don't control subscriber actions, mobile operators are equally reluctant to offer additional malware prevention capabilities. This is good news for the average cybercriminal looking to infect as many devices as possible, as quickly and as cheaply as possible. Not only does he have a much larger base of potential victims (Ericsson forecasts that mobile connections will increase an additional 1 billion by 2022) but he also has very little resistance from the device users or IoT developers, and a high-performance mobile network run by operators focused on other major strategic transformation objectives. In fact, that seamless network integration and higher speed the mobile operators work hard to implement can also provide cybercriminals a faster, easier path to transport malware. While mobile network operators have seen profit margins decline and costs go up, hackers have seen the opposite: hacker costs are down and profits are increasing. Hackers can quickly spin up capacity using the latest automation and cloud technology with no capital investment, and easily acquire "off-the-shelf" exploit kits and other malicious tools. It's a part-time job for most cybercriminals, and the job skill requirements keep getting lower. In the last nine months, we have seen a few high-profile attacks that illustrate how an average, relatively unsophisticated cybercriminal can take advantage of poor security practices and unsecured devices for malicious purposes. [WannaCry](https://www.paloaltonetworks.com/blog/2017/05/unit42-threat-brief-wanacrypt0r-know/?ts=markdown) is one of the most recent examples of the damage that even an unsophisticated cybercriminal can cause. The ransomware attack began on Friday, May 12, 2017, and within a day was reported to have infected more than 230,000 computers in more than 150 countries. By most security experts' analyses, WannaCry was a botched job from unskilled hackers. The hackers made several mistakes, including providing a kill switch in the code and ransomware that didn't really work -- victims could not unlock their files even after they paid the ransom. Yet WannaCry caused massive business disruption, estimated to exceed $4 billion. As an ecosystem, we must work together to create a better security posture for mobile networks.Palo Alto Networks can help mobile network operators prevent successful attacks from the growing population of average cybercriminals. Download the white paper "**[Establish An Effective Security Posture in Next-Generation Mobile Networks."](https://www.paloaltonetworks.com/resources/whitepapers/establish-effective-security-posture-next-generation-mobile-networks?ts=markdown)** *** ** * ** *** ## Related Blogs ### [Service Providers](https://www.paloaltonetworks.com/blog/category/service-providers/?ts=markdown) [#### Boundless Connectivity: Security in the Mobile Ecosystem](https://www.paloaltonetworks.com/blog/2017/07/sp-boundless-connectivity-security-mobile-ecosystem/) ### [Service Providers](https://www.paloaltonetworks.com/blog/category/service-providers/?ts=markdown) [#### MNOs Want Better Security: Achieving Threat Prevention in a Hyper-Connected 5G Environment](https://www.paloaltonetworks.com/blog/2017/06/sp-mnos-want-better-security-achieving-threat-prevention-hyper-connected-5g-environment/) ### [5G Security](https://www.paloaltonetworks.com/blog/network-security/category/5g-security/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown), [Service Providers](https://www.paloaltonetworks.com/blog/category/service-providers/?ts=markdown) [#### Top 5 5G Security Considerations for Enterprises](https://www.paloaltonetworks.com/blog/2020/09/netsec-top-5-5g-security-considerations/) ### [5G Security](https://www.paloaltonetworks.com/blog/network-security/category/5g-security/?ts=markdown), [Public Sector](https://www.paloaltonetworks.com/blog/category/public-sector/?ts=markdown), [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown), [Service Providers](https://www.paloaltonetworks.com/blog/category/service-providers/?ts=markdown) [#### The Right Approach to Securing 5G](https://www.paloaltonetworks.com/blog/2020/05/network-securing-5g/) ### [Secure the Enterprise](https://www.paloaltonetworks.com/blog/category/secure-the-enterprise/?ts=markdown), [Service Providers](https://www.paloaltonetworks.com/blog/category/service-providers/?ts=markdown) [#### Tapping the True Potential of the 5G Digital Economy](https://www.paloaltonetworks.com/blog/2020/02/network-5g-digital-economy/) ### [Service Providers](https://www.paloaltonetworks.com/blog/category/service-providers/?ts=markdown) [#### Automate Visibility and Harness the Power](https://www.paloaltonetworks.com/blog/2017/11/sp-automate-visibility-harness-power/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language