Mobile Technology Congress 2025: System on a Chip in the Operation Center

The Mobile Technology Congress 2025 held in Barcelona exceeded expectations – a ground-breaking event with 109,000 participants from 205 nations, featuring over 2,900 exhibitors, sponsors, and collab

The Mobile Technology Congress 2025 held in Barcelona exceeded expectations – a ground-breaking event with 109,000 participants from 205 nations, featuring over 2,900 exhibitors, sponsors, and collaborators presenting a remarkable variety of state-of-the-art subjects, from 5G and IoT to Integrated Security for the AI-guided Tomorrow.

Ast Cisco in the spotlight, they exhibited a range of innovations, including cutting-edge secure connection solutions, showcasing upcoming wireless technologies, and unveiling multiple significant media announcements that emphasized their dedication to shaping the landscape of digital communications.

Cisco’s Unified Cisco strategy was prominently showcased, merging networking, safety, perceptiveness, and Splunk solutions to provide exceptional results. This comprehensive approach indicates how customers can attain AI-prepared data centers, future-proof workplaces, and digital durability.

Cisco at MWC 2025: An Innovation Dynamo

In the signature Cisco style, their booth wasn’t merely a space but a center of originality and cooperation. Featured Live Demonstrations included:


Alberto Torralba, Cisco, Presenting to Alberto Núñez Feijóo, Member of the Congress of Deputies of Spain
Fig. 1: Alberto Torralba, Cisco, Presenting to Alberto Núñez Feijóo, Member of the Congress of Deputies of Spain

Key Takeaways from Previous Occasions

Expanding on their learnings fromBlack Hat, NFL Super Bowl, RSA Conference, and others, the Team brought the same vigor and technical discipline to MWC 2025. Leveraging the operational excellence honed at those events, the SNOC squad blended cutting-edge security tools with real-time network supervision to guarantee seamless event operations.

The Splunk Cloud served as the data platform, with Add-ons for data intake:


Through these connections, our SOC squad could craft a SNOC dashboard at a CISO level for crucial telemetry from all network and security origins.

CISO-level SNOC dashboard
Fig. 2: CISO-level SNOC dashboard

There were also dashboards at the SOC Manager level for XDR Incidents, Firewall Events, and DNS Security.

SOC manager-level dashboard
Fig. 3: SOC manager-level dashboard

Furthermore, at this edition of the Mobile Technology Congress in Barcelona, Cisco’s ThousandEyes panel played a vital role in ensuring robust network security. Attendees enjoyed real-time tracking and insights into network efficiency, guaranteeing a smooth encounter from the beginning until the end. With the capacity to oversee essential components like the event portal and login processes, ThousandEyes ensured easy and uninterrupted access to crucial resources for the participants. This meticulous view and authority helped maintain the network’s integrity and dependability throughout the event.

Cisco ThousandEyes dashboard
Fig. 7: Cisco ThousandEyes dashboard

Initial Day: An Assessment of Extent

The first day was about managing vast network movements effortlessly. From just a few personnel devices to thousands of devices linking concurrently, our firewall and network monitoring mechanisms operated without any flaws, managing a substantial traffic load while retaining precise visibility. The robust performance of our Cisco security solutions confirmed that network reliability is a non-negotiable element in a controlled laboratory setting or amid a dynamic conference.

Fira Network Security architecture
Fig. 8: Fira Network Security architecture

Second Day: A Russian Threat Attempted to Disrupt the Gathering

Just when it seemed like the only unexpected occurrences at the Mobile Technology Congress 2025 wereAmidst the cutting-edge technology and impromptu showcases, our firewall records revealed an unforeseen turn. On the second day, our diligent surveillance unearthed an unusual incident: an elevation of privilege emanated from a source in Russia.

Firewall Management Center (FMC) Intrusion Events
Fig. 9: Firewall Management Center (FMC) Intrusion Events


Firewall Management Center (FMC) Intrusion Events, detailed view
Fig. 10: Firewall Management Center (FMC) Intrusion Events, detailed view

Our expert technician, Jorge Quintero, promptly marked this as a possible high-risk occurrence – a scenario where a device might be compromised. The records exhibited a consistent trend with C2 communications, triggering a prompt inquiry and decisive corrective actions. In the customary SNOC fashion, we ensured any unwelcome intruder was swiftly dealt with before causing chaos. (It seems even at MWC, cyber foes can’t resist the temptation of the gathering!)

Firewall Management Center (FMC) Intrusion Event, event packet capture
Fig. 11: Firewall Management Center (FMC) Intrusion Event, event packet capture

What truly caught our attention in this IDS incident was a well-crafted plain-text script operating on port 80 through Internet Explorer (yes – it’s still in use).

Intrusion Event Packet Capture, details
Fig. 12: Intrusion Event Packet Capture, details

The triggered Snort signature also pinpointed two primary methods in play:

  • Initial Entry
  • Execution

Firewall Management Center (FMC) Intrusion Event, MITRE ATT&CK mappings
Fig. 13: Firewall Management Center (FMC) Intrusion Event, MITRE ATT&CK mappings

By utilizing public generative AI tools, the examination of the payload unveiled consistent traces of malevolent behavior — including efforts to detect anti-malware applications (presumably for deletion to ensure continuous access) and potentially escalate privileges further.

Example from Public Generative AI Application Prompt Response
Fig. 14: Example from Public Generative AI Application Prompt Response

Ultimately, our suspicions were corroborated (if any doubts existed) by Talos and AlienVault threat intelligence. This IP address (associated with the Russian Federation) had already been noted for malevolent activities.

Threat Intelligence Information
Fig. 15: Threat Intelligence Information

Day 3: Cryptomining — The Tale of the Good and the Evil

The third day unveiled a fascinating subject — cryptomining. From its modest origins to its current status as a multi-billion-dollar industry, we have observed the evolution of crypto — expanding beyond just digital currency to innovative applications in the fintech sector, encompassing NFTs and more.

Nevertheless, we have also witnessed how this technology has been exploited by malevolent entities, specifically for compromising devices and utilizing computing resources for cryptomining purposes.

Firewall Management Center (FMC), intrusion event details
Fig. 16: Firewall Management Center (FMC), intrusion event details


Intrusion event packet capture details
Fig. 17: Intrusion event packet capture details

By utilizing public AI tools to decrypt plain text, we determined that mining software (XMRig) was making RPC calls to the Monero cryptocurrency network. It’s essential to note that, although suspicious, this could still be a legitimate case of a device running mining software.

Example from Public Generative AI Application Prompt Response
Fig. 18: Example from Public Generative AI Application Prompt Response

However, the illicit nature of this activity was once more confirmed through intelligence from Talos and AlienVault. The public IP address used had previously been flagged for involvement in malicious cryptomining operations.

Insights on Threat Intelligence
Figure 19: Insights on Threat Intelligence

Day 4: Deceleration and Event Recap!

Day 4 witnessed a deceleration in operations, resulting in a day without threats and allowing us ample time to examine and consolidate the complete data set from the event. Here are some key observations from the firewall assessment:

1. EVE (Encrypted Visibility Engine): Setting the stage for encrypted traffic scrutiny.

The Encrypted Visibility Engine (EVE) by Cisco has demonstrated the profound impact of recent innovations. Monitoring at Fira was exclusively conducted using IDS (Intrusion Detection System) for passive analysis. Even without decryption capabilities, we managed to detect threats within encrypted traffic and pinpoint the processes generating these traffic patterns.

Dashboard of Firewall Management Center (FMC) with Encrypted Visibility Engine statistics
Figure 20: Dashboard of Firewall Management Center (FMC) with Encrypted Visibility Engine statistics

2. Event-oriented analysis, fueled by Splunk

The partnership between Cisco and Splunk is a perfect match. Leveraging Cisco’s comprehensive security expertise and diverse portfolio alongside Splunk’s top-notch observability and flexibility enabled us to craft potent, actionable dashboards for easy utilization by the SNOC team.

Below is an overview of the holistic data from the entire event, spanning connection events, file events, intrusion events, and a prioritized list of incidents identified during the conference.

Splunk app for Secure Firewall within Splunk platform
Figure 20: Splunk App for Secure Firewall in Splunk platform

This encompassed DNS security blocks to safeguard attendees on Fira’s Network at MWC from malicious websites. More than 14,400 applications were detected on the MWC network.

Umbrella DNS integrated into Splunk dashboard
Figure 22: Umbrella DNS integrated into Splunk dashboard

Future Outlook

The unexpected incident on Day 2 served as a poignant reminder of a crucial lesson: in today’s interconnected landscape, every innovation must be complemented with stringent security measures. As we assess the achievements of MWC 2025, we are already devising strategies to bolster our threat detection and incident response capabilities, drawing from our experiences at MWC, Black Hat, and NFL.

Cisco’s SNOC Team is dedicated to maintaining an edge, converting challenges into opportunities for innovation and protection. Whether managing tens of thousands of connections or averting a rogue C2 signal, we are prepared to ensure that the digital realm remains as secure as it is brilliant.

While technology took the spotlight, the real heroes at the Security Booth were the committed individuals who brought these demos and operations to life. Sincere gratitude to: Alberto Torralba, Filipe Lopes, Jorge Quintero, Jervis Hui, Nirav Shah, John Cardani-Trollinger, and Emile Antone. Their dedication and expertise ensured flawless execution of every demo, capturing the attention of all attendees. Special thanks to Ivan Padilla Ojeda, our liaison with the network team, facilitating seamless connectivity within the SNOC.

We also extend our gratitude to those who aided in preparing for the SNOC: Ivan Berlinson, Ryan Maclennan, Aditya Sankar, Seyed Khadem, Tony Iacobelli, Dallas Williams, Nicholas Carrieri, and Jessica Oppenheimer.

Concluding Remarks

The Mobile World Congress 2025 not only showcased the upcoming wave of technological advancements but also served as a striking testament to how integrated, resilient security measures can protect even the most dynamic and high-stakes environments. The comparative analysis between Day 1 and Day 2 underscores the importance of staying vigilant, adapting continuously, and enhancing our defense mechanisms.

Team photo of Mobile World Congress 2025

Thank you for being part of our journey through MWC 2025, and stay tuned for more insights and behind-the-scenes narratives from the event. In the realm of technology, every day is an opportunity for new discoveries!



We welcome your feedback. Ask a Question, Leave a Comment, and Connect with Cisco Secure on social media!


Social Media Channels for Cisco Security


Instagram 

Facebook 

Twitter 

LinkedIn

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.