SS7 SMS And Call Interception

Mohammad Mukit Ibn Siddique
3 min readJul 14, 2020

--

Today, over 5 billion people are using mobile devices worldwide, and over50% of these mobile devices are smartphones. But how do mobile devices connect? Well, this is made possible by the use of the SS7 protocol.

It is this SS7 protocol that cybercriminals misuse to attack mobile networks and have access to sensitive information about mobile phone users.

By attacking mobile networks, hackers will have access to login information, account balances, passwords, bank accounts, SMSs, and even call made by unsuspecting users.

What Is SS7?

Introduced over 40 years ago, SS7 is a protocol that helps in connecting mobile phones to enable their use for communication between users.

SS7 is what handles the messages (SMSs) and calls made between mobile phones. Since its introduction, SS7 hasn’t been upgraded, so many hackers have studied and have identified how they can crack it.

What Hackers Do

Hackers exploit the authentication procedure in communication systems that rely on SS7 protocol to snoop on text and voice communications.

For attackers to launch an attack on SS7, all they need are computers running the SS7 SDK and Linux. Both these applications can be downloaded from the internet at no cost.

Once attackers get access to the SS7 network, they will target subscribers on that network by making the network think the attacking device is an MSC/VLR node.

Attackers perform MitM phishing to gain access to the types and amounts of data usually used for security. They’ll have the ability to snoop on SMSs and calls and will even know where the mobile phone users are.

The strength of your operating system determines your level of vulnerability to malware attacks. Since mobile phones have weak operating systems, they are the best targets for cybercriminals.

Unfortunately, all mobile phones depend on the SS7 protocol prone to attack by these criminals.

How Can You Protect Yourself?

There is no foolproof way of protecting yourself from cyber attacks unless you stop using mobile phones. But is that possible? Mobile phones have become part and parcels of our lives, and it has become almost impossible for a day to pass without using your mobile phone.

The best way is to avoid passing sensitive information through mobile phones as much as possible. You should also stop sharing too much of your personal/private information online (on social media).

Also, don’t share or store your passwords, bank/credit card information, and other private information online.

For MSPs, government agencies, and enterprises, many solutions are available, ranging from the use of complicated VPN systems to advanced plug-and-play solutions.

Final Words

Since there are billions of mobile users worldwide, the chances of your phone getting attacked are very low. However, if you are in a position of power, either in politics or in an organization, your chances of attack will be high.

That’s why before you make that call or send that SMS, think about what you will say and the consequences you may face if the information gets into the wrong hands.

--

--

No responses yet