SS7 Cell Network Extensively Exploited by “Nefarious Actors”

“I don’t think most Americans realize how insecure US telephone networks are. If more consumers knew how easy it is for bad guys to track or hack their mobile phones, they would demand the FCC, and wireless companies do something about it. These aren’t just hypotheticals.”

The above statement was made last week by Senator Ron Wyden (D-Ore.) after getting a letter from the Department of Homeland Security warning that “nefarious actors may have exploited” worldwide cellular networks “to target the communications of American citizens.”

Wyden on Tuesday explained the issue in a separate letter to Ajit Pai, chairman of the Federal Communications Commission (FCC) responsible for regulating interstate communications:

“Hackers can exploit SS7 flaws to track Americans, intercept their calls and texts, and hack their phones to steal financial information, know when they are at home or away, and otherwise prey on unsuspecting consumers. Moreover, according to multiple news reports, SS7 spying products are widely available to both criminal and foreign governments.”

Disturbingly, the letter reveals that:

“This threat is not merely hypothetical – malicious attackers are already exploiting SS7 vulnerabilities. One of the major wireless carriers informed my office that it reported an SS7 data breach, in which customer data was accessed, to law enforcement.”

There is no clarity whether the warning refers to state-sponsored entities acting for political gain or criminal hackers for financial benefit. It is also unclear who the wireless carrier is and the extent of the breach.

What is SS7?

Signaling System No. 7 (SS7) is a set of signaling protocols that provide the backbone for all mobile phone communication everywhere in the world. It enables phone networks to communicate among themselves to connect users and pass messages between systems, ensure correct billing, and to grant users to roam on other networks.

Image result for ss7


SS7 system, first developed in the 1970s is old in technological terms. Critically, no-one at the time thought of building any security measures into it.

It was known to be insecure at least 2008 onwards, and the situation has worsened in recent years. Previously there were only a few mobile networks, and now there are literally thousands worldwide. The industry made no changes as the risks were accepted to be purely theoretical.

This altered in 2014 when vulnerabilities in SS7 enabled hackers to record a somewhat embarrassing secret unencrypted phone conversation between the US ambassador to Ukraine, Geoffrey Pyatt, and US Assistant Secretary of State, Victoria Nuland, in which Pyatt was highly critical of the EU.

It was believed that using encrypted messaging apps such as WhatsApp, Facebook Messenger, Google Hangouts, and Viber, would secure communications.

However, in 2016, a security researcher showcased how hackers with access to the SS7 network could spoof users’ identities and set up fake accounts which would grant them access to messages belonging to users of many messaging apps that rely on phone numbers to authenticate users.

In 2017 O2 Telefonica in Germany confirmed that criminals used the SS7 network to bypass SMS-based two-factor authentication (2FA) to steal money from bank accounts.

Action Time?

Wyden lettered to the FCC urging the regulator to address the problem accurately and to compile a list of SS7 violations known to have happened over the last five years.

This is not the first instance for a call-to-action as in 2016, US congressman Ted Lieu (D-Calif.) made a similar plea, calling for an oversight committee investigation into SS7:

“The applications for this vulnerability are seemingly limitless, from criminals monitoring individual targets to foreign entities conducting economic espionage on American companies to nation states monitoring US government officials. … The vulnerability has serious ramifications not only for individual privacy but also for American innovation, competitiveness, and national security. Many innovations in digital security – such as multi-factor authentication using text messages – may be rendered useless.”

The investigation took place, but the FCC working group responsible for it mainly comprised of telecoms industry lobbyists and not a single academic expert.

The SS7 -Spies Love It!

Initial concerns over the SS7 network was tracking; now there are fears of personal data being accessed from just about every phone user in the world.

As said earlier, it can be used to intercept encrypted communications and 2FA security measures.

According to the Washington Post, “American, Chinese, Israeli and Russian intelligence agencies are the most active users of SS7 surveillance.”

Just this month news came out that US police can find the location of any phone in the country in seconds thanks to SS7. Worse still, barely days after this revelation came to light it was reported that this information was quite easy for hackers to access.

SS7 is a double-edged sword because security companies around the world thrive selling SS7 hacking tools to governments, police forces, and criminals with even benefitting from it. Brian Collins, chief executive of AdaptiveMobile Security, told the Washington Post about this.

Even with the knowledge of SS7 being a threat to US national security, it appears that the US government is least bothered about the problem. The driving factor could be that of SS7’s mass-surveillance capabilities which are too precious to kill off.


Website Bug Enables Anyone to Track US Phones Without Permission

Last week US senator John Wyden issued a formal complaint to the FFC about a phone tracking system. Worryingly, a second more terrifying tracking service has surfaced.

It is called LocationSmart, and it is a phone tracking service that can pinpoint the location of mobile phones connected to carrier networks belonging to Verizon, AT&T, Sprint, and T-Mobile.

Brian Krebs, a security researcher, has revealed that a bug exists in the service.

The free to use API had been allowing anyone with basic coding knowledge to track almost every cell phone in the US.

Location Tracking Demo

The technology was intended to check the location of one’s phone through an SMS message asking the user’s authorization to approximate their phone’s position using mobile tower triangulation.

But, a researcher at Carnegie Mellon University found a way to bypass the SMS authorization process. The online demo tool did the trick.

Easily Exploitable

Robert Xiao from Carnegie Mellon’s  Human-Computer Interaction Institute said he found the bug by chance. In his detailed blog about the virus, he explained just how easy it was to bypass the SMS security check.

Mario Proietti, the CEO of LocationSmart, said the firm would launch an investigation regarding this. The demo tool is no longer available on their website. The CEO said the API was made available for “legitimate and authorized purposes” only.

Legal Conundrum

Krebs claims that it is imaginable the demo was available since 2011 for exploitation, and definitely since January 2017.

Krebs said: “A third-party firm leaking customer location information not only would almost certainly violate each mobile providers own stated privacy policies, but the real-time exposure of this data poses serious privacy and security risks for virtually all U.S. mobile customers.”

The decision from FCC’s investigation is yet to come, but it’s certain this case will not go down meekly.


UK Police Reportedly Accessing Phone Records Unlawfully

Privacy International sent a formal complaint against UK’s police forces highly invasive “mobile phone extraction technology.”

In the complaint made to the Information Commissioners Office, the group reports that UK authorities have been accessing the contents of people’s phones unauthorized as in without a warrant. It has also been forwarded to the Home Office and the Independent Office for Police Conduct.

PI in the complaint called for reforms by claiming the practices are “totally unregulated, potentially discriminatory and unlawful.”

Data Mining

Millie Graham Wood, working for Privacy International as an attorney has claimed UK’s police is using Israeli firm’s Cellebrite to download data directly from phones without owner’s knowing it.

Easily Recoverable

Wood claims to have tested the Cellebrite UFED Touch 2 device and that it connects directly to the phone from which it gathers data. He further added that the Cellebrite device was even able to tie back together previously deleted messages from WhatsApp which is an encrypted messaging app.

US Police Can Geolocate Nearly Every Mobile Phone

It has been found out that US police are using a system that allows them to geolocate nearly every phone in the country but some cops are abusing it.

The US police have access to a system called Securus Technologies. The authorities can use it to “ping” a phone’s location when a warrant is acquired. The fear now is that some cops are abusing the system.

Last year Cory Hutcheson, a Missouri deputy, supposedly accessed the Securus system “for the unlawful purpose of spying on Plaintiffs for his own personal gain.”

Flaws in the System

Securus grants police access to ping cell phone locations in real time because of the location data provided by carriers.

Warrants are required to access the phone tracking system, but it seems Securus did not scrutinize requests adequately so and Hutcheson exploited the system.

Securus announced that it requires authorities to upload the proper documentation – a warrant or affidavit – prior to processing a request. However, Senator Ron Wyden (Oregon) has said that Securus does not “conduct any review of surveillance requests.”