Adaptive Mobile reveals hacker holes in mobile networks

The flaws can be used by malicious actors maliciously and governments to carry out large-scale attacks and surveillance operations

Adaptive Mobile has uncovered a security flaw in mobile networks that could cause widespread fraud and large-scale surveillance attacks for mobile users.

The threat takes advantage of a hole in Signalling System 7 (SS7), which is used to connect mobile networks around the world.

According to Adaptive Mobile, almost every network around the world uses SS7 and most people use it everyday. In fact, the company's Cathal McDaid, head of Adaptive Mobile's threat intelligence unit, said more people use SS7 on a daily basis than the internet.

Advertisement - Article continues below

Cyber criminals are using the vulnerability to infiltrate mobile network billing systems and then trick them into giving the criminals lower-cost calling and roaming charges.

Governments are also said to be taking advantage and listening into confidential conversations. An example Adaptive Mobile gave was how conversations were monitored between MTC Ukraine network users and individuals on a Russian mobile phone network, although it hasn't been revealed who was behind the hack.

"The SS7 vulnerabilities are just another example of software-based systems that weren't built for the rich interconnectivity and threats of the modern mobile infrastructure," Chris Wysopal, CISO and CTO at Veracode said. "Development teams need to go into projects with the expectations that what they're creating will live in a hostile environment where attackers will look to exploit vulnerabilities. We've seen this across every industry and it's no surprise it's occurring in the telco industry."

Advertisement - Article continues below

A number of companies have investigated mobile network flaws, discovering it's a widespread problem caused, in many cases, by out-of-date technologies that haven't had significant updates since mobile phones became widespread ten or more years ago.

Advertisement - Article continues below

"A core protocol like SS7 provides governments and rogue actors wide access to the world's communications infrastructure making it an incredibly attractive system to break into," Wysopal added. "Until software developers change their approach and build security into their code from the start, we're going to continue to see these problems."

Featured Resources

The case for a marketing content hub

Transform your digital marketing to deliver customer expectations

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

IT faces new security challenges in the wake of COVID-19

Beat the crisis by learning how to secure your network

Download now



K2View innovates in data management with new encryption patent

28 May 2020

ZLoader malware returns as a coronavirus phishing scam

27 May 2020

AnarchyGrabber hack steals Discord tokens, IDs and passwords

27 May 2020

Scammers leverage contact-tracing in hacking attempt

27 May 2020

Most Popular

Microsoft Windows

Microsoft warns users not to install Windows 10's May update

28 May 2020
data breaches

EasyJet faces class-action lawsuit over data breach

26 May 2020
cyber security

Microsoft bans Trend Micro driver from Windows 10 for "cheating" hardware tests

27 May 2020