IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Adaptive Mobile reveals hacker holes in mobile networks

The flaws can be used by malicious actors maliciously and governments to carry out large-scale attacks and surveillance operations

Adaptive Mobile has uncovered a security flaw in mobile networks that could cause widespread fraud and large-scale surveillance attacks for mobile users.

The threat takes advantage of a hole in Signalling System 7 (SS7), which is used to connect mobile networks around the world.

According to Adaptive Mobile, almost every network around the world uses SS7 and most people use it everyday. In fact, the company's Cathal McDaid, head of Adaptive Mobile's threat intelligence unit, said more people use SS7 on a daily basis than the internet.

Cyber criminals are using the vulnerability to infiltrate mobile network billing systems and then trick them into giving the criminals lower-cost calling and roaming charges.

Governments are also said to be taking advantage and listening into confidential conversations. An example Adaptive Mobile gave was how conversations were monitored between MTC Ukraine network users and individuals on a Russian mobile phone network, although it hasn't been revealed who was behind the hack.

"The SS7 vulnerabilities are just another example of software-based systems that weren't built for the rich interconnectivity and threats of the modern mobile infrastructure," Chris Wysopal, CISO and CTO at Veracode said. "Development teams need to go into projects with the expectations that what they're creating will live in a hostile environment where attackers will look to exploit vulnerabilities. We've seen this across every industry and it's no surprise it's occurring in the telco industry."

A number of companies have investigated mobile network flaws, discovering it's a widespread problem caused, in many cases, by out-of-date technologies that haven't had significant updates since mobile phones became widespread ten or more years ago.

"A core protocol like SS7 provides governments and rogue actors wide access to the world's communications infrastructure making it an incredibly attractive system to break into," Wysopal added. "Until software developers change their approach and build security into their code from the start, we're going to continue to see these problems."

Featured Resources

Meeting the future of education with confidence

How the switch to digital learning has created an opportunity to meet the needs of every student, always

Free Download

The Total Economic Impact™ of IBM Cloud Pak® for Watson AIOps with Instana

Cost savings and business benefits

Free Download

The business value of the transformative mainframe

Modernising on the mainframe

Free Download

Technology reimagined

Why PCaaS is perfect for modern schools

Free Download

Recommended

Making the most of surveillance video storage
Sponsored

Making the most of surveillance video storage

26 May 2022
Why video surveillance is about more than just security
Sponsored

Why video surveillance is about more than just security

14 Mar 2022
US to ban surveillance software exports to authoritarian governments
cyber security

US to ban surveillance software exports to authoritarian governments

21 Oct 2021
AWS makes its Panorama Appliance generally available
Amazon Web Services (AWS)

AWS makes its Panorama Appliance generally available

21 Oct 2021

Most Popular

How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

7 Jun 2022
Attracting and retaining talent through training
Sponsored

Attracting and retaining talent through training

13 Jun 2022
Delivery firm Yodel disrupted by cyber attack
cyber attacks

Delivery firm Yodel disrupted by cyber attack

21 Jun 2022