Metro Bank targeted with 2FA-bypassing SS7 attacks

The highly sophisticated attack mechanism is becoming increasingly prevalent

Cyber attack on company

Metro Bank has reportedly fallen victim to a sophisticated two-factor authentication (2FA) bypass attack after hackers infiltrated a telecoms firm's text messaging protocol.

The Signalling Systems No. 7 (SS7) protocol is used by telecom firms to coordinate how texts and calls are routed around the world. But according to Motherboard, hackers are more actively exploiting SS7, and intercepting 2FA text messages to gain access to bank accounts such as those with the UK's Metro Bank.

The attack mechanism is highly sophisticated, and was therefore once thought of as beyond the technical capabilities of conventional cyber criminals.

But the UK's national cyber arm the National Cyber Security Centre (NCSC), among others, now understand that the SS7 flaw is being exploited on a rising scale.

"We are aware of a known telecommunications vulnerability being exploited to target bank accounts by intercepting SMS text messages used as 2-Factor Authentication (2FA)," an NCSC spokesperson told IT Pro.

"While text messages are not the most secure type of two-factor authentication, they still offer a huge advantage over not using any 2FA at all.

"NCSC recommends installing two-factor authentication on important online accounts to improve security by making it harder for criminals to access valuable data.

"Customers should be vigilant against suspicious activity on their bank accounts and credit cards. Any concerns about fraud or lost data should be referred to their financial provider or Action Fraud."

The vulnerabilities with SS7 are well-known and documented, with Adaptive Mobile in 2015 learning that this security flaw could cause widespread fraud and mass surveillance attacks on mobile device users.

Almost every network around the world uses SS7, according to the mobile security firm, and governments are even able to take advantage of the flaw to listen-in to confidential conversations.

Attackers previously exploited SS7 to drain customer bank accounts in 2017 by intercepting text messages containing 2FA codes, and infiltrating accounts with several banks across Germany.

The hackers were able to exploit SS7 to divert the text messages the banks sent to customers to phones instead controlled by the attackers themselves. These codes were then used to authorise bank transfers from the hijacked accounts into those that they owned.

"At Metro Bank we take our customers' security extremely seriously and have a comprehensive range of safeguards in place to help protect them against fraud.

"We have supported telecommunication companies and law enforcement authorities with an industry-wide investigation and understand that steps have been taken to resolve the issue," a Metro Bank spokesperson told Motherboard.

IT Pro approached Metro Bank for further comment.

Featured Resources

Defeating ransomware with unified security from WatchGuard

How SMBs can defend against the onslaught of ransomware attacks

Free download

The IT expert’s guide to AI and content management

How artificial intelligence and machine learning could be critical to your business

Free download

The path to CX excellence

Four stages to thrive in the experience economy

Free download

Becoming an experience-based business

Your blueprint for a strong digital foundation

Free download


Cyber attacks on manufacturing up 300% in a year

Cyber attacks on manufacturing up 300% in a year

11 May 2021

Most Popular

What are the pros and cons of AI?
machine learning

What are the pros and cons of AI?

8 Sep 2021
Google takes down map showing homes of 111,000 Guntrader customers
data breaches

Google takes down map showing homes of 111,000 Guntrader customers

2 Sep 2021
What is your digital footprint?
Business strategy

What is your digital footprint?

7 Sep 2021