Metro Bank targeted with 2FA-bypassing SS7 attacks
The highly sophisticated attack mechanism is becoming increasingly prevalent
Metro Bank has reportedly fallen victim to a sophisticated two-factor authentication (2FA) bypass attack after hackers infiltrated a telecoms firm's text messaging protocol.
The Signalling Systems No. 7 (SS7) protocol is used by telecom firms to coordinate how texts and calls are routed around the world. But according to Motherboard, hackers are more actively exploiting SS7, and intercepting 2FA text messages to gain access to bank accounts such as those with the UK's Metro Bank.
The attack mechanism is highly sophisticated, and was therefore once thought of as beyond the technical capabilities of conventional cyber criminals.
But the UK's national cyber arm the National Cyber Security Centre (NCSC), among others, now understand that the SS7 flaw is being exploited on a rising scale.
"We are aware of a known telecommunications vulnerability being exploited to target bank accounts by intercepting SMS text messages used as 2-Factor Authentication (2FA)," an NCSC spokesperson told IT Pro.
"While text messages are not the most secure type of two-factor authentication, they still offer a huge advantage over not using any 2FA at all.
"NCSC recommends installing two-factor authentication on important online accounts to improve security by making it harder for criminals to access valuable data.
"Customers should be vigilant against suspicious activity on their bank accounts and credit cards. Any concerns about fraud or lost data should be referred to their financial provider or Action Fraud."
The vulnerabilities with SS7 are well-known and documented, with Adaptive Mobile in 2015 learning that this security flaw could cause widespread fraud and mass surveillance attacks on mobile device users.
Almost every network around the world uses SS7, according to the mobile security firm, and governments are even able to take advantage of the flaw to listen-in to confidential conversations.
Attackers previously exploited SS7 to drain customer bank accounts in 2017 by intercepting text messages containing 2FA codes, and infiltrating accounts with several banks across Germany.
The hackers were able to exploit SS7 to divert the text messages the banks sent to customers to phones instead controlled by the attackers themselves. These codes were then used to authorise bank transfers from the hijacked accounts into those that they owned.
"At Metro Bank we take our customers' security extremely seriously and have a comprehensive range of safeguards in place to help protect them against fraud.
"We have supported telecommunication companies and law enforcement authorities with an industry-wide investigation and understand that steps have been taken to resolve the issue," a Metro Bank spokesperson told Motherboard.
IT Pro approached Metro Bank for further comment.
Four cyber security essentials that your board of directors wants to know
The insights to help you deliver what they needDownload now
Data: A resource much too valuable to leave unprotected
Protect your data to protect your companyDownload now
Improving cyber security for remote working
13 recommendations for security from any locationDownload now
Why CEOS should care about the move to SAP S/4HANA
And how they can accelerate business valueDownload now