Metro Bank targeted with 2FA-bypassing SS7 attacks

The highly sophisticated attack mechanism is becoming increasingly prevalent

Cyber attack on company

Metro Bank has reportedly fallen victim to a sophisticated two-factor authentication (2FA) bypass attack after hackers infiltrated a telecoms firm's text messaging protocol.

The Signalling Systems No. 7 (SS7) protocol is used by telecom firms to coordinate how texts and calls are routed around the world. But according to Motherboard, hackers are more actively exploiting SS7, and intercepting 2FA text messages to gain access to bank accounts such as those with the UK's Metro Bank.

The attack mechanism is highly sophisticated, and was therefore once thought of as beyond the technical capabilities of conventional cyber criminals.

But the UK's national cyber arm the National Cyber Security Centre (NCSC), among others, now understand that the SS7 flaw is being exploited on a rising scale.

"We are aware of a known telecommunications vulnerability being exploited to target bank accounts by intercepting SMS text messages used as 2-Factor Authentication (2FA)," an NCSC spokesperson told IT Pro.

"While text messages are not the most secure type of two-factor authentication, they still offer a huge advantage over not using any 2FA at all.

"NCSC recommends installing two-factor authentication on important online accounts to improve security by making it harder for criminals to access valuable data.

"Customers should be vigilant against suspicious activity on their bank accounts and credit cards. Any concerns about fraud or lost data should be referred to their financial provider or Action Fraud."

The vulnerabilities with SS7 are well-known and documented, with Adaptive Mobile in 2015 learning that this security flaw could cause widespread fraud and mass surveillance attacks on mobile device users.

Almost every network around the world uses SS7, according to the mobile security firm, and governments are even able to take advantage of the flaw to listen-in to confidential conversations.

Attackers previously exploited SS7 to drain customer bank accounts in 2017 by intercepting text messages containing 2FA codes, and infiltrating accounts with several banks across Germany.

The hackers were able to exploit SS7 to divert the text messages the banks sent to customers to phones instead controlled by the attackers themselves. These codes were then used to authorise bank transfers from the hijacked accounts into those that they owned.

"At Metro Bank we take our customers' security extremely seriously and have a comprehensive range of safeguards in place to help protect them against fraud.

"We have supported telecommunication companies and law enforcement authorities with an industry-wide investigation and understand that steps have been taken to resolve the issue," a Metro Bank spokesperson told Motherboard.

IT Pro approached Metro Bank for further comment.

Featured Resources

Shining light on new 'cool' cloud technologies and their drawbacks

IONOS Cloud Up! Summit, Cloud Technology Session with Russell Barley

Watch now

Build mobile and web apps faster

Three proven tips to accelerate modern app development

Free download

Reduce the carbon footprint of IT operations up to 88%

A carbon reduction opportunity

Free Download

Comparing serverless and server-based technologies

Determining the total cost of ownership

Free download


Cyber attacks on manufacturing up 300% in a year

Cyber attacks on manufacturing up 300% in a year

11 May 2021

Most Popular

What should you really be asking about your remote access software?

What should you really be asking about your remote access software?

17 Nov 2021
Jack Dorsey resigns as Twitter CEO
business management

Jack Dorsey resigns as Twitter CEO

29 Nov 2021
Nike to take customers into the metaverse with 'NIKELAND'

Nike to take customers into the metaverse with 'NIKELAND'

19 Nov 2021