Saturday, May 24, 2025
HomeCyber Security NewsHackers Selling SS7 0-Day Exploit on Dark Web for $5,000

Hackers Selling SS7 0-Day Exploit on Dark Web for $5,000

Published on

SIEM as a Service

Follow Us on Google News

A newly discovered dark web listing claims to sell a critical SS7 protocol exploit for $5,000, raising alarms about global telecom security.

The seller, operating under the alias “GatewayPhantom,” is marketing the 0-day vulnerability as a tool for SMS interception, real-time phone tracking, and location monitoring.

Signaling System No. 7 (SS7) is a 1975 telecommunications protocol still used globally to route calls and texts between networks.

- Advertisement - Google News

Despite its age, SS7 remains foundational to modern mobile communication. The protocol’s long-documented vulnerabilities allow attackers to:

  • Intercept SMS messages (including 2FA codes).
  • Track phone locations in real time.
  • Eavesdrop on calls without carrier detection.

The exploit advertised by GatewayPhantom reportedly bypasses existing SS7 security measures, enabling “undetectable access to any mobile network.”

Cybersecurity analysts warn that such tools could empower state-sponsored actors, criminals, or private investigators.

Inside the Dark Web Listing

Inside the Dark Web Listing
Inside the Dark Web Listing

According to the post on a prominent hacking forum, the $5,000 package includes:

  • 0-Day Payload: Custom code exploiting unpatched SS7 gateways.
  • Target List: Pre-identified vulnerable telecom systems.
  • Dorking Tools: Automated scripts to scan Shodan, Censys, and other platforms for exposed SS7 nodes.

The seller claims the exploit works against “any carrier still reliant on default SS7 configurations,” which includes providers in developing nations and smaller telecom operators in Europe and Asia.

Telecom security researcher Dr. Elena Marquez called the listing “a worst-case scenario,” noting that SS7 exploits can compromise millions of users without direct malware installation.

“This isn’t just about stealing texts-governments could abuse this for dissident surveillance, or criminals could drain bank accounts via intercepted 2FA codes,” she warned.

Meanwhile, ethical hacker group GhostSec confirmed active scanning for vulnerable SS7 nodes, urging telecom providers to:

  1. Audit SS7 gateways for unusual traffic.
  2. Implement Diameter protocol (SS7’s modern successor).
  3. Adopt AI-driven anomaly detection systems.

Mitigation Steps for Individuals

While telecom upgrades lag, users can:

  • Avoid SMS-based 2FA: Use authenticator apps like Google Authenticator.
  • Enable encryption: Apps like Signal or WhatsApp provide end-to-end protection.
  • Monitor accounts: Enable alerts for unrecognized logins.

This incident underscores the risks of legacy infrastructure in critical systems. Despite repeated warnings, many providers have delayed SS7 upgrades due to costs.

With the exploit now commoditized, regulatory bodies may face pressure to enforce stricter mandates.

As of publication, GatewayPhantom’s listing remains active, with unverified claims of “12 confirmed buyers.”

Cybersecurity firms are reverse-engineering samples to develop patches, but a global fix could take months.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...