Thursday, January 30, 2025
HomeComputer SecurityHackers Taping the Phone Network using SS7 Attacks to Steal Money From...

Hackers Taping the Phone Network using SS7 Attacks to Steal Money From Bank Accounts

Published on

SIEM as a Service

Follow Us on Google News

New research states that sophisticated hackers are now taping the Phone network by exploiting the SS7 protocol to steal money from the bank accounts by intercepting the messages.

SS7( Signaling System No. 7) protocol used by Internet service providers and telecom companies to control the phone calls and text messages around the world.

SS7 Attacks performed by Cyber criminals using an existing design flaw in SS7 protocol and exploit it to perform various dangerous attacks such as data theft, eavesdropping, text interception and location tracking.

Basically, these controls are extremely limited and some time the access can be provided to the intelligence agencies or surveillance contractors for a legitimate purpose since it is a very serious concern about sensitive data and privacy of users.

According to the motherboard statement, but now this capability is much more widely available in the hands of financially-driven cybercriminal groups, who are using it to empty bank accounts.

Also Motherboard identified that a UK’s Metro Bank fallen victims of this SS7 Attacks and now the cyber criminals started wide spreading this attack.

Based on the confirmation given by the National Cyber Security Centre (NCSC), the defensive arm of the UK’s signals intelligence agency GCHQ, SS7 attacks are using by cybercriminals to intercept the messages to steal the code that used for bank transaction.

NCSC said that “We are aware of a known telecommunications vulnerability being exploited to target bank accounts by intercepting SMS text messages used as 2-Factor Authentication (2FA).”

SS7 Attacks Hard to Detect

Basically, SS7 Network doesn’t authenticate who send the request and pass it into other side.So even if anyone gains the access, it considers as a legitimate one regardless of accessing users who can be a government agency, a surveillance company, or a criminal.

Since the bank accounts are under two factor authentication, by having a SS7 network access, cybercriminals can be intercepted the messages after they gaining access the internet banking login credentials using phishing attack and initiate verification code via text message.Later they intercept it via SS7 attack and using it to complete their transaction process.

“something that members of the general public don’t necessarily have to worry about. An SS7 attack is unlikely to be effective if the bank uses a form of 2FA that doesn’t rely on text messages, such as an authenticator app.”

Some of The Telecom Service Provides Statements

Vodafone spoke person said to Motherboard, “We have specific security measures in place to protect our customers against SS7 vulnerabilities that have been deployed over the last few years, and we have no evidence to suggest that Vodafone customers have been affected.”

Also they states that, Vodafone working with GSMA, banks and security experts in order to mitigate and protect their customers.

Major UK telco BT said, “We’re aware of the potential of SS7 to be used to try to commit banking fraud. Customer security is our top priority so we’re always upgrading our systems and working with the industry and banks to help protect our customers.” 

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.


Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

New RDP Exploit Allows Attackers to Take Over Windows and Browser Sessions

Cybersecurity experts have uncovered a new exploit leveraging the widely used Remote Desktop Protocol...

New SMS-Based Phishing Tool ‘DevilTraff’ Enables Mass Cyber Attacks

Cybersecurity experts are sounding the alarm about a new SMS-based phishing tool, Devil-Traff, that...

DeepSeek Database Publicly Exposed Sensitive Information, Secret Keys & Logs

Experts at Wiz Research have identified a publicly exposed ClickHouse database belonging to DeepSeek,...

OPNsense 25.1 Released, What’s New!

The highly anticipated release of OPNsense 25.1 has officially arrived! Nicknamed "Ultimate Unicorn," this...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

New Apple SLAP & FLOP Side-Channel Attacks Let Attackers Steal Login Details From Browser

Researchers from the Georgia Institute of Technology and Ruhr University Bochum have uncovered two...

Russian APT28 Hackers Exploit Zero-Day Vulnerabilities to Target Government and Security Sectors

A detailed analysis from Maverits, a leading cybersecurity firm, reveals a significant evolution in...

New Aquabot Malware Actively Exploiting Mitel SIP phones injection vulnerability

Akamai's Security Intelligence and Response Team (SIRT) has uncovered a novel variant of the...