Sunday, December 8, 2024
HomeComputer SecurityHackers Taping the Phone Network using SS7 Attacks to Steal Money From...

Hackers Taping the Phone Network using SS7 Attacks to Steal Money From Bank Accounts

Published on

SIEM as a Service

New research states that sophisticated hackers are now taping the Phone network by exploiting the SS7 protocol to steal money from the bank accounts by intercepting the messages.

SS7( Signaling System No. 7) protocol used by Internet service providers and telecom companies to control the phone calls and text messages around the world.

SS7 Attacks performed by Cyber criminals using an existing design flaw in SS7 protocol and exploit it to perform various dangerous attacks such as data theft, eavesdropping, text interception and location tracking.

- Advertisement - SIEM as a Service

Basically, these controls are extremely limited and some time the access can be provided to the intelligence agencies or surveillance contractors for a legitimate purpose since it is a very serious concern about sensitive data and privacy of users.

According to the motherboard statement, but now this capability is much more widely available in the hands of financially-driven cybercriminal groups, who are using it to empty bank accounts.

Also Motherboard identified that a UK’s Metro Bank fallen victims of this SS7 Attacks and now the cyber criminals started wide spreading this attack.

Based on the confirmation given by the National Cyber Security Centre (NCSC), the defensive arm of the UK’s signals intelligence agency GCHQ, SS7 attacks are using by cybercriminals to intercept the messages to steal the code that used for bank transaction.

NCSC said that “We are aware of a known telecommunications vulnerability being exploited to target bank accounts by intercepting SMS text messages used as 2-Factor Authentication (2FA).”

SS7 Attacks Hard to Detect

Basically, SS7 Network doesn’t authenticate who send the request and pass it into other side.So even if anyone gains the access, it considers as a legitimate one regardless of accessing users who can be a government agency, a surveillance company, or a criminal.

Since the bank accounts are under two factor authentication, by having a SS7 network access, cybercriminals can be intercepted the messages after they gaining access the internet banking login credentials using phishing attack and initiate verification code via text message.Later they intercept it via SS7 attack and using it to complete their transaction process.

“something that members of the general public don’t necessarily have to worry about. An SS7 attack is unlikely to be effective if the bank uses a form of 2FA that doesn’t rely on text messages, such as an authenticator app.”

Some of The Telecom Service Provides Statements

Vodafone spoke person said to Motherboard, “We have specific security measures in place to protect our customers against SS7 vulnerabilities that have been deployed over the last few years, and we have no evidence to suggest that Vodafone customers have been affected.”

Also they states that, Vodafone working with GSMA, banks and security experts in order to mitigate and protect their customers.

Major UK telco BT said, “We’re aware of the potential of SS7 to be used to try to commit banking fraud. Customer security is our top priority so we’re always upgrading our systems and working with the industry and banks to help protect our customers.” 

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.


Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

DaMAgeCard Attack – New SD Card Attack Lets Hackers Directly Access System Memory

Security researchers have identified a significant vulnerability dubbed "DaMAgeCard Attack" in the new SD...

Deloitte Denies Breach, Claims Only Single System Affected

Ransomware group Brain Cipher claimed to have breached Deloitte UK and threatened to publish...

Top Five Industries Most Frequently Targeted by Phishing Attacks

Researchers analyzed phishing attacks from Q3 2023 to Q3 2024 and identified the top...

Russian BlueAlpha APT Exploits Cloudflare Tunnels to Distribute Custom Malware

BlueAlpha, a Russian state-sponsored group, is actively targeting Ukrainian individuals and organizations by using...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Deloitte Denies Breach, Claims Only Single System Affected

Ransomware group Brain Cipher claimed to have breached Deloitte UK and threatened to publish...

Multiple SonicWall Vulnerabilities Let Attackers Execute Remote Code

SonicWall has issued a critical alert regarding multiple vulnerabilities in its Secure Mobile Access...

Django Security Update, Patch for DoS & SQL Injection Vulnerability

 The Django team has issued critical security updates for versions 5.1.4, 5.0.10, and 4.2.17....