Tuesday, March 19, 2024

Hackers Taping the Phone Network using SS7 Attacks to Steal Money From Bank Accounts

New research states that sophisticated hackers are now taping the Phone network by exploiting the SS7 protocol to steal money from the bank accounts by intercepting the messages.

SS7( Signaling System No. 7) protocol used by Internet service providers and telecom companies to control the phone calls and text messages around the world.

SS7 Attacks performed by Cyber criminals using an existing design flaw in SS7 protocol and exploit it to perform various dangerous attacks such as data theft, eavesdropping, text interception and location tracking.

Basically, these controls are extremely limited and some time the access can be provided to the intelligence agencies or surveillance contractors for a legitimate purpose since it is a very serious concern about sensitive data and privacy of users.

According to the motherboard statement, but now this capability is much more widely available in the hands of financially-driven cybercriminal groups, who are using it to empty bank accounts.

Also Motherboard identified that a UK’s Metro Bank fallen victims of this SS7 Attacks and now the cyber criminals started wide spreading this attack.

Based on the confirmation given by the National Cyber Security Centre (NCSC), the defensive arm of the UK’s signals intelligence agency GCHQ, SS7 attacks are using by cybercriminals to intercept the messages to steal the code that used for bank transaction.

NCSC said that “We are aware of a known telecommunications vulnerability being exploited to target bank accounts by intercepting SMS text messages used as 2-Factor Authentication (2FA).”

SS7 Attacks Hard to Detect

Basically, SS7 Network doesn’t authenticate who send the request and pass it into other side.So even if anyone gains the access, it considers as a legitimate one regardless of accessing users who can be a government agency, a surveillance company, or a criminal.

Since the bank accounts are under two factor authentication, by having a SS7 network access, cybercriminals can be intercepted the messages after they gaining access the internet banking login credentials using phishing attack and initiate verification code via text message.Later they intercept it via SS7 attack and using it to complete their transaction process.

“something that members of the general public don’t necessarily have to worry about. An SS7 attack is unlikely to be effective if the bank uses a form of 2FA that doesn’t rely on text messages, such as an authenticator app.”

Some of The Telecom Service Provides Statements

Vodafone spoke person said to Motherboard, “We have specific security measures in place to protect our customers against SS7 vulnerabilities that have been deployed over the last few years, and we have no evidence to suggest that Vodafone customers have been affected.”

Also they states that, Vodafone working with GSMA, banks and security experts in order to mitigate and protect their customers.

Major UK telco BT said, “We’re aware of the potential of SS7 to be used to try to commit banking fraud. Customer security is our top priority so we’re always upgrading our systems and working with the industry and banks to help protect our customers.” 

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.


Website

Latest articles

How ANY.RUN Malware Sandbox Process IOCs for Threat Intelligence Lookup?

The database includes indicators of compromise (IOCs) and relationships between different artifacts observed within...

CryptoWire Ransomware Attacking Abuses Schedule Task To maintain Persistence

AhnLab security researchers detected a resurgence of CryptoWire, a ransomware strain originally prevalent in...

E-Root Admin Sentenced to 42 Months in Prison for Selling 350,000 Credentials

Tampa, FL – In a significant crackdown on cybercrime, Sandu Boris Diaconu, a 31-year-old...

WhiteSnake Stealer Checks for Mutex & VM Function Before Execution

A new variant of the WhiteSnake Stealer, a formidable malware that has been updated...

Researchers Hacked AI Assistants Using ASCII Art

Large language models (LLMs) are vulnerable to attacks, leveraging their inability to recognize prompts...

Microsoft Deprecate 1024-bit RSA Encryption Keys in Windows

Microsoft has announced an important update for Windows users worldwide in a continuous effort...

Beware Of Free wedding Invite WhatsApp Scam That Steal Sensitive Data

The ongoing "free wedding invite" scam is one of several innovative campaigns aimed at...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles