{"id":82827,"date":"2017-03-18T22:44:47","date_gmt":"2017-03-19T02:44:47","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2022-10-22T12:08:08","modified_gmt":"2022-10-22T16:08:08","slug":"your-mobile-is-leaking-ss7","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/your-mobile-is-leaking-ss7\/","title":{"rendered":"Your Mobile is Leaking SS7"},"content":{"rendered":"<p><a href=\"http:\/\/www.atdetroit.net\/forum\/messages\/6790\/63149.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-103777\" title=\"Your Mobile is Leaking SS7\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/switchboard.jpg?resize=133%2C91&#038;ssl=1\" alt=\"Your Mobile is Leaking SS7\" width=\"133\" height=\"91\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/switchboard.jpg?resize=150%2C102&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/switchboard.jpg?resize=75%2C51&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/switchboard.jpg?w=550&amp;ssl=1 550w\" sizes=\"auto, (max-width: 133px) 100vw, 133px\" \/><\/a>There is a <strong>vulnerability<\/strong> in the <strong>global phone system. <\/strong>The flaw allows hackers to access telephone data using nothing but a phone number. The <strong>flaw<\/strong> is in the <strong><a href=\"https:\/\/web.archive.org\/web\/20210307222224\/https:\/\/www.cs.rutgers.edu\/~rmartin\/teaching\/fall04\/cs552\/readings\/ss7.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Signaling System 7<\/a><\/strong> (PDF) or SS7. SS7 is a set of telephony signaling protocols that exchanges information on telephone networks.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20200727100519\/http:\/\/effectivecommunicationadvice.com:80\/games-and-exercises\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-103780\" title=\"Listening to phone calls\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/effective_communication-e1567990229131-150x120.jpg?resize=125%2C100&#038;ssl=1\" alt=\"Listening to phone calls\" width=\"125\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/effective_communication-e1567990229131.jpg?resize=150%2C120&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/effective_communication-e1567990229131.jpg?resize=75%2C60&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/effective_communication-e1567990229131.jpg?w=317&amp;ssl=1 317w\" sizes=\"auto, (max-width: 125px) 100vw, 125px\" \/><\/a><a href=\"https:\/\/www.theregister.co.uk\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>The Register<\/em><\/a> <a href=\"https:\/\/www.theregister.co.uk\/2016\/05\/10\/ss7_mobile_chat_hack\/\" target=\"_blank\" rel=\"noopener noreferrer\">points out<\/a> that SS7 signaling technology was developed in the 1970s. It hasn\u2019t been updated, since the systems became accessible over the internet. The weakness in SS7 allows <strong>hackers or TLA&#8217;s to exploit the vulnerability<\/strong> with the phone number of the user they&#8217;re targeting. The flaw allows them to <strong>listen to phone calls, read text messages and track the user&#8217;s location<\/strong>.<\/p>\n<h3>The SS7 flaw<\/h3>\n<p>A <a href=\"https:\/\/web.archive.org\/web\/20190809203601\/https:\/\/www.ptsecurity.com\/upload\/ptcom\/SS7_WP_A4.ENG.0036.01.DEC.28.2014.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">white paper<\/a> (PDF) by independent cyber-security company <a href=\"https:\/\/www.ptsecurity.com\/ww-en\/\" target=\"_blank\" rel=\"noopener noreferrer\">Positive Technologies<\/a> explains.<\/p>\n<p style=\"padding-left: 30px;\" align=\"justify\"><em>The process of placing voice calls in modern mobile networks is still based on SS7 technology which dates back to the 1970s. At that time, safety protocols involved physical security of hosts and communication channels, making it impossible to obtain access to an SS7 network through a remote unauthorized host. In the early 21st century, a set of signaling transport protocols called <strong><a href=\"https:\/\/web.archive.org\/web\/20171028042335\/https:\/\/www.eetimes.com\/document.asp?doc_id=1203417\" target=\"_blank\" rel=\"noopener noreferrer\">SIGTRAN<\/a><\/strong> were developed. SIGTRAN is an extension to SS7 that allows the use of <strong>IP networks to transfer messages<\/strong>.<\/em><\/p>\n<p style=\"padding-left: 30px;\" align=\"justify\"><em>However, even with these new specifications, security vulnerabilities within SS7 protocols remained. As a result, an intruder is able to <strong>send, intercept and alter SS7 messages<\/strong> by executing various attacks against mobile networks and their subscribers.<\/em><\/p>\n<p>The real-world result of the SS7 flaw as Alex Mathews, technical manager EMEA of Seoul Korea-based <a href=\"https:\/\/www.crunchbase.com\/organization\/positive-technologies#\/entity\" target=\"_blank\" rel=\"noopener noreferrer\">Positive Technologies<\/a> explained is.<\/p>\n<p style=\"padding-left: 30px;\" align=\"justify\"><em>Chat applications such as WhatsApp, Telegram, and others use <strong>SMS verification<\/strong> based on text messages using SS7 signaling to verify the identity of users\/numbers.<\/em><\/p>\n<p style=\"padding-left: 30px;\" align=\"justify\"><em><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-103782 size-medium\" title=\"SMS verification based on text messages using SS7 signalling\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pc-mob-1.jpg?resize=150%2C133&#038;ssl=1\" alt=\"SMS verification based on text messages using SS7 signalling\" width=\"150\" height=\"133\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pc-mob-1.jpg?resize=150%2C133&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pc-mob-1.jpg?resize=75%2C66&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pc-mob-1.jpg?w=407&amp;ssl=1 407w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>SMS authentication is one of the major security mechanisms for services like <strong><a href=\"https:\/\/www.whatsapp.com\" target=\"_blank\" rel=\"noopener noreferrer\">WhatsApp<\/a><\/strong>, <a href=\"https:\/\/www.viber.com\/en\/\" target=\"_blank\" rel=\"noopener noreferrer\">Viber<\/a>, <a href=\"https:\/\/telegram.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Telegram<\/a>, <strong><a title=\"Facebook\" href=\"https:\/\/www.facebook.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a><\/strong> (<a title=\"NASDAQ : FB\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-FB\/\" target=\"_blank\" rel=\"noopener noreferrer\">FB<\/a>), and is also part of <a href=\"https:\/\/wp.me\/p2wgaW-fYU\" target=\"_blank\" rel=\"noopener noreferrer\">second-factor authentication<\/a> for <strong><a title=\"Google\" href=\"https:\/\/www.google.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a><\/strong> (<a title=\"NASDAQ : GOOG\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-GOOG\/\" target=\"_blank\" rel=\"noopener noreferrer\">GOOG<\/a>) accounts, etc. Devices and applications send <strong>SMS messages via the SS7 network<\/strong> to verify identity, and an attacker can easily <strong>intercept these and assume the identity of the legitimate user<\/strong>. Having done so, the attacker can read and write messages as if they are the intended recipient.<\/em><\/p>\n<p style=\"padding-left: 30px;\" align=\"justify\"><em>If chat history is stored on the server, this information can also be retrieved.<\/em><\/p>\n<h3>60 Minutes hacks SS7<\/h3>\n<p>The hack first came to light in 2014. Security researcher Karsten Nohl demonstrated the SS7 flaw at a convention in Germany according to <em><a href=\"https:\/\/web.archive.org\/web\/20160514095644\/http:\/\/www.fiercewireless.com:80\/story\/us-carriers-mum-60-minutes-report-vulnerability-ss7\/2016-04-19\" target=\"_blank\" rel=\"noopener noreferrer\">FierceWireless<\/a><\/em>. <a title=\"60 Minutes\" href=\"http:\/\/www.cbsnews.com\/60-minutes\/\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">CBS 60 Minutes<\/a> (<em><strong>rb- <\/strong>That\u2019s still on?<\/em>) caused a mild ripple after they ran a story on the flaw. The program engaged Mr. Nohl to demonstrate the vulnerability. He was able to track a new iPhone\u00a0that had been given to U.S. Rep. <a title=\"Ted Lieu\" href=\"http:\/\/en.wikipedia.org\/wiki\/Ted_Lieu\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">Ted Lieu<\/a> (D-CA).<\/p>\n<p>Mr. Lieu, who holds a degree in computer science from <a href=\"https:\/\/www.stanford.edu\/\" target=\"_blank\" rel=\"noopener noreferrer\">Stanford<\/a>, agreed to use the phone to talk to his staff knowing it would be hacked. From his office in Berlin, Mr. Nohl was able to access Rep. Lieu&#8217;s phone. He tracked the representative&#8217;s movements in Los Angeles, read messages, and recorded phone calls between Representative Lieu and his staff.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-103784\" title=\"record phone calls\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phone2-1.jpg?resize=133%2C90&#038;ssl=1\" alt=\"record phone calls\" width=\"133\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phone2-1.jpg?resize=150%2C101&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phone2-1.jpg?resize=75%2C51&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phone2-1.jpg?w=398&amp;ssl=1 398w\" sizes=\"auto, (max-width: 133px) 100vw, 133px\" \/>CBS correspondent <a title=\"Sharyn Alfonsi\" href=\"http:\/\/en.wikipedia.org\/wiki\/Sharyn_Alfonsi\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">Sharyn Alfonsi<\/a> contacted representatives from <a title=\"CTIA\" href=\"http:\/\/www.ctia.org\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">CTIA<\/a> for comment on the story. The CTIA said that there have been reports of SS7-related security breaches abroad. She stated, &#8220;&#8230; <em>but (they) assured us that all U.S. cellphone networks were secure.<\/em>&#8221; Despite the fact that Mr. Lieu was on a U.S. network when his phone was hacked from Germany.<\/p>\n<h3>An open secret<\/h3>\n<p>The flaw &#8220;<em>is an open secret among the world&#8217;s intelligence agencies &#8212; including ours &#8212; and they don&#8217;t necessarily want that hole plugged,<\/em>&#8221; Ms. Alfonsi reported. The four major U.S. wireless operators declined to discuss more specific questions from\u00a0<em><a title=\"FierceWireless\" href=\"https:\/\/www.fiercewireless.com\/\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">FierceWireless<\/a><\/em>. When asked whether the flaw may threaten the privacy and security of subscribers, <a title=\"AT&amp;T\" href=\"http:\/\/www.att.com\/\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">AT&amp;T<\/a> (<a title=\"NYSE : T\" href=\"https:\/\/www.tradingview.com\/symbols\/NYSE-T\/\" target=\"_blank\" rel=\"noopener noreferrer\">T<\/a>) and <a title=\"Verizon\" href=\"http:\/\/www.verizon.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Verizon<\/a> (<a title=\"NASDAQ : VZ\" href=\"https:\/\/www.tradingview.com\/symbols\/NYSE-VZ\/\" target=\"_blank\" rel=\"noopener noreferrer\">VZ<\/a>) deferred to CTIA. <a title=\"Sprint Nextel\" href=\"http:\/\/www.sprint.com\/business\/\" target=\"_blank\" rel=\"noopener noreferrer\">Sprint<\/a> (<a title=\"NYSE : S\" href=\"https:\/\/www.cnn.com\/2020\/08\/03\/tech\/sprint-tmobile-brand\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">S<\/a>) and <a title=\"T-Mobile\" href=\"http:\/\/www.t-mobile.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">T-Mobile<\/a> (<a href=\"https:\/\/www.nyse.com\/quote\/XNGS:TMUS\" target=\"_blank\" rel=\"noopener noreferrer\">TMUS<\/a>) declined to discuss SS7.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-103786\" title=\"Listen to phnoe calls\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/social-listening-e1567990426205-150x137.jpg?resize=109%2C100&#038;ssl=1\" alt=\"Listen to phnoe calls\" width=\"109\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/social-listening-e1567990426205.jpg?resize=150%2C137&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/social-listening-e1567990426205.jpg?resize=75%2C69&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/social-listening-e1567990426205.jpg?w=246&amp;ssl=1 246w\" sizes=\"auto, (max-width: 109px) 100vw, 109px\" \/>Representative Lieu has called for a congressional investigation of the vulnerabilities in SS7. He wrote that &#8220;<em>The applications for this vulnerability are seemingly limitless, from criminals monitoring individual targets to foreign entities conducting economic espionage on American companies to nation states monitoring U.S. government officials.<\/em>&#8221; Lieu said the investigation should be conducted by the <a title=\"United States House Committee on Oversight and Government Reform\" href=\"http:\/\/en.wikipedia.org\/wiki\/United_States_House_Committee_on_Oversight_and_Government_Reform\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">House Oversight and Government Reform Committee<\/a>, of which he is a member.<\/p>\n<h3>Investigate the flaws in SS7<\/h3>\n<p><a href=\"https:\/\/www.theregister.co.uk\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>The Register<\/em><\/a> <a href=\"https:\/\/www.theregister.co.uk\/2017\/03\/15\/ss7_cellphone_spying_flaw_still_unfixed\/\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> that <a href=\"https:\/\/www.facebook.com\/wyden\/\" target=\"_blank\" rel=\"noopener noreferrer\">Senator Ron Wyden<\/a> (D-OR) recently joined Representative Lieu to investigate the flaws in SS7. The pair plan to send an <a href=\"https:\/\/www.wyden.senate.gov\/download\/?id=318B4F92-8721-4D6E-BE26-CE567A5311F5&amp;download=1\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">open letter<\/a> [PDF] to <a href=\"https:\/\/www.dhs.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">Homeland Security<\/a>. They want an update from Secretary John Kelly on DHS&#8217;s progress in addressing the SS7 design shortcomings. It also asks why the agency isn&#8217;t doing more to alert the public about the issue. The letter states in part:<\/p>\n<p style=\"padding-left: 30px;\" align=\"justify\"><em>We suspect that most Americans simply have no idea how easy it is for a relatively sophisticated adversary to track their movements, tap their calls, and hack their smartphones. &#8230; We are also concerned that the government has not adequately considered the counterintelligence threat posed by SS7-enabled surveillance.<\/em><\/p>\n<p><strong>\u00a0<em>rb-<\/em><\/strong><\/p>\n<p><em>It is important to understand that the wired and wireless telephone network that your phone connects to is not secure. They probably never will be. <\/em><\/p>\n<p><em>Telephone networks were not designed to be secure.<\/em><\/p>\n<p><em>In the most <a href=\"https:\/\/pages.nist.gov\/800-63-3\/sp800-63b.html\" target=\"_blank\" rel=\"noopener noreferrer\">recent draft<\/a> of the new <a href=\"https:\/\/pages.nist.gov\/800-63-3\/\" target=\"_blank\" rel=\"noopener noreferrer\">Digital Identity Guidelines<\/a> requirements from <a href=\"https:\/\/www.nist.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">NIST<\/a> warns that:<\/em><\/p>\n<p style=\"padding-left: 30px;\"><em>Note: Out-of-band authentication using the PSTN (SMS or voice) is discouraged and is being considered for removal in future editions of this guideline.<\/em><\/p>\n<p><em>You really have to wonder if this is related to the SS7 hole and why it is only being considered for removal. Maybe some of its TLA friends want the hole to stay in place.<\/em><\/p>\n<p><em>I previously covered the SS7 flaw implications to SMS <a href=\"https:\/\/wp.me\/p2wgaW-l8r\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/em><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/wccftech.com\/remote-spy-iphone-running-ios-10\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">How to Remotely Spy on Your iPhone Running iOS 10<\/a> (wccftech.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The flaw in SS7 &#8211; the way telephone networks share info allows attackers to listen to phone calls read texts &#038; track your location<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2990,2682,2747,104,1096,1536,536,92,3055,949,3053,4,2873,2870,1384,2758,3054,2872,2871],"class_list":["post-82827","post","type-post","status-publish","format-standard","hentry","category-security","tag-2990","tag-2fa","tag-chat","tag-facebook","tag-fb","tag-fcc","tag-goog","tag-google","tag-karsten-nohl","tag-nist","tag-ron-wyden","tag-security","tag-signal-system-7","tag-sigtran","tag-sms","tag-ss7","tag-ted-lieu","tag-telegram","tag-whatsapp"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/82827","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=82827"}],"version-history":[{"count":19,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/82827\/revisions"}],"predecessor-version":[{"id":132526,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/82827\/revisions\/132526"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=82827"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=82827"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=82827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}