A surveillance seller was arrested for a new SS7 attack to track people’s phone sites


Security researchers say they have wiped a surveillance company in the Middle East to take advantage of a new attack capable of deceiving the phone operators in revealing the cell of the cell.

The attack depends on the transgression of security protection that transport companies to protect infiltrators from accessing SS7, or signal system 7, which is a special group of protocols used by global phone companies to direct subscriber calls and text messages all over the world.

SS7 also allows transportation companies to request information about the cell tower with which the subscriber is connected, which is usually used for customer bills accurately when calling or sending a text message to someone from the outside, for example.

The researchers at Enea, a cybersecurity security company that provides protection for phone tankers, said, this week They noticed that his unveiled observation seller was taking advantage of the new violent attack until late 2024 to obtain the sites of people’s phones without their knowledge.

I told Enea VP of Technology Cathal Mc Daid, who co -authored the blog post, Techcrunch that the company noted that the observation seller was a goal “just a few subscribers” and that the attack did not work against all phone companies.

MC Daid said the bypass attack allows the surveillance seller to locate the individual to the nearest cell tower, which can be narrowed in urban or densely populated areas to a few hundred meters.

Enea informed the phone player that he noticed the exploitation used in it, but he refused to name the seller, except for noting that he was headquartered in the Middle East.

Mc Daid Techcrunch told the attack that the attack was part of an increasing direction in wicked operators using these types of exploits to get a person’s position, warning that the sellers behind their use “will not discover and use them if they did not succeed somewhere.”

“We expect more to be found and used,” MC Daid said.

Surveillance sellers, which can include Spyware makers The a wholesale online traffic providers are private companies that are usually operating exclusively for government customers to make intelligence gathering against individuals. Often governments claim Using spyware And other Exploratory techniques Against serious criminals, but tools were also used to target civil society members, including Journalists and Activist.

In the past, the surveillance sellers managed to reach the SS7 through the local phone player, which is misused “Global Address” rented, Or through governmental communication.

But due to the nature of these attacks that occur at the cell network level, there are little subscribers to the phone to defend the exploitation. Instead, defense against these attacks is largely dependent on telecommunications companies.

In recent years, the phone companies have installed the walls of protection and other protection of cybersecurity to defend the SS7 attacks, but the patchy nature of the global cell network means that not all transport companies are protected like others, including the United States.

according to message It was sent to the Senator Ron Widen office last year, the US Department of Internal Security said until 2017 that many countries, especially China, Iran, Israel and Russia, used the weaknesses of SS7 “to exploit subscribers in the United States.” The Kingdom of Saudi Arabia was also I found the attack on defects In SS7 to conduct monitoring of its citizens in the United States.

Leave a Reply

Your email address will not be published. Required fields are marked *