Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News Editorials & Other Articles General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

Computer Help and Support

Showing Original Post only (View all)

milestogo

(18,955 posts)
Sun Sep 10, 2023, 09:32 AM Sep 2023

Vulnerability in iPhones and Androids [View all]




EXPLOITING THE VULNERABILITY IN IPHONE AND ANDROID

As a penetration tester and security researcher, I want to talk about SS7; a vulnerability that exist in iPhones and android. People don’t know about it. It can’t be patched. I don’t need to install malware on your phone before I collect data. Your phone number is enough. This is a form of radio penetration testing.

SS7, or Signaling System 7, is a set of telecommunication protocols used worldwide for handling phone calls and text messages. While SS7 serves a critical role in telecommunications, it has been known to have vulnerabilities that security researchers and malicious actors have exploited. Governments and intelligence agencies had the power to intercept calls and exploit the power of SS7; but now individuals with powerful tools have the capabilities to do that.

Hackers can read text messages, listen to phone calls and track mobile phone users’ locations with just the knowledge of their phone number using a vulnerability in the worldwide mobile phone network infrastructure. The exploit centres on a global system that connects mobile phone networks, and can give hackers, governments or anyone else with access to it remote surveillance powers that the user cannot do anything about.

Here's some information on SS7 vulnerabilities, how they can be exploited, and steps to mitigate these risks:

Exploiting SS7 Vulnerabilities

1. SMS Interception: One significant vulnerability is SMS interception. Malicious actors can exploit SS7 to intercept and read SMS messages sent to a target's phone number. This can lead to privacy breaches and unauthorized access to sensitive information like two-factor authentication codes.

2. Call Interception: Another vulnerability allows attackers to intercept phone calls and listen in on conversations. This is a significant concern for privacy and security.

3. Location Tracking: SS7 can be exploited to track the physical location of a mobile device, potentially enabling stalking or unauthorized surveillance.

4. Call and Message Spoofing: Attackers can use SS7 to spoof phone numbers, making it appear as though calls or messages are coming from a trusted source.

5. Denial of Service (DoS): While less common, SS7 networks can be targeted with DoS attacks, disrupting telecommunications services and causing inconvenience or financial losses.

6. Fraudulent Activities: Criminals can use SS7 attacks to commit fraud, such as bypassing international call charges, making premium-rate calls, or conducting fraudulent financial transactions.

Hackers can transparently forward calls, giving them the ability to record or listen in to them. They can also read SMS messages sent between phones, and track the location of a phone using the same system that the phone networks use to help keep a constant service available and deliver phone calls, texts and data.

The tools to perform this attack is sold on the open market today. The problem with ss7 attack is, while targeting only one phone number, you will end up collecting data from thousands of phone numbers in seconds.

While is fun to play with ss7, make sure you have the permission to perform the exploit if you’re not researching.

The good thing it can be used to perform investigations and help bodies counter terrorism and fraud.


7 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Wait... Think. Again. Sep 2023 #1
But, but, but Otto_Harper Sep 2023 #2
Yeah and Captain Crunch cereal is a real threat too unweird Sep 2023 #3
Pretending to be a security expert by ranting... RainCaster Sep 2023 #4
Likies? TC 1 Sep 2023 #5
the possibility has been there Progressive dog Sep 2023 #6
This has been known since 2014 or so. usonian Sep 2023 #7
Latest Discussions»Help & Search»Computer Help and Support»Vulnerability in iPhones ...»Reply #0