GSMK helps operators fix SS7 vulnerability

In a recent case from Germany, O2-Telefonica confirmed that some of its clients were victims to a hacking attack exploiting a well-known security hole in the SS7 networking protocol

The attackers exploited the SS7 weaknesses to bypass a two-factor authentication system put in place by the victims’ banks and re-directed the one-time passwords (mTANs – “mobile transaction authentication numbers”) to numbers controlled by the hackers.

In addition to diverting messages, the SS7 vulnerability also allows for a hacker to record mobile conversations, track subscriber location down to street-level (if the mobile cell towers are close enough), enable or disable incoming and/or outgoing calls/sms or data for a subscriber, and also commit billing fraud.

GSMK offers both initial assessment and a full-fledged solution for operators and service providers

Click here to learn more Click here to learn more


Do you want to know more?

+971 4 440 5977