GSMK helps operators fix SS7 vulnerability

In a recent case from Germany, O2-Telefonica confirmed that some of its clients were victims to a hacking attack exploiting a well-known security hole in the SS7 networking protocol

The attackers exploited the SS7 weaknesses to bypass a two-factor authentication system put in place by the victims’ banks and re-directed the one-time passwords (mTANs – “mobile transaction authentication numbers”) to numbers controlled by the hackers.

In addition to diverting messages, the SS7 vulnerability also allows for a hacker to record mobile conversations, track subscriber location down to street-level (if the mobile cell towers are close enough), enable or disable incoming and/or outgoing calls/sms or data for a subscriber, and also commit billing fraud.

GSMK offers both initial assessment and a full-fledged solution for operators and service providers

Click here to learn more Click here to learn more

References:
– https://www.theregister.co.uk/2017/05/03/hackers_fire_up_ss7_flaw/
– https://arstechnica.com/security/2017/05/thieves-drain-2fa-protected-bank-accounts-by-abusing-ss7-routing-protocol/

Do you want to know more?

sales@sitec.ae

+971 4 440 5977