Rakesh Puri
5 min readJan 12, 2023

Uncovering the Vulnerabilities of SS7: Understanding the Risks and Mitigation Strategies for the Signaling System 7 Attack

Photo by Atik sulianami on Unsplash

The Signaling System 7 (SS7) is a set of protocols used by telecommunications companies to route calls and texts between different networks. It is a crucial component of the global phone system, allowing phone companies to route calls and texts to the correct destination. However, the SS7 network has a significant vulnerability: it is relatively easy for attackers to intercept and redirect calls and texts. This is known as an SS7 attack.

An SS7 attack can be used for a variety of malicious purposes, such as intercepting phone calls and text messages, tracking a person’s location, and even emptying a bank account by redirecting text messages containing one-time passcodes. The ease of launching an SS7 attack and the potential for serious consequences has made it a major concern for security experts and government agencies around the world.

One of the main reasons SS7 is vulnerable to attack is its age. The protocol was developed in the 1970s and 1980s, long before the advent of modern cybersecurity threats. As a result, the SS7 network lacks the built-in security measures that would be standard in a modern communication system. Additionally, SS7 is a global system, with hundreds of different operators in different countries, all using the same protocol. This makes it difficult to coordinate security efforts and patch vulnerabilities.

Another reason SS7 is vulnerable to attack is the way it is implemented. SS7 is a signaling system, which means it is used to set up and control phone calls and text messages, but it is not used to carry the actual audio or text data. As a result, SS7 messages are not encrypted and can be intercepted and read by anyone with access to the network. Additionally, SS7 does not authenticate the identity of the sender, so it is easy for an attacker to send malicious messages that appear to come from a legitimate source.

The most common type of SS7 attack is known as an “Interception Attack” this attack allows attackers to intercept and listen to phone calls or read text messages by redirecting them through an attacker-controlled server. This can be done by simply sending a few specially crafted messages to the target phone. Once an attacker has intercepted a call or text, they can use that information for a variety of malicious purposes, such as selling the information to a third party or using it to impersonate the victim.

Another type of SS7 attack is called a “Location Tracking Attack,” which allows an attacker to track a person’s location by redirecting text messages containing location data. This can be done by intercepting text messages sent by a phone’s GPS system and redirecting them to an attacker-controlled server. With this information, an attacker could track the victim’s movements in real-time, even if they are not making a call or sending a text.

An SS7 attack is not just a theoretical threat; it has been used in the wild by nation-state actors and cybercriminals. In 2017, German researchers were able to intercept and redirect phone calls and texts on the SS7 network in several countries, including the United States, showing that the vulnerability is not limited to a specific geographic region. In 2018, security researchers at Positive Technologies reported that they had discovered SS7 vulnerabilities at several major mobile operators and that it was easy for an attacker to exploit those vulnerabilities to intercept and redirect calls and text messages.

Given the severity of the threats, the industry and governments have taken steps to try to mitigate them. The mobile network operators have been encouraged to take measures to secure their networks by implementing firewalls, intrusion detection systems, and monitoring systems to detect and respond to SS7-based threats. Additionally, the Global System for Mobile Communications Association (GSMA) is developing an SS7 security program to help network.

One real-world example of an SS7 attack occurred in 2016, when the international cybercrime group known as the “Italian Job” was found to be using SS7 vulnerabilities to intercept and redirect two-factor authentication texts. This allowed the group to intercept one-time passcodes sent via text message and use them to gain access to victims’ online bank accounts.

The group was able to do this by gaining access to the SS7 network and sending messages to the victim’s mobile phone provider that appeared to be from the victim’s own phone. The messages instructed the provider to redirect incoming text messages containing one-time passcodes to a phone controlled by the attacker.

This type of SS7 attack, known as “Smishing Attack” is particularly dangerous because it allows an attacker to bypass two-factor authentication and gain access to sensitive information such as bank account details and personal data. The fact that the attackers were able to infiltrate the SS7 network highlights just how vulnerable the system is to attacks from cybercriminals.

In conclusion, this article has highlighted the significant vulnerabilities of the Signaling System 7 (SS7) network, which is a critical component of the global phone system. SS7 attacks can have serious consequences, such as intercepting phone calls and text messages, tracking a person’s location, and even emptying a bank account. The vulnerabilities of SS7 arise from its age, global implementation, and lack of built-in security measures. Efforts are being made by industry and governments to mitigate these risks and improve the security of the SS7 network. It’s important to be aware of the potential dangers of SS7 and to take steps to protect ourselves and our sensitive information.

Thank you for taking the time to read this article, it is greatly appreciated. The aim of this article was to give you a deeper understanding of the vulnerabilities and risks associated with the Signaling System 7 (SS7) network. Through research and compilation of various sources, including Google, the article provides insights into the various attack types, their consequences and the measures that are being taken to mitigate the risks. I hope that you found the information provided in this article useful and it helped in expanding your knowledge on SS7 vulnerabilities and the mitigation strategies.

Rakesh Puri

Computing Security grad student at Rochester Institute of Tech. Proficient in identifying vulnerabilities & implementing effective measures for protection.