<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: After years of warnings, mobile network hackers exploit SS7 flaws to drain bank accounts • The Register</title>
	<atom:link href="http://www.epanorama.net/blog/2017/05/05/after-years-of-warnings-mobile-network-hackers-exploit-ss7-flaws-to-drain-bank-accounts-%e2%80%a2-the-register/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2017/05/05/after-years-of-warnings-mobile-network-hackers-exploit-ss7-flaws-to-drain-bank-accounts-%e2%80%a2-the-register/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Wed, 06 May 2026 11:53:30 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/05/05/after-years-of-warnings-mobile-network-hackers-exploit-ss7-flaws-to-drain-bank-accounts-%e2%80%a2-the-register/comment-page-1/#comment-1546046</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 08 May 2017 10:01:15 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=54856#comment-1546046</guid>
		<description><![CDATA[Hackers are stealing money from Bank accounts in Germany by exploiting flaws in #SS7 protocol
http://securityaffairs.co/wordpress/58735/hacking/ss7-protocol-cyber-heists.html

The company O2-Telefonica in Germany has confirmed to Süddeutsche Zeitung agency that some of its customers suffered cyber heists exploiting the SS7 flaws.]]></description>
		<content:encoded><![CDATA[<p>Hackers are stealing money from Bank accounts in Germany by exploiting flaws in #SS7 protocol<br />
<a href="http://securityaffairs.co/wordpress/58735/hacking/ss7-protocol-cyber-heists.html" rel="nofollow">http://securityaffairs.co/wordpress/58735/hacking/ss7-protocol-cyber-heists.html</a></p>
<p>The company O2-Telefonica in Germany has confirmed to Süddeutsche Zeitung agency that some of its customers suffered cyber heists exploiting the SS7 flaws.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/05/05/after-years-of-warnings-mobile-network-hackers-exploit-ss7-flaws-to-drain-bank-accounts-%e2%80%a2-the-register/comment-page-1/#comment-1545827</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 05 May 2017 11:00:46 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=54856#comment-1545827</guid>
		<description><![CDATA[We Were Warned About Flaws in the Mobile Data Backbone for Years. Now 2FA Is Screwed.
Financially-motivated hackers are using SS7 attacks to break into bank accounts.
https://motherboard.vice.com/en_us/article/we-were-warned-about-flaws-in-the-mobile-data-backbone-for-years-now-2fa-is-screwed

 It has finally happened.

For years, researchers, hackers, and even some politicians have warned about stark vulnerabilities in a mobile data network called SS7. These flaws allow attackers to listen to calls, intercept text messages, and pinpoint a device&#039;s location armed with just the target&#039;s phone number. Taking advantage of these issues has typically been reserved for governments or surveillance contractors.

But on Wednesday, German newspaper The Süddeutsche Zeitung reported that financially-motivated hackers had used those flaws to help drain bank accounts.

This is much bigger than a series of bank accounts though: it cements the fact that the SS7 network poses a threat to all of us, the general public. And it shows that companies and services across the world urgently need to move away from SMS-based authentication to protect customer accounts.

&quot;I&#039;m not surprised that hackers take money that is &#039;lying on the table&#039;. I&#039;m just surprised that online bank thieves took so long in joining spying contractors in abusing the global SS7 network,&quot; Karsten Nohl, a cybersecurity researcher who has highlighted vulnerabilities in SS7, told Motherboard in an email.]]></description>
		<content:encoded><![CDATA[<p>We Were Warned About Flaws in the Mobile Data Backbone for Years. Now 2FA Is Screwed.<br />
Financially-motivated hackers are using SS7 attacks to break into bank accounts.<br />
<a href="https://motherboard.vice.com/en_us/article/we-were-warned-about-flaws-in-the-mobile-data-backbone-for-years-now-2fa-is-screwed" rel="nofollow">https://motherboard.vice.com/en_us/article/we-were-warned-about-flaws-in-the-mobile-data-backbone-for-years-now-2fa-is-screwed</a></p>
<p> It has finally happened.</p>
<p>For years, researchers, hackers, and even some politicians have warned about stark vulnerabilities in a mobile data network called SS7. These flaws allow attackers to listen to calls, intercept text messages, and pinpoint a device&#8217;s location armed with just the target&#8217;s phone number. Taking advantage of these issues has typically been reserved for governments or surveillance contractors.</p>
<p>But on Wednesday, German newspaper The Süddeutsche Zeitung reported that financially-motivated hackers had used those flaws to help drain bank accounts.</p>
<p>This is much bigger than a series of bank accounts though: it cements the fact that the SS7 network poses a threat to all of us, the general public. And it shows that companies and services across the world urgently need to move away from SMS-based authentication to protect customer accounts.</p>
<p>&#8220;I&#8217;m not surprised that hackers take money that is &#8216;lying on the table&#8217;. I&#8217;m just surprised that online bank thieves took so long in joining spying contractors in abusing the global SS7 network,&#8221; Karsten Nohl, a cybersecurity researcher who has highlighted vulnerabilities in SS7, told Motherboard in an email.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/05/05/after-years-of-warnings-mobile-network-hackers-exploit-ss7-flaws-to-drain-bank-accounts-%e2%80%a2-the-register/comment-page-1/#comment-1545766</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 05 May 2017 08:26:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=54856#comment-1545766</guid>
		<description><![CDATA[Signalling System No. 7
https://en.wikipedia.org/wiki/Signalling_System_No._7

Signalling System No. 7 (SS7) is a set of telephony signaling protocols developed in 1975, which is used to set up and tear down most of the world&#039;s public switched telephone network (PSTN) telephone calls. It also performs number translation, local number portability, prepaid billing, Short Message Service (SMS), and other mass market services.

In North America it is often referred to as CCSS7, abbreviated for Common Channel Signalling System 7. In the United Kingdom, it is called C7 (CCITT number 7), number 7 and CCIS7 (Common Channel Interoffice Signaling 7). In Germany, it is often called N7 (Signalisierungssystem Nummer 7).

The only international SS7 protocol is defined by ITU-T&#039;s Q.700-series recommendations in 1988.[1] Of the many national variants of the SS7 protocols, most are based on variants of the international protocol as standardized by ANSI and ETSI. National variants with striking characteristics are the Chinese and Japanese (TTC) national variants.

The Internet Engineering Task Force (IETF) has defined the SIGTRAN protocol suite that implements levels 2, 3, and 4 protocols compatible with SS7. Sometimes also called Pseudo SS7, it is layered on the Stream Control Transmission Protocol (SCTP) transport mechanism.]]></description>
		<content:encoded><![CDATA[<p>Signalling System No. 7<br />
<a href="https://en.wikipedia.org/wiki/Signalling_System_No._7" rel="nofollow">https://en.wikipedia.org/wiki/Signalling_System_No._7</a></p>
<p>Signalling System No. 7 (SS7) is a set of telephony signaling protocols developed in 1975, which is used to set up and tear down most of the world&#8217;s public switched telephone network (PSTN) telephone calls. It also performs number translation, local number portability, prepaid billing, Short Message Service (SMS), and other mass market services.</p>
<p>In North America it is often referred to as CCSS7, abbreviated for Common Channel Signalling System 7. In the United Kingdom, it is called C7 (CCITT number 7), number 7 and CCIS7 (Common Channel Interoffice Signaling 7). In Germany, it is often called N7 (Signalisierungssystem Nummer 7).</p>
<p>The only international SS7 protocol is defined by ITU-T&#8217;s Q.700-series recommendations in 1988.[1] Of the many national variants of the SS7 protocols, most are based on variants of the international protocol as standardized by ANSI and ETSI. National variants with striking characteristics are the Chinese and Japanese (TTC) national variants.</p>
<p>The Internet Engineering Task Force (IETF) has defined the SIGTRAN protocol suite that implements levels 2, 3, and 4 protocols compatible with SS7. Sometimes also called Pseudo SS7, it is layered on the Stream Control Transmission Protocol (SCTP) transport mechanism.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/05/05/after-years-of-warnings-mobile-network-hackers-exploit-ss7-flaws-to-drain-bank-accounts-%e2%80%a2-the-register/comment-page-1/#comment-1545765</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 05 May 2017 08:25:41 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=54856#comment-1545765</guid>
		<description><![CDATA[Hackers Exploit SS7 Flaws to Loot Bank Accounts
http://www.securityweek.com/hackers-exploit-ss7-flaws-loot-bank-accounts

Cybercriminals have exploited vulnerabilities in the SS7 protocol to bypass security mechanisms and steal money from bank accounts. Researchers have warned about the threat for years and these types of attacks have recently become a reality.

SS7, which stands for Signalling System No. 7, is a telephony signaling protocol used by telecommunications providers worldwide. It allows the customers of different networks to communicate with one another and ensures that calls are not interrupted when users are traveling over longer distances.

SS7 was developed back in 1975 and it does not include any protection or authentication, making it easy for third-parties to connect to the SS7 network.

The fact that SS7 has serious weaknesses has been known for years and researchers have often warned that malicious actors could leverage them to locate subscribers, intercept calls and SMS messages, and conduct fraud.

The first case of malicious actors exploiting SS7 flaws to make a profit has now come to light. German newspaper Süddeutsche Zeitung reported on Wednesday that cybercriminals had relied on SS7 attacks to bypass two-factor authentication (2FA) systems and conduct unauthorized wire transfers.]]></description>
		<content:encoded><![CDATA[<p>Hackers Exploit SS7 Flaws to Loot Bank Accounts<br />
<a href="http://www.securityweek.com/hackers-exploit-ss7-flaws-loot-bank-accounts" rel="nofollow">http://www.securityweek.com/hackers-exploit-ss7-flaws-loot-bank-accounts</a></p>
<p>Cybercriminals have exploited vulnerabilities in the SS7 protocol to bypass security mechanisms and steal money from bank accounts. Researchers have warned about the threat for years and these types of attacks have recently become a reality.</p>
<p>SS7, which stands for Signalling System No. 7, is a telephony signaling protocol used by telecommunications providers worldwide. It allows the customers of different networks to communicate with one another and ensures that calls are not interrupted when users are traveling over longer distances.</p>
<p>SS7 was developed back in 1975 and it does not include any protection or authentication, making it easy for third-parties to connect to the SS7 network.</p>
<p>The fact that SS7 has serious weaknesses has been known for years and researchers have often warned that malicious actors could leverage them to locate subscribers, intercept calls and SMS messages, and conduct fraud.</p>
<p>The first case of malicious actors exploiting SS7 flaws to make a profit has now come to light. German newspaper Süddeutsche Zeitung reported on Wednesday that cybercriminals had relied on SS7 attacks to bypass two-factor authentication (2FA) systems and conduct unauthorized wire transfers.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
