{"id":918,"date":"2022-06-30T09:34:56","date_gmt":"2022-06-30T09:34:56","guid":{"rendered":"https:\/\/test.thesmsworks.co.uk\/blog\/?p=918"},"modified":"2022-10-13T09:47:31","modified_gmt":"2022-10-13T09:47:31","slug":"ss7","status":"publish","type":"post","link":"https:\/\/thesmsworks.co.uk\/blog\/ss7\/","title":{"rendered":"What is SS7?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"918\" class=\"elementor elementor-918\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-11f75c04 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"11f75c04\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5e5a38e6\" data-id=\"5e5a38e6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-448ed4cf elementor-widget elementor-widget-text-editor\" data-id=\"448ed4cf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<h1 class=\"wp-block-heading\">What is the SS7 protocol?<\/h1>\n\n<p>SS7 stands for\u00a0<strong>Signalling System Number 7<\/strong>.<\/p>\n\n<p>SS7 is a set of protocols that mobile phone networks use to exchange data for processing voice calls and text messages.<\/p>\n\n<p>It is also used to ensure that the customer is billed the correct amount according to their specific tariff.<\/p>\n\n<p>SS7 allows users on a network in their home country to roam on another network when visiting a foreign country.<\/p>\n\n<p>Although it was used in the US since the mid-70s, SS7 became the international standard in 1998 and the latest version was released as long ago as the early 90s. It\u2019s still the same standard that mobile phone networks use today.<\/p>\n\n<h2 class=\"wp-block-heading\"><strong>SS7 vulnerable to attack<\/strong><\/h2>\n\n<p>SS7 has come under intense criticism as it remains vulnerable to attacks by fraudsters and criminal gangs.<\/p>\n\n<p>This security weakness potentially allows hackers to listen to voice calls and read text messages, including accessing\u00a0<strong><a href=\"https:\/\/thesmsworks.co.uk\/SMS-OTP\">SMS OPTP\u00a0codes<\/a><\/strong>.<\/p>\n\n<p>The flaw which could allow security forces to snoop on conversations and texts could also provide access to location data and the ability to forward and record voice calls.<\/p>\n\n<h2 class=\"wp-block-heading\"><strong>How do cyber criminals hack SS7?<\/strong><\/h2>\n\n<figure class=\"wp-block-image size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-155\" src=\"http:\/\/test.thesmsworks.co.uk\/blog\/wp-content\/uploads\/2022\/06\/SS7-security-flaws.jpg\" alt=\"Person using phone and laptop to investigate SS7 security flaws\" width=\"685\" height=\"456\" srcset=\"https:\/\/thesmsworks.wpenginepowered.com\/wp-content\/uploads\/2022\/06\/SS7-security-flaws.jpg 500w, https:\/\/thesmsworks.wpenginepowered.com\/wp-content\/uploads\/2022\/06\/SS7-security-flaws-300x200.jpg 300w\" sizes=\"(max-width: 685px) 100vw, 685px\" \/>\n<figcaption>If hackers can access your phone, they can use SMS security code information to potentially gain access to your bank account.<\/figcaption>\n<\/figure>\n\n<p>The tools needed to hack SS7 are alarmingly simple and easy to access.<\/p>\n\n<p>To successfully hack SS7, criminals would need a computer running Linux and a free to download copy of the\u00a0<strong><a href=\"https:\/\/open-ss7.soft112.com\/\">SS7 SDK.<\/a><\/strong>\u00a0<\/p>\n\n<p>That\u2019s it.<\/p>\n\n<p>Armed with these simple tools hackers can exploit SS7 by convincing mobile networks that they are a network subscriber and intercept voice and data.<\/p>\n\n<p>With access to text messages, bank security and other\u00a0<strong><a href=\"https:\/\/thesmsworks.co.uk\/guide-2fa-sms\">2fa codes<\/a>\u00a0(2 factor authentication)<\/strong>\u00a0can be intercepted which can be used to access victims\u2019 bank accounts.<\/p>\n\n<h2 class=\"wp-block-heading\"><strong>What are the risks of my phone being hacked?<\/strong><\/h2>\n\n<p>The risk of your phone being hacked is very small indeed. There are billions of phones worldwide and the chances of you being targeted are tiny.<\/p>\n\n<p>Even if your phone was targeted, it\u2019s extremely unlikely that the data could be used to access your bank account or other valuable details.<\/p>\n\n<p>Criminals are likely to attempt to hack high profile or wealthy individuals where the potential gains of a successful hack are greatest.<\/p>\n<p><a href=\"https:\/\/www.certosoftware.com\/is-someone-listening-to-your-phone-calls\/\"><strong>Phone call eavesdropping<\/strong><\/a> is still possible with intrusive spyware, malware. If you suspect someone is listening in on your phone calls, track your data usage, battery life, and performance for sudden changes.<\/p>\n<p>During a phone call, listen for recurring or unusual crackling noises, brief bursts of static, or clicks on the line, as they could indicate you\u2019re being monitored or recorded.<\/p>\n\n<h2 class=\"wp-block-heading\"><strong>Is the SS7 weakness going to be fixed?<\/strong><\/h2>\n\n<p>Since the weaknesses in ss7 security were highlighted, mobile phone networks and The GSMA have set up monitoring services to try and detect unusual activity that might predict hacking attempts.<\/p>\n\n<p>Contractors have also been deployed to help in the battle against ss7 hacking. The contractors being used include security expert\u00a0<strong><a href=\"https:\/\/en.wikipedia.org\/wiki\/Karsten_Nohl\">Karsten Noh<\/a><\/strong>\u00a0who originally discovered and exposed the whole issue in 2014.<\/p>\n\n<p>Fixing the issue would be technically and logistically very challenging, so networks are choosing to focus on customer education.\u00a0<\/p>\n\n<p>The onus, it seems, is on the consumer to pay more attention to how they are using their phone, rather than the networks to fix a service that is not currently fit for purpose.<\/p>\n\n<p><strong>Related articles<\/strong><\/p>\n\n<p><strong><a href=\"https:\/\/thesmsworks.co.uk\/is-sms-encrypted\">Is SMS encrypted?<\/a>\u00a0<\/strong>Is SMS safe to use? Can it be hacked? What are the risks?<\/p>\n\n<p><strong><a href=\"https:\/\/thesmsworks.co.uk\/guide-2fa-sms\">A guide to 2fa SMS (two-factor authentication)<\/a>\u00a0<\/strong>Most companies use 2fa, this guide explains all.<\/p>\n\n<p><strong><a href=\"https:\/\/thesmsworks.co.uk\/SMS-OTP\">SMS OTP &#8211; A guide for 2022<\/a>\u00a0&#8211;\u00a0<\/strong>One time passwords by text &#8211; here&#8217;s all you need to know<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>What is the SS7 protocol? SS7 stands for\u00a0Signalling System Number 7. SS7 is a set of protocols that mobile phone [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":156,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[1],"tags":[],"class_list":["post-918","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/thesmsworks.co.uk\/blog\/wp-json\/wp\/v2\/posts\/918","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thesmsworks.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thesmsworks.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thesmsworks.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thesmsworks.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=918"}],"version-history":[{"count":0,"href":"https:\/\/thesmsworks.co.uk\/blog\/wp-json\/wp\/v2\/posts\/918\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thesmsworks.co.uk\/blog\/wp-json\/wp\/v2\/media\/156"}],"wp:attachment":[{"href":"https:\/\/thesmsworks.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=918"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thesmsworks.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=918"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thesmsworks.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=918"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}