Hackers Exploit SS7 and Diameter to Track Mobile Users

A major investigation reveals hackers exploiting SS7 and Diameter protocols to track mobile users globally. This poses serious privacy risks as telecom firewalls are bypassed. Urgent action is needed to protect users.

Threat IntelHIGHUpdated: Published:
Featured image for Hackers Exploit SS7 and Diameter to Track Mobile Users

Original Reporting

CSCyber Security NewsΒ·Abinaya

AI Summary

CyberPings AIΒ·Reviewed by Rohit Rana

🎯Basically, hackers are using old mobile network protocols to secretly track people’s locations.

What Happened

A significant investigation by Citizen Lab has uncovered that sophisticated threat actors are exploiting vulnerabilities in global mobile networks to track users worldwide. By abusing the legacy 3G SS7 and 4G Diameter signaling protocols, these hackers are bypassing telecom firewalls, enabling them to conduct silent, cross-border espionage. The research identified two distinct surveillance threat actors, referred to as STA1 and STA2, who are executing long-running espionage campaigns.

The Threat

These global attacks exploit structural weaknesses in international mobile communications. The older SS7 protocol lacks basic authentication, while the newer Diameter protocol suffers from weak security implementations across the industry. Attackers utilize combined attach procedures, allowing roaming devices to register with both 3G and 4G networks, facilitating seamless protocol pivoting.

Who's Behind It

🏭

STA1

focuses on aggressive network routing manipulation, spoofing legitimate operator hostnames and abusing third-party access points.

πŸ₯

STA2

employs a more invasive strategy, combining network protocol queries with a silent exploit targeting the device itself.

  • STA1 focuses on aggressive network routing manipulation, spoofing legitimate operator hostnames and abusing third-party access points.
  • STA2 employs a more invasive strategy, combining network protocol queries with a silent exploit targeting the device itself.

Tactics & Techniques

STA1: Network Spoofer

STA1 conducts tracking attacks primarily through signaling routing manipulation. They rapidly switch between SS7 and Diameter protocols to exploit vulnerabilities in telecom firewalls. By spoofing network data, they blend malicious requests with legitimate operator traffic, effectively evading detection.

STA2: SIM Exploiter

In contrast, STA2 uses a zero-click binary SMS payload as its primary attack vector. This actor's strategy includes SS7 network probing and malicious SIM Toolkit commands to extract location data directly from the target's device. Their evasion tactics exploit silent, low-priority push messages that do not trigger phone alerts, keeping victims unaware of the surveillance.

Defensive Measures

The ongoing surveillance crisis highlights a major blind spot in the global telecommunications industry. Mobile operators depend on third-party interconnect routing hubs with weak traffic screening. Until the industry abandons legacy peer-to-peer trust models and enforces strict cryptographic authentication, mobile users worldwide will remain vulnerable to unseen tracking. It is crucial for telecom providers to enhance their security measures and for users to be aware of potential tracking risks.

πŸ”’ Pro Insight

πŸ”’ Pro insight: The exploitation of SS7 and Diameter protocols underscores the urgent need for enhanced security measures in mobile networks to prevent unauthorized tracking.

CSCyber Security NewsΒ· Abinaya
Read Original

Related Pings