Surveillance systems that track the locations of cellphone users and spy on their calls, texts and data streams are being turned against citzens as they roam the country and the world.For some good time and in several articles i have tried to alert the gorvenment and several people about this SS7 vulnerability,SS7 hack or signaling system 7 hack is the process of getting calls or SMS for a subscriber, on another mobile number or in an application. These days many applications use confirmation of user identity using SMS or voice call. If some call and SMS can be routed to another number then it is possible to hack. Ss7 was created in the 1970s as a way for telecommunications carriers to exchange information as they routed calls. Over the years, SS7 expanded to serve a sprawling global cellular system that allowed users to move from network to network — within their own nations and across international borders — without missing calls, losing service or having to make payments to each carrier that routed a signal to their phones.
But as the number of companies with access to SS7 grew from a handful to many thousands, the lack of built-in security became a growing problem. It was easy for anyone with access to the network to pretend to be a carrier making legitimate requests for information about customers.
Early research of SS7 surveillance focused on its use in tracking user locations through cellphones. But in recent years, a more serious issue has emerged around its ability to intercept calls, texts and data.The most advanced SS7 surveillance systems can monitor the movements of dozens of people for hours at a time, sending alerts if they get close to select areas or to one another,this is very dangerous to some vulnerable targeted group of people or individuals.
Very many of us may be ignorant or underrate this SS7 vulnerability but risks posed by SS7 surveillance go beyond privacy to affect national security. American, Chinese, Israeli and Russian intelligence agencies (but I also am sure that a foreign country neighbouring us is using SS7 to track some people it deems are not good to it and this country is too treacherous) are the most active users of SS7 surveillance, and private-sector vendors have put systems within the reach of dozens of other governments worldwide. Sophisticated criminals and private providers of business intelligence also use the surveillance technology.
I started getting interest in this vulnerability way back in 2015 up to now where i documented various international and local phone numbers that tried to intercept 2FA authentication codes of phone numbers aligned to facebook,instagram,twitter accounts of Ugandans.
Very many of us may be ignorant or underrate this SS7 vulnerability but risks posed by SS7 surveillance go beyond privacy to affect national security. American, Chinese, Israeli and Russian intelligence agencies (but I also am sure that a foreign country neighbouring us is using SS7 to track some people it deems are not good to it and this country is too treacherous) are the most active users of SS7 surveillance, and private-sector vendors have put systems within the reach of dozens of other governments worldwide. Sophisticated criminals and private providers of business intelligence also use the surveillance technology.
I started getting interest in this vulnerability way back in 2015 up to now where i documented various international and local phone numbers that tried to intercept 2FA authentication codes of phone numbers aligned to facebook,instagram,twitter accounts of Ugandans.
Read more here
Ss7 vulnerability exposes the network for SMS and voice hack. Along with this, once access to the ss7 network, the real-time location of a person can be obtained.
SS7 is the traditional network that uses standard ISUP and MAP protocol for call and SMS.
SS7 hack is not simple as it looks, people claim to install software and then just enter phone number to hack SMS or calls. Getting calls and SMS via a hack is the process to connect to the ss7 network and run an application so that the home network of an original subscriber gets the impression that software is the roaming VLR/MSC node in a network. The first step is to get the ss7 connection.
Get an SS7 Connection for the hack:
Get SS7 Global Title and Point Code: For an SS7 connection, one should have a Global Title and a point code (international), a local point code (local, between you and mobile operator )can be used, depends on ss7 connection provider. If one is a mobile operator, then get this from the standard GSM body. New network code is assigned by gsm so that you can have a big range of global titles or MSISDNs and IMSIs.
If not a mobile operator, one can take a global title on lease from a mobile operator. Once you have GT, now there are the following options.
SS7 connection via an aggregator: In this, you can connect to an SS7 aggregator and they can publish you GT, on all networks. So any traffic coming to your GT will be forwarded by aggregator towards your node or application. Mostly MVNO does this, they have GT ranges, those are published to an aggregator for connecting mobile network operators globally.
Directly with a Mobile Operator: In this, you will have direct links with mobile operators, each will set routing for your GT, towards the serving node. In this, you need to connect each mobile operator Individually.
SS7 vs Sigtran:
If you are using pure SS7 (E1/T1), then the box with the application should be on the premises of mobile operators. If using SIGTRAN, which is IP based, You can have your box in a data center on the cloud.
Ss7 hack tool or Software:
Once one has an ss7 connection. Now time to develop an ss7 application over GSM MAP signaling. SDK for ss7 provides required ss7 stack and libraries for developing ss7 hack software. Before developing the application first finalize the requirements. If one wants to receive SMS, then the application should be developed to handle protocol messages for SMS. Now the ss7 application will simulate as it is a real device.
Application Registration as a real phone:
The first step is to register the application as a phone registers in the roaming network. This required the IMSI of the sim card, to which the mobile number belongs. Mobile number everyone has but IMSI don’t. So the first step is to get IMSI. Hacking Application sends SRI-SM with the phone number to the HLR, which sends IMSI and roaming information in response. Roaming information includes the county code and area code.
From IMSI the application builds the location update along with other parameters. The open a TCAP dialogue to the SS7 node. The open dialogue needs to fill SCCP called party address and SCCP Calling party address. Called Party address is derived from IMSI and calling party address is the GT of software application.
During Update Location, HLR will respond with ISD or Insert Subscriber Data. The software application needs to acknowledge the ISD to the HLR, else update location procedure will fail and the application will not attach as a phone. One HLR sends update location ACK, which means registration is done.
SS7 Hack for SMS:
Once the application registered with the home network. The global title of ss7 hack software updated on the home HLR as an outcome of update location procedure. When a request for authentication for mobile terminated SMS starts. HLR gets SRI-SM query from the hack application, in the response of SRI-SM, HLR sends have visiting MSC number and IMSI. In our scenario, the MSC number is the GT of application. The sender SMS will send the SMS to the software application using the MSC number. Now its applications responsibility to decode the message and display the message as a user-readable string. Now you have the authentication code you were looking for.
SS7 Hack for Voice:
For voice, after phone registration call flow. The hack software should activate the call forwarding to the new number. While activating call forwarding, the ss7 hack tool can send the type of call forwarding and the mobile number where the hacker wants to receive the call. The call forwarding type can be “Call Forwarding Unconditionally”. This will enable call forwarding all the time. In this case, even the mobile user never comes to know that his call has been hacked. After voice verification, the call forwarding can be removed.
SS7 hack applications examples:
Any application which required user verification from SMS or voice can be hacked by the ss7 network. We will cover the ss7 call flows for WhatsApp and Facebook.
ss7 hack Whatsapp:
Whatsapp is used everywhere. It does the message and file transfer over the IP network. It connects your phone book to the others using phone numbers. So no need to add a contact explicitly. Like in skype, we need to create an account and need to add other skype ids before any communication. But with this app, the phone number is the profile id. While installing WhatsApp it requires user authentication via SMS. If WhatsApp needs to hack, after installation, run the ss7 hack software app and received the authentication message on the hack software app. Enter the code in installed WhatsApp. Now you can have messages on your WhatsApp, while the number belongs to another guy.
ss7 hack Facebook:
Facebook also does authentication via SMS. One can get SMS on an ss7 hack software.
As i have said earlier;it is not the first time that am talking about this SS7 EXPLOIT.over a series of years i documented;took screenshots of various phone numbers that tried to intercept authentication messages of accounts on internet.As proof; i even dropped my whatsapp account in march this year and am still hesitant to join whatsapp because i know some foreighn spies or hackers may be having interest in some group of people or individuals.Last week i noticed over three numbers that tried to intercept my email 2FA codes and solely meant to take over this blog;my facebook messanger etc.I alert all who may be running patriotic blogs ,websites or any internet account ,social media account ;and if you feel you may be a target please strengthen the security of your website or account.
However;the unfortunate part of it is that i discovered that many people or organisations are still using computers or mobile phones with un upgraded operating systems.This is very dangerous for it opens up more vulnerabilities which the enemies can ride on to ease their attacks.
As the gorvenment has done much to regulate this form of cyber attacks; which of recent i can pinpoint the arrest of some individuals behind Simboxing.I call upon the gorvenment to strictly take a survey into the security of telecom companies to make sure innocent citzens do not fall prey to these cyber criminals.
The risk of surveillance of your average user, given the billions of mobile phone users across the globe, is small but those in a place of power or individuals targeted because of various reasons, within organisations or government, could be at risk of targeting, as all that’s required to perform the surveillance is access to the SS7 system and a phone number.
One of the biggest dangers, beyond someone listening to calls and reading text messages, is the interception of two-step verification codes that are often used as a security measure when logging into email accounts or other services sent via text message.
Banks and other secure institutions also use phone calls or text messages to verify a user’s identity, which could be intercepted and therefore led to fraud or malicious attacks.
Given that the vulnerabilities and the possibilities of spying on users relies on systems outside of user control, there is very little you can do to protect yourself beyond not using the services.
For text messages, avoiding SMS and instead using encrypted messaging services such as Apple’s iMessage, Facebook’s WhatsApp or the many others available will allow you to send and receive instant messages without having to go through the SMS network, protecting them from surveillance.
For calls, using a service that carries voice over data rather than through the voice call network will help prevent your calls from being snooped on. Messaging services including WhatsApp permit calls. Silent Circle’s end-to-end encrypted Phone service or the open-source Signal app also allow secure voice communications.
Your location could be being tracked at any stage when you have your mobile phone on. The only way to avoid it is to turn off your phone or turn off its connection to the mobile phone network and rely on Wi-Fi instead.
One of the biggest dangers, beyond someone listening to calls and reading text messages, is the interception of two-step verification codes that are often used as a security measure when logging into email accounts or other services sent via text message.
Banks and other secure institutions also use phone calls or text messages to verify a user’s identity, which could be intercepted and therefore led to fraud or malicious attacks.
Given that the vulnerabilities and the possibilities of spying on users relies on systems outside of user control, there is very little you can do to protect yourself beyond not using the services.
For text messages, avoiding SMS and instead using encrypted messaging services such as Apple’s iMessage, Facebook’s WhatsApp or the many others available will allow you to send and receive instant messages without having to go through the SMS network, protecting them from surveillance.
For calls, using a service that carries voice over data rather than through the voice call network will help prevent your calls from being snooped on. Messaging services including WhatsApp permit calls. Silent Circle’s end-to-end encrypted Phone service or the open-source Signal app also allow secure voice communications.
Your location could be being tracked at any stage when you have your mobile phone on. The only way to avoid it is to turn off your phone or turn off its connection to the mobile phone network and rely on Wi-Fi instead.
Security hygiene. We’re all busy at work, so ensuring that our mobile phones and apps have the latest patches may not be our top priority. But if you’re a heavy user of your phone for business, you must make sure it has the most up-to-date security. Also, antivirus for mobile phones is a myth. Compared to our computers, an antivirus app on mobile phone will often fail to protect against malicious apps. However, one security control you can use for network security is secure VPN or Secure Access Service Edge (SASE) . Such a solution can block traffic to malicious websites or data exfiltration attempts.
2. Application hygiene. Any app on your phone can expose data and be used as a bridge to compromise your device.
Whitelisting and blacklisting applications are now becoming standard practice for IT and security administrators, and you should follow these practices on your own phone as well. For instance, do you really need those five messenger apps? Are you automatically downloading content across social media apps? Do your kids or grandchildren use your phone and download games?
3. Privacy hygiene. I know this will sound like the lecture you got from your parents many years ago, but here goes: Don’t give out personal information, especially your phone number, to strangers. A phone number alone will allow cyber criminals to trace you, physically and electronically, anywhere in the world. And remember that your colleagues, suppliers and customers store your number and other contact details on their phones as well — allowing your number to be easily exfiltrated by any fraudulent app they carelessly install.
The more you use your phone for work reasons, the greater you expand cybersecurity threat vectors into your organization’s applications, databases and data. It’s like opening the door of your factory wide open and handing strangers an access card to your mainframe and robotics equipment. It can only end badly.
THERE IN,THERE BY and THERE OF Niyikiza emmanuel.
FOR God and my country.
You can even read more here
THERE IN,THERE BY and THERE OF Niyikiza emmanuel.
FOR God and my country.
You can even read more here