SS7 Flaws Exploited in Attacks Against Mobile Users' Bank AccountsCyberthieves exploited long-known vulnerabilities in the Signaling System 7 (SS7) protocol, attacking bank accounts in Germany by intercepting two-factor authentication codes sent to mobile phones.
Cyberthieves exploited long-known vulnerabilities in the Signaling System 7 (SS7) protocol, wiping out bank accounts in Germany after intercepting the two-factor authentication codes sent to mobile phones for online banking customers, according to a report in The Register.
The SS7 vulnerabilities, demonstrated by researchers back in 2014, could allow hackers to read or redirect text messages, listen to phone calls, and track the phone's location.
In this particular case, cybercriminals loaded malware onto victims' computers that allowed them to glean bank account logins and passwords, view account balances, and capture mobile phone numbers, according to the report. Access to an unscrupulous telecommunications provider was then purchased and the victims' mobile phone number was redirected to another phone that the cyberthieves controlled.
The attackers, according to the report, tended to access the victims' online bank accounts late at night. They intercepted the two-factor authentication codes and completed the money transfer transaction.
The Diameter protocol, the upcoming SS7 replacement for 5G networks, is apparently not any safer. It also has vulnerabilities, as well, notes the Federal Communications Commission's Legacy Systems Risk Reductions final report, produced by its Communications, Security, Reliability and Interoperability Council.
Read more about the SS7 exploit here.
Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio