Categories: Cyber Security News

Surveillance Firm Exploits SS7 Flaw to Track User Locations

Cybersecurity researchers have uncovered a sophisticated new SS7 bypass attack technique that exploits TCAP (Transaction Capabilities Application Part) encoding vulnerabilities to circumvent mobile network security measures.

The attack, detected by Enea’s Threat Intelligence Unit, represents the latest evolution in signaling protocol exploitation and demonstrates how attackers continue to find creative ways around telecommunications security defenses.

The Evolution of SS7 Bypass Attacks

Since 2017, security experts have documented a steady stream of SS7 bypass techniques, with the majority targeting the TCAP layer of the SS7 protocol stack.

Previous attacks have included Global Opcode manipulation (detected in 2019), Extended Application Context exploits (2022), and Long TCAP ID techniques (2022).

Each method aims to bypass the increasing security measures that mobile operators have implemented to protect their SS7 networks.

The TCAP layer has become particularly attractive to attackers due to its complexity and the flexibility inherent in ASN.1 BER (Basic Encoding Rules) encoding.

Unlike other encoding standards such as DER (Direct Encoding Rules), ASN.1 BER allows objects to be encoded in multiple ways, creating opportunities for exploitation.

This flexibility, combined with the layer’s critical role in carrying application data between SS7 nodes, makes it an ideal target for sophisticated bypass attempts.

Technical Breakdown of the TCAP Vulnerability

The newly discovered attack focuses on manipulating the encoding of Information Elements (IEs) within TCAP messages, specifically targeting the IMSI (International Mobile Subscriber Identity) field in ProvideSubscriberInfo (PSI) commands.

In normal encoding, a TCAP IE begins with a sequence like 30 12 80 08, where the tag code is contained within the first octet.

However, attackers have discovered they can use an extended tag technique specified in ITU Q.773, encoding the same information as 30 13 9f 00 08.

This extension mechanism, designed for tag codes higher than 30 decimal, allows the tag to span multiple octets by setting bits A-E of the first octet to 11111.

The attack effectively “hides” the IMSI field from security systems that cannot properly decode the extended tag structure.

The manipulation exploits two key weaknesses: many SS7 software decoding stacks never implemented logic for extended TCAP codes since they’re rarely used in normal operations, and security solutions built on older SS7 stacks tend to be permissive with undecoded fields.

Real-World Impact and Defense Measures

Researchers confirmed this technique has been actively used since Q4 2024 by a surveillance company for location tracking attacks against mobile network subscribers.

The attack successfully bypassed security checks that should have blocked unauthorized PSI requests targeting home network subscribers, allowing attackers to obtain location information that should have been protected.

To combat these evolving threats, security experts recommend blocking all malformed PDU structures and any MAP PDUs where an IMSI is expected but cannot be found within the decoded message.

The discovery has been shared with the GSMA community, and affected operators have been notified to update their defenses against this new bypass technique.

Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant updates

The post Surveillance Firm Exploits SS7 Flaw to Track User Locations appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Sebastian Stan Reveals He Plays “Many Roles” in The Batman: Part II

Sebastian Stan obliquely addressed his casting in The Batman: Part II while promoting his Palme…

15 minutes ago

Idris Elba Says He Was Never in the Race to Play James Bond for New 007 Movie

Idris Elba isn't just taking himself out of the running to play James Bond in…

15 minutes ago

Karmine Corp Crowned Champions of Rocket League Paris Major

Karmine Corp, the French Esports team who’s reached the semifinals in the last two Rocket…

1 hour ago

The Best Deals Today: RX 9070 XT, M5 MacBook Air, LEGO Back to the Future, and More

A new weekend has arrived, and today, you can save big on the M5 MacBook…

2 hours ago

Star Wars: The Mandalorian and Grogu Opened to an Estimated $165 Million at the Box Office

Star Wars: The Mandalorian and Grogu brought in an estimated $165 million at the global…

2 hours ago

Rocket League to Receive First Game Engine Tune Up in 11 Years as Psyonix Teases Unreal Engine 6 Update

Psyonix has announced Rocket League will finally leave Unreal Engine 3 after 11 years with…

2 hours ago

This website uses cookies.