Ss7 vulnerabilities and attack exposure


All networks contain critical vulnerabilities



Yüklə 5,08 Mb.
Pdf görüntüsü
səhifə2/14
tarix25.01.2023
ölçüsü5,08 Mb.
#99321
1   2   3   4   5   6   7   8   9   ...   14
SS7 Vulnerability 2017 A4.ENG .0003.03

All networks contain critical vulnerabilities
All analyzed networks contain critical vulnerabilities that lead to subscriber services 
disruption� It was possible to intercept a subscriber's conversation or text message 
in almost every network; 78 percent of networks were prone to fraud�
Intruders know about vulnerabilities
PT Telecom Attack Discovery detects real attacks on operator networks� These at-
tacks are mostly aimed at gathering information about subscribers and network 
configuration� However, there are attacks that are likely used for fraud, traffic inter-
ception, and subscriber availability disruption�
Operators are aware of the risks 
Operators take measures to reduce the risk of threat exploitation� They succeed 
in reducing subscriber and network data leakage� In 2017, all analyzed networks 
used SMS Home Routing, and every third network had signaling traffic filtering and 
blocking enabled�
Existing solutions are not sufficient
Despite additional protection measures, all the networks were prone to vulnera-
bilities caused by occasional incorrect setup of equipment or faults in SS7 network 
architecture that cannot be eliminated using existing tools� Only a comprehensive 
approach that combines security analysis, network setup maintenance, regular 
monitoring of signaling traffic, and timely detection of illegitimate activities can 
ensure a higher level of protection against criminals�
If you have any 
questions, do not 
hesitate to contact
us directly� We would 
be glad to assist you: 
info@ptsecurity�com 
SS7 VULNERABILITIES
AND ATTACK EXPOSURE REPORT
4


Figure 1� Workflow: SS7 networks security analysis
HLR
VLR
MSC
GwSTP
PT Telecom Vulnerability Scanner
External SS7 network
VULNERABILITIES IN SS7 NETWORKS
Materials and methods
Every year, Positive Technologies experts analyze the security of SS7 signaling net-
works� During analysis, they simulate the actions of a potential intruder supposedly 
attacking from a foreign or home network� The intruder can send application layer 
protocol requests that lead to the realization of different threats against the opera-
tor and its subscribers if the operator does not take adequate protection measures� 
For malware host emulation, PT Telecom Vulnerability Scanner is used�
We selected 24 most informative projects in 2016 and 2017, during which maximum 
security tests were performed� A comparative study includes data obtained during 
an analysis we performed in 2015� 
Yüklə 5,08 Mb.

Dostları ilə paylaş:
1   2   3   4   5   6   7   8   9   ...   14




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©genderi.org 2024
rəhbərliyinə müraciət

    Ana səhifə