{"id":385,"date":"2024-02-05T18:45:11","date_gmt":"2024-02-05T15:45:11","guid":{"rendered":"https:\/\/sms-txt.net\/?p=385"},"modified":"2024-09-05T12:45:33","modified_gmt":"2024-09-05T09:45:33","slug":"kuidas-ss7-protokolli-kasutatakse-hakkimisel","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/et\/sms-i-pealtkuulamine\/kuidas-ss7-protokolli-kasutatakse-hakkimisel\/","title":{"rendered":"Kuidas SS7 protokolli kasutatakse h\u00e4kkimisel?"},"content":{"rendered":"<p>H\u00e4kkerid kuritarvitavad <strong>SS7<\/strong> k\u00fcberr\u00fcnnakute protokoll. Saksamaal kasutavad h\u00e4kkerid sagedamini pahavara r\u00fcnnakuid, nagu on teada erinevatest uudisartiklitest. H\u00e4kkerid kasutavad nende k\u00fcberr\u00fcnnakutega \u00e4ra pangakontode, paroolide, kontoj\u00e4\u00e4kide ja sisselogimiste andmeid.<\/p>\n<p>Peale selle said nad v\u00f5imelised \u00fcmber suunama panga s\u00f5numite hoiatusi tehingu \u00fcksikasjade saamiseks uusimate h\u00e4kkimistehnikate abil. Nad on edukalt tehinguid raha sihtkontodelt.<\/p>\n<h2>Mis on SS7?<\/h2>\n<p>SS7 v\u00f5eti kasutusele 1975. aastal mobiiltelefonide \u00fchendamiseks. <a href=\"https:\/\/yellow-jaguar-454368.hostingersite.com\/ss7-attacks\/\">SS7<\/a> tegeleb k\u00f5nedega ja s\u00f5numitega \u00fchelt mobiiltelefonilt teisele. See on m\u00f5eldud kasutamiseks ainult mobiilsidev\u00f5rkudes. Kuid hiljem hakkab oluliselt esile kerkima suur hulk probleeme haavatavuse kohta. Selle haavatavuse kinnitamiseks plaanis CBS news'i uudistetoimetaja seda uurida.<\/p>\n<p>Daam ostis k\u00f5igepealt uue telefoni ja andis selle \u00fchele \"IT-kontrollikomisjoni\" liikmele, Lieu kasutas telefoni oma tavap\u00e4raseks suhtlemiseks komisjoni liikmetega. Daam suutis turvalisuse uurimislabori abiga j\u00e4lgida Lieu telefonik\u00f5nesid. Seega kinnitas ta SS7-protokolli \u00e4rakasutamist k\u00f5nede h\u00e4kkimiseks. Lisaks sellele leiti ka tema asukoht, kuigi tema GPS oli v\u00e4lja l\u00fclitatud.<\/p>\n<h2>Mida v\u00f5ivad h\u00e4kkerid teha SS7-le juurdep\u00e4\u00e4su v\u00f5imaldades?<\/h2>\n<p>Kuna pahavara r\u00fcnnakud s\u00f5ltuvad operatsioonis\u00fcsteemide tugevusest. Seega on n\u00f5rkade operatsioonis\u00fcsteemidega mobiilseadmed k\u00fcberr\u00fcnnakutele altimad. N\u00e4iteks BlackBerry, Androidid ja Windows Mobile'id. See t\u00e4hendab, et mobiiltelefonide kvaliteet s\u00f5ltub turvalisuse m\u00f5ttes ka operatsioonis\u00fcsteemide tugevusest. SS7 protokoll on olemas k\u00f5igis mobiiltelefonides alates madalast kvaliteedist kuni k\u00f5rge kvaliteedini.<\/p>\n<h2>Kuidas ma saan end kaitsta SS7 kaudu toimuva nuhkimise eest?<\/h2>\n<p>On olemas lihtne ja kerge viis, kuidas kaitsta oma mobiiltelefoni k\u00fcberr\u00fcnnakute eest. Parim viis selle saavutamiseks on v\u00e4ltida teenuste kasutamist. Seda pakub mobiilioperaator. Kasutage m\u00f5nda internetih\u00e4\u00e4lingurakendust. Nende rakenduste hulka kuuluvad WhatsApp, Instagram jne. Kuid ka neid ohustab SS7-i haavatavus. On olemas suur hulk muid v\u00f5imalusi, mis v\u00f5ivad teid nende k\u00fcberr\u00fcnnakute eest kaitsta.<\/p>","protected":false},"excerpt":{"rendered":"<p>H\u00e4kkerid kasutavad SS7-protokolli k\u00fcberr\u00fcnnakuteks. Saksamaal kasutavad h\u00e4kkerid sagedamini pahavarar\u00fcnnakuid, nagu on selgunud erinevatest uudisartiklitest. H\u00e4kkerid kasutavad nende k\u00fcberr\u00fcnnakutega \u00e4ra pangakontode, paroolide, kontoj\u00e4\u00e4kide ja sisselogimiste andmeid. Lisaks said nad v\u00f5imelised \u00fcmber suunama panga s\u00f5numi hoiatusi tehingu...<\/p>","protected":false},"author":1,"featured_media":386,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[69],"tags":[],"class_list":["post-385","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sms-intercept"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How SS7 Protocol is Used in Hacking?<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/et\/sms-i-pealtkuulamine\/kuidas-ss7-protokolli-kasutatakse-hakkimisel\/\" \/>\n<meta property=\"og:locale\" content=\"et_EE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How SS7 Protocol is Used in Hacking?\" \/>\n<meta property=\"og:description\" content=\"Hackers are misusing the SS7 protocol for cyber attacks. Malware attacks are more frequently used by hackers in Germany, as has been informed by the various news articles. Hackers are exploiting the bank accounts, passwords, account balance, and logins information by these cyber-attacks. Moreover, they became able to redirect the bank message alerts for transaction...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/et\/sms-i-pealtkuulamine\/kuidas-ss7-protokolli-kasutatakse-hakkimisel\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-05T15:45:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-05T09:45:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/smsintercept.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"761\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"How SS7 Protocol is Used in Hacking?\",\"datePublished\":\"2024-02-05T15:45:11+00:00\",\"dateModified\":\"2024-09-05T09:45:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/\"},\"wordCount\":368,\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/smsintercept.jpg\",\"articleSection\":[\"SMS Intercept\"],\"inLanguage\":\"et\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/\",\"url\":\"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/\",\"name\":\"How SS7 Protocol is Used in Hacking?\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/smsintercept.jpg\",\"datePublished\":\"2024-02-05T15:45:11+00:00\",\"dateModified\":\"2024-09-05T09:45:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/#breadcrumb\"},\"inLanguage\":\"et\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"et\",\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/#primaryimage\",\"url\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/smsintercept.jpg\",\"contentUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/smsintercept.jpg\",\"width\":2000,\"height\":761,\"caption\":\"ss7\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sms-txt.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How SS7 Protocol is Used in Hacking?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sms-txt.net\/#website\",\"url\":\"https:\/\/sms-txt.net\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sms-txt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"et\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sms-txt.net\/#organization\",\"name\":\"SS7\",\"url\":\"https:\/\/sms-txt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"et\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"contentUrl\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Kuidas SS7 protokolli kasutatakse h\u00e4kkimisel?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/et\/sms-i-pealtkuulamine\/kuidas-ss7-protokolli-kasutatakse-hakkimisel\/","og_locale":"et_EE","og_type":"article","og_title":"How SS7 Protocol is Used in Hacking?","og_description":"Hackers are misusing the SS7 protocol for cyber attacks. Malware attacks are more frequently used by hackers in Germany, as has been informed by the various news articles. Hackers are exploiting the bank accounts, passwords, account balance, and logins information by these cyber-attacks. Moreover, they became able to redirect the bank message alerts for transaction...","og_url":"https:\/\/sms-txt.net\/et\/sms-i-pealtkuulamine\/kuidas-ss7-protokolli-kasutatakse-hakkimisel\/","og_site_name":"SS7 Hacking","article_published_time":"2024-02-05T15:45:11+00:00","article_modified_time":"2024-09-05T09:45:33+00:00","og_image":[{"width":2000,"height":761,"url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/smsintercept.jpg","type":"image\/jpeg"}],"author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"How SS7 Protocol is Used in Hacking?","datePublished":"2024-02-05T15:45:11+00:00","dateModified":"2024-09-05T09:45:33+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/"},"wordCount":368,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"image":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/smsintercept.jpg","articleSection":["SMS Intercept"],"inLanguage":"et"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/","url":"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/","name":"Kuidas SS7 protokolli kasutatakse h\u00e4kkimisel?","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/#primaryimage"},"image":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/smsintercept.jpg","datePublished":"2024-02-05T15:45:11+00:00","dateModified":"2024-09-05T09:45:33+00:00","breadcrumb":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/#breadcrumb"},"inLanguage":"et","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/"]}]},{"@type":"ImageObject","inLanguage":"et","@id":"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/#primaryimage","url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/smsintercept.jpg","contentUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/smsintercept.jpg","width":2000,"height":761,"caption":"ss7"},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/sms-intercept\/how-ss7-protocol-is-used-in-hacking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"How SS7 Protocol is Used in Hacking?"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"SS7 h\u00e4kkimine","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"et"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"et","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/et\/wp-json\/wp\/v2\/posts\/385","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/et\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/et\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/et\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/et\/wp-json\/wp\/v2\/comments?post=385"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/et\/wp-json\/wp\/v2\/posts\/385\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/et\/wp-json\/wp\/v2\/media\/386"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/et\/wp-json\/wp\/v2\/media?parent=385"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/et\/wp-json\/wp\/v2\/categories?post=385"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/et\/wp-json\/wp\/v2\/tags?post=385"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}