{"id":390,"date":"2024-02-14T08:07:21","date_gmt":"2024-02-14T05:07:21","guid":{"rendered":"https:\/\/sms-txt.net\/?p=390"},"modified":"2024-09-05T12:45:51","modified_gmt":"2024-09-05T09:45:51","slug":"une-version-obsolete-de-ss7-accroit-sa-vulnerabilite","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/fr\/interception-de-sms\/une-version-obsolete-de-ss7-accroit-sa-vulnerabilite\/","title":{"rendered":"Une version obsol\u00e8te de SS7 accro\u00eet sa vuln\u00e9rabilit\u00e9"},"content":{"rendered":"<p>Le piratage informatique est devenu plus courant avec l'invention de nouvelles technologies. L'exemple le plus marquant est l'introduction du <strong>SS7<\/strong> \u00e0 l'\u00e8re des r\u00e9seaux mobiles. L'un des journaux t\u00e9l\u00e9vis\u00e9s a surpris les t\u00e9l\u00e9spectateurs en leur r\u00e9v\u00e9lant des informations sur le piratage.<\/p>\n<p>La s\u00e9quence montre comment les membres du \"Chaos Computer Club\" allemand acc\u00e8dent \u00e0 toutes les informations d'appel de l'utilisateur cibl\u00e9. Ils ont m\u00eame r\u00e9ussi \u00e0 identifier l'emplacement de l'utilisateur lorsque le GPS \u00e9tait d\u00e9sactiv\u00e9. Ted Lieu a men\u00e9 d'autres investigations afin de confirmer ce fait. Il a \u00e9t\u00e9 confirm\u00e9 que le SS7 peut \u00eatre utilis\u00e9 avec succ\u00e8s pour le piratage.<\/p>\n<p>Les membres du CCC ont fait une d\u00e9monstration de piratage avec manipulation du SS7 \u00e0 la t\u00e9l\u00e9vision. La raison de cette d\u00e9monstration \u00e9tait de faire comprendre aux gens que leurs informations sensibles n'\u00e9taient pas s\u00e9curis\u00e9es. Bien que ce protocole n'ait pas \u00e9t\u00e9 invent\u00e9 dans ce but, il peut \u00eatre utilis\u00e9 efficacement pour le piratage. Mais il peut \u00eatre utilis\u00e9 efficacement pour le piratage. Ce protocole est utilis\u00e9 par les plus grandes entreprises de t\u00e9l\u00e9communications du monde. Ils courent tous le risque d'\u00eatre pirat\u00e9s.<\/p>\n<p>Ce protocole a \u00e9t\u00e9 con\u00e7u en 1975. Il a \u00e9t\u00e9 con\u00e7u pour connecter des appareils mobiles afin d'assurer des communications fructueuses. Le r\u00e9seau mobile de chaque personne est bas\u00e9 sur ce protocole. Cela signifie que les informations sensibles contenues dans nos gadgets ne sont pas plus s\u00fbres.<\/p>\n<p>Tous les appels t\u00e9l\u00e9phoniques \u00e0 travers le monde sont contr\u00f4l\u00e9s par ce protocole. Il existe des signaux de contr\u00f4le sp\u00e9ciaux qui contribuent \u00e0 une communication efficace, qu'elle soit sans fil ou c\u00e2bl\u00e9e. Ce protocole apporte une aide majeure \u00e0 la communication entre les personnes. Tous les appels t\u00e9l\u00e9phoniques et les messages textuels sont g\u00e9r\u00e9s par le SS7. Les pirates informatiques peuvent obtenir toutes les informations contenues dans les messages et les appels t\u00e9l\u00e9phoniques.<\/p>\n<p>Le SS7 est \u00e9galement exploit\u00e9 de mani\u00e8re positive. Il est utilis\u00e9 par les agences de renseignement pour mener d'importantes enqu\u00eates. Les banques peuvent l'utiliser pour localiser l'emplacement exact de leurs clients afin d'approuver les frais. De cette mani\u00e8re, les banques \u00e9tablissent des relations de confiance avec leurs clients. Le SS7 offre donc \u00e0 la fois des avantages et des inconv\u00e9nients \u00e0 ses utilisateurs.<\/p>\n<p>Les pirates utilisent largement le \"spoofing\" pour acc\u00e9der aux informations personnelles des utilisateurs de t\u00e9l\u00e9phones. Ils se dirigent d'abord vers le canal de contr\u00f4le des appels t\u00e9l\u00e9phoniques. Une fois qu'ils y ont acc\u00e9d\u00e9, ils peuvent r\u00e9cup\u00e9rer d'autres informations. Tout ce processus se d\u00e9roule \u00e0 l'insu des fournisseurs de services mobiles.<\/p>\n<p>Pour s\u00e9curiser vos conversations, il est pr\u00e9f\u00e9rable d'utiliser des \"applications de cryptage de bout en bout\". L'installation de ces applications permet de s\u00e9curiser vos appels. M\u00eame si un pirate informatique tente de les pirater, la voix ne lui appara\u00eetra pas clairement. Comme dans le cas des cryptages s\u00e9curis\u00e9s, les pirates peuvent les intercepter pour acc\u00e9der aux informations.<\/p>\n<p>Le SS7 est utilis\u00e9 non seulement pour acc\u00e9der aux messages et aux appels t\u00e9l\u00e9phoniques, mais aussi \u00e0 d'autres informations importantes telles que les mots de passe des comptes bancaires. Mais aussi \u00e0 d'autres informations importantes telles que les mots de passe des comptes bancaires. Ils peuvent m\u00eame retirer de l'argent des comptes. M\u00eame les messages des transactions bancaires sont r\u00e9cup\u00e9r\u00e9s par ces criminels.<\/p>\n<p>En r\u00e9sum\u00e9, la communication avec le protocole SS7 n'est pas s\u00e9curis\u00e9e. Il a un impact n\u00e9gatif sur la vie priv\u00e9e des utilisateurs de t\u00e9l\u00e9phones mobiles. On peut esp\u00e9rer que les choses s'am\u00e9liorent dans un avenir proche. Le protocole SS7 a \u00e9t\u00e9 invent\u00e9 pour \u00e9tablir une communication efficace \u00e0 travers le monde. Son principal d\u00e9faut est qu'il n'\u00e9volue pas vers une version actualis\u00e9e.<\/p>","protected":false},"excerpt":{"rendered":"<p>Le piratage est devenu plus courant avec l'invention de nouvelles technologies. L'exemple le plus frappant est l'introduction du protocole SS7 dans l'\u00e8re des r\u00e9seaux mobiles. L'une des s\u00e9quences des journaux t\u00e9l\u00e9vis\u00e9s a surpris les t\u00e9l\u00e9spectateurs en ce qui concerne les informations sur le piratage. La s\u00e9quence montre comment les membres allemands du \"Chaos Computer Club\" ont acc\u00e9d\u00e9 \u00e0 toutes les informations d'appel du...<\/p>","protected":false},"author":1,"featured_media":414,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[69],"tags":[],"class_list":["post-390","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sms-intercept"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Outdated Version Of SS7 Increases its Vulnerability<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/fr\/interception-de-sms\/une-version-obsolete-de-ss7-accroit-sa-vulnerabilite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Outdated Version Of SS7 Increases its Vulnerability\" \/>\n<meta property=\"og:description\" content=\"Hacking became more common with the invention of new technologies. The most prominent example is the introduction of the SS7 protocol in the mobile network era. One of the TV news segments surprised the people about the hacking information. The segment shows how German &#8216;Chaos Computer Club&#8217; members, access all the call information of the...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/fr\/interception-de-sms\/une-version-obsolete-de-ss7-accroit-sa-vulnerabilite\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-14T05:07:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-05T09:45:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7-callintercept.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"761\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/outdated-version-of-ss7-increases-its-vulnerability\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/outdated-version-of-ss7-increases-its-vulnerability\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"Outdated Version Of SS7 Increases its Vulnerability\",\"datePublished\":\"2024-02-14T05:07:21+00:00\",\"dateModified\":\"2024-09-05T09:45:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/outdated-version-of-ss7-increases-its-vulnerability\/\"},\"wordCount\":516,\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/outdated-version-of-ss7-increases-its-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7-callintercept.jpg\",\"articleSection\":[\"SMS Intercept\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/outdated-version-of-ss7-increases-its-vulnerability\/\",\"url\":\"https:\/\/sms-txt.net\/sms-intercept\/outdated-version-of-ss7-increases-its-vulnerability\/\",\"name\":\"Outdated Version Of SS7 Increases its Vulnerability\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/outdated-version-of-ss7-increases-its-vulnerability\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/outdated-version-of-ss7-increases-its-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7-callintercept.jpg\",\"datePublished\":\"2024-02-14T05:07:21+00:00\",\"dateModified\":\"2024-09-05T09:45:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/outdated-version-of-ss7-increases-its-vulnerability\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sms-txt.net\/sms-intercept\/outdated-version-of-ss7-increases-its-vulnerability\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/outdated-version-of-ss7-increases-its-vulnerability\/#primaryimage\",\"url\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7-callintercept.jpg\",\"contentUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7-callintercept.jpg\",\"width\":2000,\"height\":761,\"caption\":\"ss7 intercept\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sms-txt.net\/sms-intercept\/outdated-version-of-ss7-increases-its-vulnerability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sms-txt.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Outdated Version Of SS7 Increases its Vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sms-txt.net\/#website\",\"url\":\"https:\/\/sms-txt.net\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sms-txt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sms-txt.net\/#organization\",\"name\":\"SS7\",\"url\":\"https:\/\/sms-txt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"contentUrl\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Une version obsol\u00e8te de SS7 accro\u00eet sa vuln\u00e9rabilit\u00e9","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/fr\/interception-de-sms\/une-version-obsolete-de-ss7-accroit-sa-vulnerabilite\/","og_locale":"fr_FR","og_type":"article","og_title":"Outdated Version Of SS7 Increases its Vulnerability","og_description":"Hacking became more common with the invention of new technologies. The most prominent example is the introduction of the SS7 protocol in the mobile network era. One of the TV news segments surprised the people about the hacking information. The segment shows how German &#8216;Chaos Computer Club&#8217; members, access all the call information of the...","og_url":"https:\/\/sms-txt.net\/fr\/interception-de-sms\/une-version-obsolete-de-ss7-accroit-sa-vulnerabilite\/","og_site_name":"SS7 Hacking","article_published_time":"2024-02-14T05:07:21+00:00","article_modified_time":"2024-09-05T09:45:51+00:00","og_image":[{"width":2000,"height":761,"url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7-callintercept.jpg","type":"image\/jpeg"}],"author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/sms-intercept\/outdated-version-of-ss7-increases-its-vulnerability\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/outdated-version-of-ss7-increases-its-vulnerability\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"Outdated Version Of SS7 Increases its Vulnerability","datePublished":"2024-02-14T05:07:21+00:00","dateModified":"2024-09-05T09:45:51+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/outdated-version-of-ss7-increases-its-vulnerability\/"},"wordCount":516,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"image":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/outdated-version-of-ss7-increases-its-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7-callintercept.jpg","articleSection":["SMS Intercept"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/sms-intercept\/outdated-version-of-ss7-increases-its-vulnerability\/","url":"https:\/\/sms-txt.net\/sms-intercept\/outdated-version-of-ss7-increases-its-vulnerability\/","name":"Une version obsol\u00e8te de SS7 accro\u00eet sa vuln\u00e9rabilit\u00e9","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/outdated-version-of-ss7-increases-its-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/outdated-version-of-ss7-increases-its-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7-callintercept.jpg","datePublished":"2024-02-14T05:07:21+00:00","dateModified":"2024-09-05T09:45:51+00:00","breadcrumb":{"@id":"https:\/\/sms-txt.net\/sms-intercept\/outdated-version-of-ss7-increases-its-vulnerability\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/sms-intercept\/outdated-version-of-ss7-increases-its-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/sms-txt.net\/sms-intercept\/outdated-version-of-ss7-increases-its-vulnerability\/#primaryimage","url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7-callintercept.jpg","contentUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7-callintercept.jpg","width":2000,"height":761,"caption":"ss7 intercept"},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/sms-intercept\/outdated-version-of-ss7-increases-its-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"Outdated Version Of SS7 Increases its Vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"Piratage du SS7","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/posts\/390","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/comments?post=390"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/posts\/390\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/media\/414"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/media?parent=390"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/categories?post=390"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/fr\/wp-json\/wp\/v2\/tags?post=390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}