{"id":357,"date":"2023-12-02T05:02:45","date_gmt":"2023-12-02T02:02:45","guid":{"rendered":"https:\/\/sms-txt.net\/?p=357"},"modified":"2024-09-05T12:44:33","modified_gmt":"2024-09-05T09:44:33","slug":"ataques-ss7","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/pt\/ss7-sms\/ataques-ss7\/","title":{"rendered":"Ataques SS7"},"content":{"rendered":"<h1>Ataques SS7<\/h1>\n<p>Como acontece com muitos protocolos antigos, o SS7 foi projetado com pouca seguran\u00e7a em mente. Conceitos como autentica\u00e7\u00e3o e autoriza\u00e7\u00e3o quase n\u00e3o estavam presentes ou eram discutidos. A seguran\u00e7a do SS7 era baseada exclusivamente na confian\u00e7a. Os principais elementos da rede foram criados de acordo com isso, com pouca ou nenhuma defesa contra o abuso das funcionalidades do SS7. Por ser considerada uma rede fechada, muito pouca pesquisa de seguran\u00e7a foi feita para avaliar a seguran\u00e7a do SS7. Os pesquisadores de seguran\u00e7a n\u00e3o tinham acesso \u00e0s redes SS7, e os provedores de servi\u00e7os tinham pouco interesse em analisar o assunto.<\/p>\n<p>Mas a rede SS7 n\u00e3o est\u00e1 mais fechada. Os provedores de rede est\u00e3o abrindo suas redes SS7 para terceiros como parte de suas ofertas comerciais. Os elementos de rede, como as femtocells, est\u00e3o deixando os limites fechados das operadoras e est\u00e3o baseados em locais n\u00e3o confi\u00e1veis; os hackers podem encontrar seus caminhos para as redes das operadoras de telefonia m\u00f3vel, e n\u00e3o \u00e9 preciso mencionar que algumas operadoras podem estar sob o controle de estados-na\u00e7\u00e3o com inten\u00e7\u00f5es maliciosas de abusar dessas redes inseguras.<\/p>\n<p>O abuso das inseguran\u00e7as do SS7 pode ter um efeito grave; a natureza do protocolo permite o acesso a informa\u00e7\u00f5es como localiza\u00e7\u00e3o do usu\u00e1rio e detalhes de chamadas\/SMS. Os servi\u00e7os financeiros e os sistemas de autentica\u00e7\u00e3o foram criados com base na confian\u00e7a dos servi\u00e7os fornecidos por esses protocolos. Os ataques de nega\u00e7\u00e3o de servi\u00e7o que abusam dessas inseguran\u00e7as podem ser devastadores para a infraestrutura de telecomunica\u00e7\u00f5es das na\u00e7\u00f5es.<\/p>\n<p>Nas pr\u00f3ximas se\u00e7\u00f5es, examinaremos alguns dos ataques que foram anunciados contra o SS7, na esperan\u00e7a de analisar os controles ausentes e, por fim, propor alguns controles que possam limitar o efeito desses ataques. Essas se\u00e7\u00f5es se baseiam em grande parte no trabalho realizado pelos pesquisadores de seguran\u00e7a Tobias Engel e Karsten Nohl nas \u00e1reas de intercepta\u00e7\u00e3o de chamadas e SMS, rastreamento de localiza\u00e7\u00e3o, fraude e nega\u00e7\u00e3o de servi\u00e7o.<\/p>\n<h2>Intercepta\u00e7\u00e3o de chamadas e SMS<\/h2>\n<p>A intercepta\u00e7\u00e3o de comunica\u00e7\u00f5es sempre foi o alvo final de qualquer opera\u00e7\u00e3o de espionagem. Nos velhos tempos dos telefones com fio, o invasor precisava grampear fisicamente o fio para poder ouvir uma chamada em andamento.<br \/>\nNa era da comunica\u00e7\u00e3o m\u00f3vel, a chamada \u00e9 transmitida por r\u00e1dio entre as partes chamadoras e as redes m\u00f3veis. Normalmente, o tr\u00e1fego \u00e9 criptografado pela interface a\u00e9rea. A criptografia \u00e9 feita usando os protocolos A5\/1 ou A5\/3. Recentemente, o pacote A5\/1 foi quebrado e \u00e9 poss\u00edvel descriptografar as chamadas transferidas pela interface a\u00e9rea usando interceptadores de r\u00e1dio baratos e tabelas rainbow (Nohl, Munant, 2010). Como um<br \/>\nComo resultado, as operadoras come\u00e7aram a implementar o protocolo de cifragem mais forte A5\/3 para combater esses ataques.<\/p>\n<p>No entanto, as vulnerabilidades do SS7 divulgadas recentemente abriram v\u00e1rios espa\u00e7os que facilitam a intercepta\u00e7\u00e3o de chamadas e SMS transmitidos pela rede m\u00f3vel.<\/p>","protected":false},"excerpt":{"rendered":"<p>Ataques ao SS7 Como acontece com muitos protocolos antigos, o SS7 foi projetado com pouca seguran\u00e7a em mente. Conceitos como autentica\u00e7\u00e3o e autoriza\u00e7\u00e3o quase n\u00e3o estavam presentes ou eram discutidos. A seguran\u00e7a do SS7 era baseada exclusivamente na confian\u00e7a. Os elementos centrais da rede foram criados de acordo com isso, com pouca ou nenhuma defesa contra o abuso das funcionalidades do SS7. Por ser considerado um sistema fechado...<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-357","post","type-post","status-publish","format-standard","hentry","category-ss7-sms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SS7 Attacks<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/pt\/ss7-sms\/ataques-ss7\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SS7 Attacks\" \/>\n<meta property=\"og:description\" content=\"SS7 Attacks As with many legacy protocols, SS7 was designed with little security in mind. Concepts such as authentication and authorization were hardly present or discussed. The SS7 security was solely based on trust. The core network elements were built accordingly with little if any defenses against abusing SS7 functionalities. Being regarded as a closed...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/pt\/ss7-sms\/ataques-ss7\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-02T02:02:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-05T09:44:33+00:00\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"SS7 Attacks\",\"datePublished\":\"2023-12-02T02:02:45+00:00\",\"dateModified\":\"2024-09-05T09:44:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\"},\"wordCount\":447,\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"articleSection\":[\"SS7\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\",\"url\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\",\"name\":\"SS7 Attacks\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/#website\"},\"datePublished\":\"2023-12-02T02:02:45+00:00\",\"dateModified\":\"2024-09-05T09:44:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sms-txt.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SS7 Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sms-txt.net\/#website\",\"url\":\"https:\/\/sms-txt.net\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sms-txt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sms-txt.net\/#organization\",\"name\":\"SS7\",\"url\":\"https:\/\/sms-txt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"contentUrl\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ataques SS7","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/pt\/ss7-sms\/ataques-ss7\/","og_locale":"pt_BR","og_type":"article","og_title":"SS7 Attacks","og_description":"SS7 Attacks As with many legacy protocols, SS7 was designed with little security in mind. Concepts such as authentication and authorization were hardly present or discussed. The SS7 security was solely based on trust. The core network elements were built accordingly with little if any defenses against abusing SS7 functionalities. Being regarded as a closed...","og_url":"https:\/\/sms-txt.net\/pt\/ss7-sms\/ataques-ss7\/","og_site_name":"SS7 Hacking","article_published_time":"2023-12-02T02:02:45+00:00","article_modified_time":"2024-09-05T09:44:33+00:00","author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"SS7 Attacks","datePublished":"2023-12-02T02:02:45+00:00","dateModified":"2024-09-05T09:44:33+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"},"wordCount":447,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"articleSection":["SS7"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/","url":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/","name":"Ataques SS7","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"datePublished":"2023-12-02T02:02:45+00:00","dateModified":"2024-09-05T09:44:33+00:00","breadcrumb":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"SS7 Attacks"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"Hacking de SS7","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/pt\/wp-json\/wp\/v2\/posts\/357","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/pt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/pt\/wp-json\/wp\/v2\/comments?post=357"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/pt\/wp-json\/wp\/v2\/posts\/357\/revisions"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/pt\/wp-json\/wp\/v2\/media?parent=357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/pt\/wp-json\/wp\/v2\/categories?post=357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/pt\/wp-json\/wp\/v2\/tags?post=357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}