{"id":457,"date":"2024-04-28T07:21:28","date_gmt":"2024-04-28T04:21:28","guid":{"rendered":"https:\/\/sms-txt.net\/?p=457"},"modified":"2024-09-05T12:46:56","modified_gmt":"2024-09-05T09:46:56","slug":"exemplo-de-ataque-do-ss7","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/pt\/ss7-sms\/exemplo-de-ataque-do-ss7\/","title":{"rendered":"Exemplo de ataque de SS7"},"content":{"rendered":"<p>Os ataques direcionados \u00e0 nega\u00e7\u00e3o de servi\u00e7o talvez n\u00e3o tenham se mostrado diferentes, com apenas 7,8 por cento desse tipo de ataque se tornando poderoso no momento. At\u00e9 mesmo o sistema InsertSubscriberData foi utilizado, no entanto, 99% das mensagens permaneceram c\u00edclicas, ou seja, foram descartadas da rede da operadora. Os visitantes e a filtragem tiveram um impacto consider\u00e1vel no resultado, pois a propor\u00e7\u00e3o de solicita\u00e7\u00f5es dessas redes foi algumas vezes menor do que no restante, mas era imposs\u00edvel permanecer protegido contra ataques. A nega\u00e7\u00e3o de servi\u00e7o seria agora uma amea\u00e7a para os dispositivos de IoT. Agora, n\u00e3o s\u00e3o apenas os dispositivos dos consumidores que est\u00e3o conectados \u00e0s redes de comunica\u00e7\u00e3o, mas tamb\u00e9m os componentes da infraestrutura da cidade, as empresas atuais, a energia, o transporte e outras empresas.<\/p>\n<p>Como j\u00e1 dissemos, um invasor pode executar um ataque \u00e0 acessibilidade do assinante de forma que a comunica\u00e7\u00e3o n\u00e3o possa ser revivida sem nem mesmo entrar em contato com o suporte, enquanto o tempo normalmente ultrapassa tr\u00eas horas.<\/p>\n<p>&nbsp;<\/p>\n<h1>Exemplo de ataque SS7:<\/h1>\n<p>&nbsp;<\/p>\n<p>Conforme mencionado anteriormente, executar apenas a\u00e7\u00f5es de seguran\u00e7a sem sequer empregar uma forma de seguran\u00e7a \u00e9 insuficiente para neutralizar todos os ataques que exploram vulnerabilidades, e os fatores por tr\u00e1s disso est\u00e3o na arquitetura das redes SS7. Vamos examinar um caso. O ataque se transformou em uma s\u00e9rie de etapas que o procedimento de detec\u00e7\u00e3o de ataques conseguiu unir em uma s\u00e9rie plaus\u00edvel, embora as t\u00e9cnicas de seguran\u00e7a n\u00e3o tenham conseguido compreender as ordens. Para come\u00e7ar, os atacantes fizeram um esfor\u00e7o pr\u00f3spero para encontrar o IMSI de um assinante. Tendo obtido as informa\u00e7\u00f5es para realizar as atividades, eles se esfor\u00e7aram para encontrar o assinante. Esse ponto do ataque entrou em colapso. Os atacantes enviaram uma peti\u00e7\u00e3o de registro de assinante em uma rede. A peti\u00e7\u00e3o foi reconhecida pela rede da operadora. Eles podiam interceptar as chamadas telef\u00f4nicas e SMSs recebidas de um assinante, esse era o objetivo deles. Por que n\u00e3o examinamos cada medida em mais detalhes?<\/p>\n<p>O procedimento de detec\u00e7\u00e3o e resposta a perigos do PT TAD reconheceu mensagens SendRoutingInfoForSM entregues em um servidor externo para algum assinante da rede dom\u00e9stica de sua operadora. As comunica\u00e7\u00f5es tamb\u00e9m foram consideradas question\u00e1veis, o que n\u00e3o \u00e9 surpreendente no caso de a\u00e7\u00f5es v\u00e1lidas, pois n\u00e3o foram acompanhadas de perto por meio de um SMS. Os meios de um esfor\u00e7o seguiram de perto cada material para atacar a rede por meio do ProvideSubscriberInfo, que foi obstru\u00eddo com essa rede. At\u00e9 mesmo a t\u00e9cnica PT TAD constatou que uma mistura de ataques SendRoutingInfoForSM e ProvideSubscriberInfo foi realizada em um per\u00edodo de apenas 2 minutos, o que significa que a localiza\u00e7\u00e3o de um assinante foi conclu\u00edda.<\/p>\n<p>&nbsp;<\/p>\n<h2>Conclus\u00e3o:<\/h2>\n<p>Como podemos ver facilmente, muitas operadoras de telefonia m\u00f3vel protegem sua margem SS7 reconfigurando os suprimentos de rede e aplicando solu\u00e7\u00f5es de roteamento dom\u00e9stico de SMS. Esse pode ser realmente o meio de resistir aos ataques ao SS7, mas talvez n\u00e3o seja suficiente para proteger a rede. Nosso estudo e tamb\u00e9m a cl\u00ednica de investiga\u00e7\u00e3o de seguran\u00e7a demonstram que h\u00e1 chances de ataques ao SS7 que ignoram esse tipo de mec\u00e2nica de seguran\u00e7a. Al\u00e9m disso, os ataques s\u00e3o um tanto furtivos e dif\u00edceis de serem descobertos desde cedo. Essa \u00e9 a raz\u00e3o pela qual acreditamos que as operadoras de telefonia m\u00f3vel precisam participar do rastreamento de seguran\u00e7a das rela\u00e7\u00f5es SS7 externas, incentivadas por uma base de exposi\u00e7\u00e3o atualizada.<\/p>","protected":false},"excerpt":{"rendered":"<p>Os ataques direcionados \u00e0 nega\u00e7\u00e3o de servi\u00e7o talvez n\u00e3o tenham se mostrado diferentes, com apenas 7,8 por cento desse tipo de ataque se tornando poderoso no momento. At\u00e9 mesmo o sistema InsertSubscriberData foi utilizado, no entanto, 99% das mensagens permaneceram c\u00edclicas, ou seja, foram descartadas da rede da operadora. Os visitantes e a filtragem tiveram um impacto consider\u00e1vel na...<\/p>","protected":false},"author":1,"featured_media":1736,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[69,1],"tags":[],"class_list":["post-457","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sms-intercept","category-ss7-sms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Attack example of SS7<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/pt\/ss7-sms\/exemplo-de-ataque-do-ss7\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Attack example of SS7\" \/>\n<meta property=\"og:description\" content=\"Attacks targeted toward denial of service proved perhaps not different, together with just 7.8 percentage of this kind of attack currently becoming powerful. Even the InsertSubscriberData system was utilized, however, 99 percent of the messages stayed cyclical &#8211;that they certainly were dismissed from the operator network. Visitors and filtering had a Considerable Impact on the...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/pt\/ss7-sms\/exemplo-de-ataque-do-ss7\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-28T04:21:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-05T09:46:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Attack-example-of-SS7.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"507\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/attack-example-of-ss7\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/attack-example-of-ss7\\\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#\\\/schema\\\/person\\\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"Attack example of SS7\",\"datePublished\":\"2024-04-28T04:21:28+00:00\",\"dateModified\":\"2024-09-05T09:46:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/attack-example-of-ss7\\\/\"},\"wordCount\":513,\"publisher\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/attack-example-of-ss7\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sms-txt.net\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Attack-example-of-SS7.jpg\",\"articleSection\":[\"SMS Intercept\",\"SS7\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/attack-example-of-ss7\\\/\",\"url\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/attack-example-of-ss7\\\/\",\"name\":\"Attack example of SS7\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/attack-example-of-ss7\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/attack-example-of-ss7\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sms-txt.net\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Attack-example-of-SS7.jpg\",\"datePublished\":\"2024-04-28T04:21:28+00:00\",\"dateModified\":\"2024-09-05T09:46:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/attack-example-of-ss7\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/attack-example-of-ss7\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/attack-example-of-ss7\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sms-txt.net\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Attack-example-of-SS7.jpg\",\"contentUrl\":\"https:\\\/\\\/sms-txt.net\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/Attack-example-of-SS7.jpg\",\"width\":900,\"height\":507},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/ss7-sms\\\/attack-example-of-ss7\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sms-txt.net\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Attack example of SS7\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#website\",\"url\":\"https:\\\/\\\/sms-txt.net\\\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sms-txt.net\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#organization\",\"name\":\"SS7\",\"url\":\"https:\\\/\\\/sms-txt.net\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/yellow-jaguar-454368.hostingersite.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/logo.jpg\",\"contentUrl\":\"https:\\\/\\\/yellow-jaguar-454368.hostingersite.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sms-txt.net\\\/#\\\/schema\\\/person\\\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Exemplo de ataque de SS7","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/pt\/ss7-sms\/exemplo-de-ataque-do-ss7\/","og_locale":"pt_BR","og_type":"article","og_title":"Attack example of SS7","og_description":"Attacks targeted toward denial of service proved perhaps not different, together with just 7.8 percentage of this kind of attack currently becoming powerful. Even the InsertSubscriberData system was utilized, however, 99 percent of the messages stayed cyclical &#8211;that they certainly were dismissed from the operator network. Visitors and filtering had a Considerable Impact on the...","og_url":"https:\/\/sms-txt.net\/pt\/ss7-sms\/exemplo-de-ataque-do-ss7\/","og_site_name":"SS7 Hacking","article_published_time":"2024-04-28T04:21:28+00:00","article_modified_time":"2024-09-05T09:46:56+00:00","og_image":[{"width":900,"height":507,"url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Attack-example-of-SS7.jpg","type":"image\/jpeg"}],"author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/ss7-sms\/attack-example-of-ss7\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/attack-example-of-ss7\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"Attack example of SS7","datePublished":"2024-04-28T04:21:28+00:00","dateModified":"2024-09-05T09:46:56+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/attack-example-of-ss7\/"},"wordCount":513,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"image":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/attack-example-of-ss7\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Attack-example-of-SS7.jpg","articleSection":["SMS Intercept","SS7"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/ss7-sms\/attack-example-of-ss7\/","url":"https:\/\/sms-txt.net\/ss7-sms\/attack-example-of-ss7\/","name":"Exemplo de ataque de SS7","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/attack-example-of-ss7\/#primaryimage"},"image":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/attack-example-of-ss7\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Attack-example-of-SS7.jpg","datePublished":"2024-04-28T04:21:28+00:00","dateModified":"2024-09-05T09:46:56+00:00","breadcrumb":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/attack-example-of-ss7\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/ss7-sms\/attack-example-of-ss7\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/sms-txt.net\/ss7-sms\/attack-example-of-ss7\/#primaryimage","url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Attack-example-of-SS7.jpg","contentUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/07\/Attack-example-of-SS7.jpg","width":900,"height":507},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/ss7-sms\/attack-example-of-ss7\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"Attack example of SS7"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"Hacking de SS7","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/pt\/wp-json\/wp\/v2\/posts\/457","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/pt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/pt\/wp-json\/wp\/v2\/comments?post=457"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/pt\/wp-json\/wp\/v2\/posts\/457\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/pt\/wp-json\/wp\/v2\/media\/1736"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/pt\/wp-json\/wp\/v2\/media?parent=457"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/pt\/wp-json\/wp\/v2\/categories?post=457"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/pt\/wp-json\/wp\/v2\/tags?post=457"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}