{"id":388,"date":"2024-02-08T05:09:18","date_gmt":"2024-02-08T02:09:18","guid":{"rendered":"https:\/\/sms-txt.net\/?p=388"},"modified":"2024-09-05T12:45:43","modified_gmt":"2024-09-05T09:45:43","slug":"kako-hekerji-izkoriscajo-ss7","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/sl\/ss7-sms\/kako-hekerji-izkoriscajo-ss7\/","title":{"rendered":"Kako hekerji izkori\u0161\u010dajo SS7?"},"content":{"rendered":"<p>To obdobje velja za obdobje mobilne uporabe. Vsak posameznik je vklju\u010den v pretirano uporabo mobilnega telefona. Uporaba mobilnih telefonov je postala odvisnost vsakega posameznika. Od otrok do strokovnjakov, vsakdo ima te pripomo\u010dke v \u017eepu.<\/p>\n<p>Kibernetski napadi prek mobilnih telefonov so postali pogostej\u0161i s prihodom tehnologije 5G. Ni dvoma, da svetovni telekomunikacijski sistem ljudem omogo\u010da najbolj\u0161e internetne storitve. Te storitve ne prina\u0161ajo le udobja v \u017eivljenja ljudi. Vplivajo pa tudi na varnost ob\u010dutljivih podatkov v mobilnih telefonih. Ker hekerjev ne zanimajo vsi podatki, kot so podatki o zgodovini glasbe. Napadajo pa izklju\u010dno va\u0161e ob\u010dutljive podatke.<\/p>\n<h2>Kaj je SS7 in kako ga lahko uporabljajo hekerji?<\/h2>\n<p>Z uvedbo naprednih tehnik vdiranja in nove programske opreme je vdiranje la\u017eje in spretnej\u0161e. Ljudje lahko zdaj prek interneta spretno opravijo katero koli nalogo. Vendar to negativno vpliva tudi na varnost podatkov. Leta 2019 se je odstotek napadov z zlonamerno programsko opremo pove\u010dal na 50%, kar so dokazali strokovnjaki. Konec leta 2020 se lahko kibernetski napadi pove\u010dajo na vi\u0161je \u0161tevilke.<\/p>\n<p>V zadnjih nekaj letih so mobilna omre\u017eja najpogosteje napadali <a href=\"https:\/\/yellow-jaguar-454368.hostingersite.com\/ss7-attacks\/\">SS7<\/a> protokol. To negativno vpliva ne le na zasebnost uporabnikov, temve\u010d tudi na zasebnost ponudnika storitev. Protokol SS7 je bil uveden leta 1974 kot povezovalnik med razli\u010dnimi mobilnimi napravami. SS7 pomaga pri prenosu sporo\u010dil SMS in klicev iz ene mobilne naprave v drugo. \u010ceprav je bil namen izuma druga\u010den. Vendar se zdaj izkori\u0161\u010da pri kibernetskih napadih.<\/p>\n<p>Cilj hekerjev je pogosteje ogroziti celotno omre\u017eje. Pridobijo vse podatke o naro\u010dnikih ponudnikov storitev. Ko pridobijo dostop do informacij ponudnikov storitev, lahko varno dostopajo do osebnih podatkov vseh naro\u010dnikov. Na ta na\u010din pridobijo nadzor nad vsemi klici in sporo\u010dili. Poleg tega lahko izsledijo lokacijo \u017eelene osebe, tudi \u010de je njen GPS izklopljen. Celoten postopek poteka na tako varen na\u010din, ne da bi ponudnika storitev opozorili na varnostne te\u017eave.<\/p>\n<p>Protokol SS7 omogo\u010da neu\u010dinkovito komunikacijo po vsem svetu. Mobilni uporabniki u\u017eivajo v u\u010dinkoviti komunikaciji po vsem svetu. Uvedba tega protokola ima ve\u010d pomanjkljivosti. Zaradi tega so osebni podatki ljudi bolj izpostavljeni kibernetskim napadom.<\/p>\n<p>Protokol od svoje iznajdbe ni dobil posodobljene razli\u010dice. Zato ga je mogo\u010de zlahka uporabiti v svetu hekerstva. Ta protokol uporabljajo tudi najve\u010dje svetovne obve\u0161\u010devalne agencije, da bi zakonito pridobile potrebne informacije. Na \u017ealost lahko do vseh teh informacij zlahka dostopajo tudi hekerji.<\/p>\n<p>V SS7 so posebni telefonski signalizacijski protokoli. Ta protokol signalizacije je odgovoren za povezavo telefonskega klica enega mobilnega telefona z drugim. Protokol uspe\u0161no deluje tako za brez\u017ei\u010dne kot \u017ei\u010dne javne telefone.<\/p>\n<h2>Na koga vpliva ranljivost SS7?<\/h2>\n<p>S\u010dasoma je bilo dodanih \u0161e nekaj aplikacij prek protokola SS7. Osnovni namen tega je bila uvedba storitev SMS. Sledila je uvedba posredovanja klicev, \u010dakajo\u010dih klicev, konferen\u010dnih klicev itd. Z uvedbo vseh teh novih aplikacij so mobilne naprave postale predmet pogostih vdorov. Napadi SS7 so napadi z zlonamerno programsko opremo prek mobilnih naprav.<\/p>\n<p>Hekerji pridobijo dostop do osebnih telefonskih klicev in sporo\u010dil ciljnih naprav. Pogostej\u0161i so napadi prek ponudnikov mobilnih storitev, da bi zlahka dostopali do vseh uporabnikov. Napadi z izkori\u0161\u010danjem SS7 so usmerjeni na telefonske komunikacije in ne na komunikacije wifi.<\/p>\n<p>Avtenti\u010dne zmogljivosti SS7 uporabljajo hekerji za pridobivanje informacij o vseh komunikacijah. Hekerji morajo za uporabo SS7 pri vdiranju prenesti SS7 SDK z interneta. Nato uporabijo SS7 SDK na zelo tehni\u010den na\u010din, da dose\u017eejo uspe\u0161en vdor.<\/p>\n<p>Tako se heker lahko pove\u017ee z omre\u017ejem SS7. Ko se pove\u017ee, preide na ciljno omre\u017eje. Ciljna naprava tega ne more zaznati. Naprava jo ima za vozli\u0161\u010de MSC ali VLR.<br \/>\nGlavna dejavnost, ki jo hekerji izvajajo, da bi pridobili dostop tudi do najbolj za\u0161\u010ditenih naprav, je napad MitM phishing. Po tem napadu nadaljuje s pridobivanjem \u017eelenih informacij. Heker nato spretno pridobi vse podatke o sporo\u010dilih SMS in klicih ter izsledi natan\u010dno lokacijo ciljne osebe.<\/p>\n<p>Ve\u010dina ljudi uporablja 2FA kot za\u0161\u010dito pred napadi zlonamerne programske opreme SS7. Vendar je ta za\u0161\u010ditni pristop ponudnikov mobilnih storitev neuspe\u0161en. Ker ga v tovrstnih scenarijih hekerji premagajo in kode uporabijo s prestrezanjem. Kode uporabljajo za dostop do velikega \u0161tevila ra\u010dunov, tudi ban\u010dnih.<\/p>\n<p>Digitalna podjetja so zdaj izpostavljena ve\u010djemu tveganju. Hekerji uporabljajo osebne podatke vseh digitalnih podjetij. Vse to po\u010dnejo varno z napadom MitM phishing. Digitalna podjetja so pri izvajanju svojih komunikacij odvisna od SS7.<\/p>\n<p>Digitalna podjetja po\u0161iljajo svoje pomembne strokovne datoteke, do katerih lahko hekerji zlahka dostopajo. Veliko \u0161tevilo naprav v digitalni dobi uporablja mobilne naprave za prenos pomembnih poklicnih podatkov. Digitalna podjetja so izpostavljena ve\u010djemu tveganju kibernetskih napadov. Vendar pa ne posve\u010dajo pozornosti premagovanju teh napadov. Ta podjetja bi morala to vpra\u0161anje jemati resno.<\/p>","protected":false},"excerpt":{"rendered":"<p>To obdobje velja za obdobje mobilne uporabe. Vsak posameznik je vklju\u010den v pretirano uporabo mobilnega telefona. Uporaba mobilnih telefonov je postala odvisnost vsakega posameznika. Od otrok do strokovnjakov, vsakdo ima te pripomo\u010dke v \u017eepu. Kibernetski napadi prek mobilnih telefonov so postali pogostej\u0161i s prihodom omre\u017eja 5G...<\/p>","protected":false},"author":1,"featured_media":401,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-388","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ss7-sms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Hackers Are Exploiting SS7?<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/sl\/ss7-sms\/kako-hekerji-izkoriscajo-ss7\/\" \/>\n<meta property=\"og:locale\" content=\"sl_SI\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Hackers Are Exploiting SS7?\" \/>\n<meta property=\"og:description\" content=\"This era is considered as the era of mobile use. Every single person is involved in excessive use of the mobile phone. Mobile use has become an addiction to every person. From kids to professionals, every person is having these gadgets in their pockets. Cyber-attacks over mobiles became more common with the arrival of 5G...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/sl\/ss7-sms\/kako-hekerji-izkoriscajo-ss7\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-08T02:09:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-05T09:45:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"761\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"How Hackers Are Exploiting SS7?\",\"datePublished\":\"2024-02-08T02:09:18+00:00\",\"dateModified\":\"2024-09-05T09:45:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/\"},\"wordCount\":879,\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg\",\"articleSection\":[\"SS7\"],\"inLanguage\":\"sl-SI\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/\",\"url\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/\",\"name\":\"How Hackers Are Exploiting SS7?\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg\",\"datePublished\":\"2024-02-08T02:09:18+00:00\",\"dateModified\":\"2024-09-05T09:45:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#breadcrumb\"},\"inLanguage\":\"sl-SI\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sl-SI\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage\",\"url\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg\",\"contentUrl\":\"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg\",\"width\":2000,\"height\":761,\"caption\":\"ss7 attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sms-txt.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Hackers Are Exploiting SS7?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sms-txt.net\/#website\",\"url\":\"https:\/\/sms-txt.net\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sms-txt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sl-SI\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sms-txt.net\/#organization\",\"name\":\"SS7\",\"url\":\"https:\/\/sms-txt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sl-SI\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"contentUrl\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Kako hekerji izkori\u0161\u010dajo SS7?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/sl\/ss7-sms\/kako-hekerji-izkoriscajo-ss7\/","og_locale":"sl_SI","og_type":"article","og_title":"How Hackers Are Exploiting SS7?","og_description":"This era is considered as the era of mobile use. Every single person is involved in excessive use of the mobile phone. Mobile use has become an addiction to every person. From kids to professionals, every person is having these gadgets in their pockets. Cyber-attacks over mobiles became more common with the arrival of 5G...","og_url":"https:\/\/sms-txt.net\/sl\/ss7-sms\/kako-hekerji-izkoriscajo-ss7\/","og_site_name":"SS7 Hacking","article_published_time":"2024-02-08T02:09:18+00:00","article_modified_time":"2024-09-05T09:45:43+00:00","og_image":[{"width":2000,"height":761,"url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg","type":"image\/jpeg"}],"author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"How Hackers Are Exploiting SS7?","datePublished":"2024-02-08T02:09:18+00:00","dateModified":"2024-09-05T09:45:43+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/"},"wordCount":879,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"image":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg","articleSection":["SS7"],"inLanguage":"sl-SI"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/","url":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/","name":"Kako hekerji izkori\u0161\u010dajo SS7?","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage"},"image":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage"},"thumbnailUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg","datePublished":"2024-02-08T02:09:18+00:00","dateModified":"2024-09-05T09:45:43+00:00","breadcrumb":{"@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#breadcrumb"},"inLanguage":"sl-SI","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/"]}]},{"@type":"ImageObject","inLanguage":"sl-SI","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#primaryimage","url":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg","contentUrl":"https:\/\/sms-txt.net\/wp-content\/uploads\/2020\/06\/ss7attack.jpg","width":2000,"height":761,"caption":"ss7 attack"},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/ss7-sms\/how-hackers-are-exploiting-ss7\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"How Hackers Are Exploiting SS7?"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"Vdiranje v SS7","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sl-SI"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"sl-SI","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/sl\/wp-json\/wp\/v2\/posts\/388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/sl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/sl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/sl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/sl\/wp-json\/wp\/v2\/comments?post=388"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/sl\/wp-json\/wp\/v2\/posts\/388\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/sl\/wp-json\/wp\/v2\/media\/401"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/sl\/wp-json\/wp\/v2\/media?parent=388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/sl\/wp-json\/wp\/v2\/categories?post=388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/sl\/wp-json\/wp\/v2\/tags?post=388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}