{"id":357,"date":"2023-12-02T05:02:45","date_gmt":"2023-12-02T02:02:45","guid":{"rendered":"https:\/\/sms-txt.net\/?p=357"},"modified":"2024-09-05T12:44:33","modified_gmt":"2024-09-05T09:44:33","slug":"ss7-attacker","status":"publish","type":"post","link":"https:\/\/sms-txt.net\/sv\/ss7-sms\/ss7-attacker\/","title":{"rendered":"SS7-attacker"},"content":{"rendered":"<h1>SS7-attacker<\/h1>\n<p>I likhet med m\u00e5nga andra \u00e4ldre protokoll utformades SS7 med l\u00e5g s\u00e4kerhet i \u00e5tanke. Begrepp som autentisering och auktorisering f\u00f6rekom knappt och diskuterades inte heller. SS7-s\u00e4kerheten baserades helt och h\u00e5llet p\u00e5 f\u00f6rtroende. De centrala n\u00e4tverkselementen byggdes i enlighet med detta med f\u00e5 eller inga f\u00f6rsvar mot missbruk av SS7-funktionaliteter. Eftersom SS7 betraktas som ett slutet n\u00e4tverk har mycket lite s\u00e4kerhetsforskning gjorts f\u00f6r att bed\u00f6ma s\u00e4kerheten i SS7. S\u00e4kerhetsforskare hade ingen tillg\u00e5ng till SS7-n\u00e4tverk och tj\u00e4nsteleverant\u00f6rer hade inget st\u00f6rre intresse av att unders\u00f6ka \u00e4mnet.<\/p>\n<p>Men SS7-n\u00e4tet \u00e4r inte l\u00e4ngre st\u00e4ngt. N\u00e4tverksleverant\u00f6rer \u00f6ppnar upp sina SS7-n\u00e4tverk f\u00f6r tredje part som en del av sina kommersiella erbjudanden. N\u00e4tverkselement som Femtocells l\u00e4mnar operat\u00f6rernas st\u00e4ngda gr\u00e4nser och \u00e4r baserade p\u00e5 op\u00e5litliga platser; hackare kan hitta v\u00e4gar in i mobiloperat\u00f6rernas n\u00e4tverk, och det \u00e4r on\u00f6digt att n\u00e4mna att vissa operat\u00f6rer kan vara under kontroll av nationalstater med onda avsikter att missbruka s\u00e5dana os\u00e4kra n\u00e4tverk.<\/p>\n<p>Missbruk av SS7:s os\u00e4kerhet kan f\u00e5 allvarliga konsekvenser, eftersom protokollets natur g\u00f6r det m\u00f6jligt att f\u00e5 tillg\u00e5ng till information om t.ex. anv\u00e4ndarens position och detaljer om samtal\/SMS. Finansiella tj\u00e4nster och autentiseringssystem har byggts upp baserat p\u00e5 f\u00f6rtroendet f\u00f6r de tj\u00e4nster som tillhandah\u00e5lls av s\u00e5dana protokoll. Denial of service-attacker som utnyttjar dessa os\u00e4kerheter kan f\u00e5 f\u00f6r\u00f6dande konsekvenser f\u00f6r l\u00e4nders telekommunikationsinfrastruktur.<\/p>\n<p>I de kommande avsnitten kommer vi att unders\u00f6ka n\u00e5gra av de attacker som har annonserats mot SS7, i hopp om att kunna analysera de kontroller som saknas och slutligen f\u00f6resl\u00e5 kontroller som kan begr\u00e4nsa effekten av dessa attacker. Dessa avsnitt bygger till stor del p\u00e5 det arbete som s\u00e4kerhetsforskarna Tobias Engel och Karsten Nohl har utf\u00f6rt inom omr\u00e5dena avlyssning av samtal och SMS, platssp\u00e5rning, bedr\u00e4geri och \u00f6verbelastningsattacker.<\/p>\n<h2>Avlyssning av samtal och SMS<\/h2>\n<p>Att avlyssna kommunikation har alltid varit det ultimata m\u00e5let f\u00f6r alla spionageoperationer. F\u00f6rr i tiden, n\u00e4r telefonerna var tr\u00e5dbundna, beh\u00f6vde angriparen fysiskt koppla in sig p\u00e5 kabeln f\u00f6r att kunna lyssna p\u00e5 ett p\u00e5g\u00e5ende samtal.<br \/>\nI den mobila kommunikationens tidevarv \u00f6verf\u00f6rs samtalet via radio mellan de uppringande parterna och mobiln\u00e4ten. Normalt krypteras trafiken \u00f6ver luftgr\u00e4nssnittet. Krypteringen g\u00f6rs med hj\u00e4lp av antingen A5\/1- eller A5\/3-protokoll. Nyligen har A5\/1-sviten brutits och det \u00e4r m\u00f6jligt att dekryptera samtal som \u00f6verf\u00f6rs via luftgr\u00e4nssnittet med hj\u00e4lp av billiga radioavlyssnare och regnb\u00e5gstabeller (Nohl, Munant, 2010). Som en<br \/>\nSom ett resultat av detta b\u00f6rjade operat\u00f6rerna inf\u00f6ra det starkare krypteringsprotokollet A5\/3 f\u00f6r att bek\u00e4mpa s\u00e5dana attacker.<\/p>\n<p>De nyligen avsl\u00f6jade SS7-s\u00e5rbarheterna \u00f6ppnade dock flera m\u00f6jligheter som underl\u00e4ttar avlyssning av samtal och SMS som \u00f6verf\u00f6rs via mobiln\u00e4tet.<\/p>","protected":false},"excerpt":{"rendered":"<p>SS7-attacker I likhet med m\u00e5nga \u00e4ldre protokoll utformades SS7 med liten tanke p\u00e5 s\u00e4kerhet. Begrepp som autentisering och auktorisering f\u00f6rekom knappt och diskuterades inte heller. SS7-s\u00e4kerheten baserades helt och h\u00e5llet p\u00e5 f\u00f6rtroende. De centrala n\u00e4tverkselementen byggdes i enlighet med detta med f\u00e5 eller inga f\u00f6rsvar mot missbruk av SS7-funktionaliteter. Att betraktas som ett slutet...<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-357","post","type-post","status-publish","format-standard","hentry","category-ss7-sms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.7 (Yoast SEO v26.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SS7 Attacks<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sms-txt.net\/sv\/ss7-sms\/ss7-attacker\/\" \/>\n<meta property=\"og:locale\" content=\"sv_SE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SS7 Attacks\" \/>\n<meta property=\"og:description\" content=\"SS7 Attacks As with many legacy protocols, SS7 was designed with little security in mind. Concepts such as authentication and authorization were hardly present or discussed. The SS7 security was solely based on trust. The core network elements were built accordingly with little if any defenses against abusing SS7 functionalities. Being regarded as a closed...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sms-txt.net\/sv\/ss7-sms\/ss7-attacker\/\" \/>\n<meta property=\"og:site_name\" content=\"SS7 Hacking\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-02T02:02:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-05T09:44:33+00:00\" \/>\n<meta name=\"author\" content=\"ss7\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ss7\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\"},\"author\":{\"name\":\"ss7\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\"},\"headline\":\"SS7 Attacks\",\"datePublished\":\"2023-12-02T02:02:45+00:00\",\"dateModified\":\"2024-09-05T09:44:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\"},\"wordCount\":447,\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"articleSection\":[\"SS7\"],\"inLanguage\":\"sv-SE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\",\"url\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\",\"name\":\"SS7 Attacks\",\"isPartOf\":{\"@id\":\"https:\/\/sms-txt.net\/#website\"},\"datePublished\":\"2023-12-02T02:02:45+00:00\",\"dateModified\":\"2024-09-05T09:44:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb\"},\"inLanguage\":\"sv-SE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sms-txt.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SS7 Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sms-txt.net\/#website\",\"url\":\"https:\/\/sms-txt.net\/\",\"name\":\"SS7 Hacking\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sms-txt.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sms-txt.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sv-SE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sms-txt.net\/#organization\",\"name\":\"SS7\",\"url\":\"https:\/\/sms-txt.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"contentUrl\":\"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg\",\"width\":866,\"height\":680,\"caption\":\"SS7\"},\"image\":{\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0\",\"name\":\"ss7\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SS7-attacker","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sms-txt.net\/sv\/ss7-sms\/ss7-attacker\/","og_locale":"sv_SE","og_type":"article","og_title":"SS7 Attacks","og_description":"SS7 Attacks As with many legacy protocols, SS7 was designed with little security in mind. Concepts such as authentication and authorization were hardly present or discussed. The SS7 security was solely based on trust. The core network elements were built accordingly with little if any defenses against abusing SS7 functionalities. Being regarded as a closed...","og_url":"https:\/\/sms-txt.net\/sv\/ss7-sms\/ss7-attacker\/","og_site_name":"SS7 Hacking","article_published_time":"2023-12-02T02:02:45+00:00","article_modified_time":"2024-09-05T09:44:33+00:00","author":"ss7","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ss7","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#article","isPartOf":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"},"author":{"name":"ss7","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0"},"headline":"SS7 Attacks","datePublished":"2023-12-02T02:02:45+00:00","dateModified":"2024-09-05T09:44:33+00:00","mainEntityOfPage":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"},"wordCount":447,"publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"articleSection":["SS7"],"inLanguage":"sv-SE"},{"@type":"WebPage","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/","url":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/","name":"SS7-attacker","isPartOf":{"@id":"https:\/\/sms-txt.net\/#website"},"datePublished":"2023-12-02T02:02:45+00:00","dateModified":"2024-09-05T09:44:33+00:00","breadcrumb":{"@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb"},"inLanguage":"sv-SE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sms-txt.net\/es\/ss7-sms\/ss7-ataques\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sms-txt.net\/"},{"@type":"ListItem","position":2,"name":"SS7 Attacks"}]},{"@type":"WebSite","@id":"https:\/\/sms-txt.net\/#website","url":"https:\/\/sms-txt.net\/","name":"SS7-hackning","description":"","publisher":{"@id":"https:\/\/sms-txt.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sms-txt.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sv-SE"},{"@type":"Organization","@id":"https:\/\/sms-txt.net\/#organization","name":"SS7","url":"https:\/\/sms-txt.net\/","logo":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/","url":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","contentUrl":"https:\/\/yellow-jaguar-454368.hostingersite.com\/wp-content\/uploads\/2020\/05\/logo.jpg","width":866,"height":680,"caption":"SS7"},"image":{"@id":"https:\/\/sms-txt.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sms-txt.net\/#\/schema\/person\/fa482bf9132db58e46bb9c9df2d73be0","name":"ss7"}]}},"_links":{"self":[{"href":"https:\/\/sms-txt.net\/sv\/wp-json\/wp\/v2\/posts\/357","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sms-txt.net\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sms-txt.net\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/sv\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sms-txt.net\/sv\/wp-json\/wp\/v2\/comments?post=357"}],"version-history":[{"count":0,"href":"https:\/\/sms-txt.net\/sv\/wp-json\/wp\/v2\/posts\/357\/revisions"}],"wp:attachment":[{"href":"https:\/\/sms-txt.net\/sv\/wp-json\/wp\/v2\/media?parent=357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sms-txt.net\/sv\/wp-json\/wp\/v2\/categories?post=357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sms-txt.net\/sv\/wp-json\/wp\/v2\/tags?post=357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}