Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Surveillance Firm Bypasses SS7 Protections to Retrieve User Location

Posted on July 21, 2025July 21, 2025 By CWS

A surveillance firm has been utilizing a brand new assault method to bypass the Signaling System 7 (SS7) protocol’s protections and trick telecommunications firms into disclosing the placement of their customers, cybersecurity firm Enea experiences.

The assault technique, probably used because the fourth quarter of 2024, depends on TCAP (Transaction Capabilities Utility Half) manipulation via SS7 instructions (PDUs) which have been structured in such a fashion that their contents usually are not decoded by the safety programs or firewalls.

TCAP messages comprise constructing blocks referred to as Data Components (IEs), which have three fields, specifically Contents (the data conveyed), Tag (governs the interpretation of Contents) and Size (specifies the Contents size).  

In an SS7 system, one of the vital necessary TCAP elements is Invoke, which represents the operation that initiates a course of within the receiving TCAP ingredient.

Enea says it has noticed TCAP anomalies the place the encoding of an IE containing the IMSI (Worldwide Cell Subscriber Identification) area with a PSI (ProvideSubscriberInfo) Invoke has been altered.

A GSM-MAP command, PSI can be utilized extensively for location monitoring, by requesting the placement data of a focused cellular subscriber from the core community ingredient.

Cell operators, Enea explains, use PSIs for billing and mobility management, when subscribers are roaming, however ought to block instructions coming from exterior the house operator when they’re attempting to retrieve data on dwelling subscribers.

“A key manner for the cellular operator to know what PSI to allow and what to dam is predicated on the IMSI within the PSI packet. Principally, if the supply is just not the house community, however the IMSI is from the house community, then the PSI ought to be blocked,” Enea says.Commercial. Scroll to proceed studying.

The cybersecurity agency found in-the-wild assaults the place the PSI instructions had been modified utilizing a way of extending the Tag code that incorporates the IMSI, breaking cellular operators’ checks for respectable PSIs requesting subscriber location knowledge.

“We imagine that the presence of the prolonged Tag triggered the IMSI area to be ignored by parts that had been doing signaling safety checks – the focused IMSI was primarily ‘hidden’ – and so it couldn’t be utilized in any checks. The tip result’s that location monitoring assaults for dwelling networks subscribers had been allowed via,” Enea notes.

The assaults, it says, got here from a surveillance firm and have been ongoing since at the very least the tip of final 12 months, as a part of their check suite for bypassing signaling safety defenses.

“We don’t have any data on how profitable this assault technique has been worldwide, as its success is vendor/software program particular, fairly than being a basic protocol vulnerability, however its use as a part of a collection signifies that it has had some worth,” Enea notes.

The cybersecurity agency believes the assaults had been probably attainable as a result of the SS7 software program decoding stacks of some operators didn’t implement the mandatory logic to grasp the prolonged TCAP code, and since the SS7 signaling safety options had been constructed on high of older stacks, which had been extra permissive concerning undecodable fields.

“To fight this and different associated assaults, Enea recommends blocking all malformed PDU buildings which aren’t recognized to be benign, or blocking any MAP PDUs the place an IMSI is predicted, however no IMSI was discovered inside the decoded PDU,” the corporate notes.

Associated: eSIM Hack Permits for Cloning, Spying

Associated: LTE, 5G Vulnerabilities Might Reduce Total Cities From Mobile Connectivity

Associated: ‘5Ghoul’ Vulnerabilities Hang-out Qualcomm, MediaTek 5G Modems

Associated: US Authorities Companies Concern Steerage on Threats to 5G Community Slicing

Security Week News Tags:Bypasses, Firm, Location, Protections, Retrieve, SS7, Surveillance, User

Post navigation

Previous Post: CoinDCX Hacked – $44.2 million Wiped off From the Platform
Next Post: Assessing the Role of AI in Zero Trust

Related Posts

CloudSEK Raises $19 Million for Threat Intelligence Platform Security Week News
Google’s $32 Billion Wiz Deal Draws DOJ Antitrust Scrutiny: Report Security Week News
Siemens Notifies Customers of Microsoft Defender Antivirus Issue Security Week News
In Other News: PoC for Fortinet Bug, AI Model Subverts Shutdown, RAT Source Code Leaked Security Week News
ClickFix Attack Exploits Fake Cloudflare Turnstile to Deliver Malware Security Week News
Chain IQ, UBS Data Stolen in Ransomware Attack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Kali Linux Unveils Two New Tools to Boost Wi-Fi Performance for Raspberry Pi Users
  • CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks
  • Chrome High-Severity Vulnerabilities Allow Attackers to Execute Arbitrary Code
  • Researchers Unmasked Russia’s Most Secretive FSB’s Spy Network
  • Scavenger Malware Hijacks Popular npm Packages to Attack Developers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Kali Linux Unveils Two New Tools to Boost Wi-Fi Performance for Raspberry Pi Users
  • CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks
  • Chrome High-Severity Vulnerabilities Allow Attackers to Execute Arbitrary Code
  • Researchers Unmasked Russia’s Most Secretive FSB’s Spy Network
  • Scavenger Malware Hijacks Popular npm Packages to Attack Developers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News