Telecom Lobbyists Downplayed SS7 Vulnerability

Discussion in 'mobile device security' started by hawki, Jul 21, 2017.

  1. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,077
    Location:
    DC Metro Area
    "Telecom lobbyists repeatedly downplayed a potentially catastrophic security vulnerability in mobile networks, fearing that investigating the problem further would result in the companies losing money due to new government cybersecurity rules...

    [In a "60 Minutes" Show that exposed carrier apathy about the vulnerability H]ackers ... demonstrated how they were able to track user location, dodge encryption, and record conversations. And to the network, the intrusion looks like like carrier to carrier chatter among a sea of other, 'privileged peering relationships.'

    [In] May, the Department of Homeland Security published a 125-page report on government mobile device security, stating that SS7 'vulnerabilities can be exploited by criminals, terrorists, and nation-state actors/foreign intelligence organizations.'...

    Cellular carriers...set about downplaying the dangerous flaw in materials provided to representatives, calling the problems 'theoretical,' and the report 'unhelpful.' 'Most alarming is the Report's move toward regulation and legislation,' the lobbying group complained. 'There is no need for regulation.'..."

    http://www.dslreports.com/shownews/Report-Telecom-Lobbyists-Downplayed-SS7-Vulnerability-139983

    "After years of warnings, mobile network hackers exploit SS7 flaws to drain bank accounts..."

    https://www.theregister.co.uk/2017/05/03/hackers_fire_up_ss7_flaw/

    "The SS7 Flaw Has a Fix, If Phone Companies Would Just Do It..."

    https://www.wired.com/2017/05/fix-ss7-two-factor-authentication-bank-accounts/
     
    Last edited: Jul 21, 2017
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.