Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Astronomer CEO resigns following Cold Play Concert Scandal

David Sacks and a blurred line of government services

Windsurf CEO opens about a “very dark” mood before recognition

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Surveillance vendors have been caught exploiting new SS7 attacks to track people’s phone locations
Startups

Surveillance vendors have been caught exploiting new SS7 attacks to track people’s phone locations

userBy userJuly 18, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Security researchers say they caught surveillance companies in the Middle East. They say they can take advantage of a new attack that allows phone operators to disclose the location of cell subscribers.

This attack relies on the security protections that intruders have been implemented to protect intruders from accessing SS7 or signaling system 7. This is a private set of protocols used by global telephone personnel to route calls and text messages for subscribers around the world.

SS7 also allows carriers to request information about the cell tower to which the subscriber’s phone is connected. It is usually used to charge exactly when a customer sends a call or text message to someone from abroad.

Researchers at ENEA, a cybersecurity company that provides protection for telephone office people, said this week they observed an unnamed surveillance vendor in late 2024, exploiting a new bypass attack to get people’s phone locations without their knowledge.

The VP of Technology Technology Cathal MC Daid, who co-authored the blog post, told TechCrunch that the company observed the surveillance vendor’s target as “just a few subscribers” and that the attacks did not work for all phone carriers.

Mc Daid said the bypass attack would allow surveillance vendors to place individuals in the closest cell tower.

ENEA informed the phone operator that the exploits used had been observed, but refused to name the surveillance vendor, except that it was based in the Middle East.

Mc Daid told TechCrunch that it is part of a growing trend of malicious operators to use this kind of exploit to get people’s locations, warning that the vendors behind the use “will not discover them and use them if they’re not successful somewhere.”

“We expect more to be discovered and used,” says MC Daid.

Surveillance vendors can include spyware manufacturers and bulk internet traffic providers, but are usually private companies that only government customers work exclusively to carry out intelligence collection operations for individuals. Governments often argue that they use spyware and other exploitative technologies against serious criminals, but the tools are also used to target civil society members, including journalists and activists.

In the past, surveillance vendors have been able to access SS7 through local phone operators, misused leases “global titles” or government ties.

However, due to the nature of these attacks occurring at the cell network level, there is little that telephone subscribers can do to protect against exploitation. Rather, defense against these attacks is largely up to the telecoms.

In recent years, telephone companies have installed firewalls and other cybersecurity protections to protect against SS7 attacks, but the patchwork nature of the global cell network means that not all carriers are as protected as other carriers, including the US.

The US Department of Homeland Security, going back to 2017, described the vulnerability of the SS7 as “exploiting US subscribers,” according to a letter sent to Senator Ron Wyden’s office last year. Saudi Arabia is also known to be abused by SS7 flaws to monitor US citizens.


Source link

#Aceleradoras #CapitalRiesgo #EcosistemaStartup #Emprendimiento #InnovaciónEmpresarial #Startups
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleChina’s vast tools secretly extract from SMS, GPS data and confiscated mobile phones.
Next Article Scientists discover the changes in the polar vortex that plunges our parts into deep freeze
user
  • Website

Related Posts

Astronomer CEO resigns following Cold Play Concert Scandal

July 19, 2025

David Sacks and a blurred line of government services

July 19, 2025

Windsurf CEO opens about a “very dark” mood before recognition

July 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Astronomer CEO resigns following Cold Play Concert Scandal

David Sacks and a blurred line of government services

Windsurf CEO opens about a “very dark” mood before recognition

For privacy and security, think carefully before granting AI access to your personal data

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.