Janne Haldesten – Please hold, your call is being rerouted: Vulnerabilities in the SS7 protocol

Posted on

Janne Haldesten SS7Signalling System No. 7 (SS7) is a set of telephony signaling protocols developed in 1975, which is used to set up and tear down most of the world’s public switched telephone network (PSTN) telephone calls. It also performs number translation, local number portability, prepaid billing, messaging and other mass market services.

While vulnerabilities in SS7 for tracking, interception and denial of service have been reported as far back as 2001, the overall impact of these vulnerabilities on various sectors has not been detailed publicly. The abuse of SS7 for the purpose of attacking individuals and infrastructure should be considered extremely serious.

Interception of voice can be done easily using SS7, being undetectable and unpreventable by the user with current technology.
Using techniques to deny data services could force users away from secure to less secure methods of communication such as GSM voice/data allowing interception.

This presentation will point out why we are vulnerable, the attack vectors as well as current ongoing mitigation efforts.

Janne Haldesten is a fairly seasoned security specialist at Cybercom Group who just loves offensive security and network forensics!
He has worked as an adviser and subject matter expert to various government organisations and corporations nationally and internationally in matters regarding national security, critical infrastructure protection, information assurance, incident handling and investigation.

Janne is also a fellow at the Cyber Security Forum Initiative (CSFI) as well as a co-teacher at the Chief Information Assurance Officer program (CIAO) at the Centre for Asymmetric Threat Studies at the Swedish Defence University (CATS/SEDU). Janne is an occasional guest lecturer at George Washington University and Halmstad University apart from public speaking engagements where he presented on SS7 in Washington D.C. late August this year.