Adaptive Mobile reveals hacker holes in mobile networks
The flaws can be used by malicious actors maliciously and governments to carry out large-scale attacks and surveillance operations
 
 
Adaptive Mobile has uncovered a security flaw in mobile networks that could cause widespread fraud and large-scale surveillance attacks for mobile users.
The threat takes advantage of a hole in Signalling System 7 (SS7), which is used to connect mobile networks around the world.
According to Adaptive Mobile, almost every network around the world uses SS7 and most people use it everyday. In fact, the company's Cathal McDaid, head of Adaptive Mobile's threat intelligence unit, said more people use SS7 on a daily basis than the internet.
Cyber criminals are using the vulnerability to infiltrate mobile network billing systems and then trick them into giving the criminals lower-cost calling and roaming charges.
Governments are also said to be taking advantage and listening into confidential conversations. An example Adaptive Mobile gave was how conversations were monitored between MTC Ukraine network users and individuals on a Russian mobile phone network, although it hasn't been revealed who was behind the hack.
"The SS7 vulnerabilities are just another example of software-based systems that weren't built for the rich interconnectivity and threats of the modern mobile infrastructure," Chris Wysopal, CISO and CTO at Veracode said. "Development teams need to go into projects with the expectations that what they're creating will live in a hostile environment where attackers will look to exploit vulnerabilities. We've seen this across every industry and it's no surprise it's occurring in the telco industry."
A number of companies have investigated mobile network flaws, discovering it's a widespread problem caused, in many cases, by out-of-date technologies that haven't had significant updates since mobile phones became widespread ten or more years ago.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"A core protocol like SS7 provides governments and rogue actors wide access to the world's communications infrastructure making it an incredibly attractive system to break into," Wysopal added. "Until software developers change their approach and build security into their code from the start, we're going to continue to see these problems."

Clare is the founder of Blue Cactus Digital, a digital marketing company that helps ethical and sustainability-focused businesses grow their customer base.
Prior to becoming a marketer, Clare was a journalist, working at a range of mobile device-focused outlets including Know Your Mobile before moving into freelance life.
As a freelance writer, she drew on her expertise in mobility to write features and guides for ITPro, as well as regularly writing news stories on a wide range of topics.
- 
 Red Hat eyes developer workflow efficiency, app modernization gains with new AI tools Red Hat eyes developer workflow efficiency, app modernization gains with new AI toolsNews An AI assistant specifically designed for application migration and modernization looks to reduce developer toil 
- 
 TeamViewer is targeting 'proactive IT management' with AI and closer Salesforce ties TeamViewer is targeting 'proactive IT management' with AI and closer Salesforce tiesNews Remote access is becoming more autonomous, and TeamViewer wants it to solve problems before they arise 
- 
 US to ban surveillance software exports to authoritarian governments US to ban surveillance software exports to authoritarian governmentsNews Commerce dept to prevent US companies from selling tools to hack people 
- 
 Cambridge Analytica: US Congress probes data firm set up by ex-Cambridge Analytica employee Cambridge Analytica: US Congress probes data firm set up by ex-Cambridge Analytica employeeNews Congress wants to know whether it's collecting data from apps or using data brokers 
- 
 UK oversight bodies 'were not aware' of spies' data-sharing UK oversight bodies 'were not aware' of spies' data-sharingNews Privacy International finds documents alleging widespread GCHQ data-sharing occurred without safeguards 
- 
 Gov accuses Whatsapp of creating security 'black hole' Gov accuses Whatsapp of creating security 'black hole'News Gov ramps up pressure on app to hand over encrypted messages - report 
- 
 The government needs to abandon its war on WhatsApp The government needs to abandon its war on WhatsAppOpinion Encryption might seem like an easy target, but mess with it at your peril 
- 
 Gov denies Verify could be used to spy on you Gov denies Verify could be used to spy on youNews GDS issues rebuttal to paper claiming identity assurance scheme degrades your privacy 
- 
 Legal scholars plead with MPs over Snooper’s Charter Legal scholars plead with MPs over Snooper’s CharterNews Academics sign open letter to stem government-sanctioned data collection 
- 
 Governments accused of using hacked data to spy on people Governments accused of using hacked data to spy on peopleNews According to leaked documents, governmental organisations in the UK, US and Canada are making use of hacked intel