Threat Intelligence
March 1, 2019

Exploiting SS7 to intercept text messages

a woman sitting on the floor using her celllong exposure image of man walking by blue panels

When did you last use SMS for two-factor authentication (2FA)? Maybe you used it to log in to your email or social media accounts, or to access online banking? It's become an accepted part of life in the digital age, and yet a number of recent high-impact breaches were down to attackers intercepting 2FA SMS messages. By exploiting inherently insecure Signalling System No. 7 (SS7) networks, attackers can intercept and divert texts sent as 2FA. In some cases, these text messages contain codes used to authorise bank transfers, meaning interception could spell financial disaster for the victim.

 

Get hands on with the SS7 exploitation in our lab

 

Our expert content team have built a lab which takes you through a simulated SS7 network exploitation to intercept a 2FA SMS and transfer (imaginary!) funds to a bank account. Check out Matt Parven, our Principal Content Engineer, on why understanding -- and experiencing -- this exploitation is important for both red and blue teams.

Immersive Labs Intercepting Text Messages

 

 

 

Trusted by top companies worldwide
to enhance cybersecurity

Trusted by some of the world’s biggest brands, we’re committed to taking your cybersecurity readiness to the next level - and we’re just getting started.

What Our Customers
Are Saying About Immersive

Realistic simulation of current threats is the only way to test and improve response readiness, and to ensure that the impact of a real attack is minimized. Immersive’s innovative platform, combined with Kroll’s extensive experience, provides the closest thing to replication of a real incident — all within a safe virtual environment.

Paul Jackson
Regional Managing Director, APAC Cyber Risk, Kroll

Ready to Get Started?
Get a Live Demo.

Simply complete the form to schedule time with an expert that works best for your calendar.