According to a Dark Web Informer post shared on X, the package includes the zero-day payload, a curated target list of vulnerable telecom infrastructure, and specialized dorking tools for Shodan, Censys, Fofa, Google, and ZMap designed to identify additional vulnerable systems. Despite its age and known security limitations, the Signaling System 7 (SS7) protocol, developed in 1975 and standardized in 1980, remains a critical component of global telecommunications networks. SS7 exploits have been around for years, but a fresh zero-day targeting gateway infrastructure could potentially bypass existing security measures implemented by carriers. Security researchers have identified a listing on a prominent cybercrime forum where a newly registered vendor offers what they claim is a zero-day vulnerability affecting SS7 gateways. Experts recommend that organizations implement additional security layers beyond SMS-based authentication, such as app-based multi-factor authentication, to protect against these threats. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. The transition to 4G and 5G networks with newer protocols like Diameter offers improved security, but approximately 30% of mobile connections still rely on 2G and 3G networks that use SS7. Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. While telecommunications providers have implemented some protections since the SS7 vulnerabilities were first published in 2014, the protocol’s fundamental design issues remain. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications. The exploit, priced at $5,000, provides buyers with comprehensive tools to compromise telecommunications infrastructure at a fundamental level. Its architecture includes critical components such as Mobile Switching Centers (MSCs), Home Location Registers (HLRs), and Visitor Location Registers (VLRs).
This Cyber News was published on cybersecuritynews.com. Publication date: Mon, 05 May 2025 11:05:07 +0000