Surveillance Company Using SS7 Bypass Attack to Track the User's Location Information

This discovery highlights the ongoing arms race between surveillance entities and telecommunications security, as attackers continue exploiting the complex ASN.1 protocol structures inherent in SS7 networks to evade detection and maintain unauthorized access to sensitive subscriber information. The attack leverages previously unknown vulnerabilities in the TCAP (Transaction Capabilities Application Part) layer of SS7 networks to circumvent security protections implemented by mobile operators worldwide. Attackers manipulate the Tag code structure of TCAP Information Elements containing IMSI (International Mobile Subscriber Identity) data by using an extended tag encoding method. When security firewalls cannot decode the IMSI properly, they fail to apply crucial home-versus-roaming network checks that should block unauthorized location requests. The GSMA community has been alerted to this vulnerability, with recommendations distributed to help mobile operators strengthen their signaling security posture. The technique represents part of an evolving suite of bypass methods that surveillance companies employ to defeat signaling security defenses. Their method involves sending malformed PSI requests with extended tag codes from external networks, targeting home network subscribers whose locations should normally be protected from outside queries. A surveillance company has been detected exploiting a sophisticated SS7 bypass technique to track mobile phone users’ locations.

This Cyber News was published on cybersecuritynews.com. Publication date: Mon, 21 Jul 2025 13:55:19 +0000


Cyber News related to Surveillance Company Using SS7 Bypass Attack to Track the User's Location Information

Surveillance Company Using SS7 Bypass Attack to Track the User's Location Information - This discovery highlights the ongoing arms race between surveillance entities and telecommunications security, as attackers continue exploiting the complex ASN.1 protocol structures inherent in SS7 networks to evade detection and maintain ...
5 days ago Cybersecuritynews.com
San Francisco Police's Live Surveillance Yields Almost 200 Hours of Spying-Including of Music Festivals - A new report reveals that in just three months, from July 1 to September 30, 2023, the San Francisco Police Department racked up 193 hours and 19 minutes of live access to non-city surveillance cameras. That means for the equivalent of 8 days, police ...
1 year ago Eff.org
The Internet Enabled Mass Surveillance. AI Will Enable Mass Spying. - Spying and surveillance are different but related things. If I hired that same private detective to put you under surveillance, I would get a different report: where you went, whom you talked to, what you purchased, what you did. Putting someone ...
1 year ago Schneier.com
Hackers Selling SS7 0-Day Vulnerability on Hacker Froums for $5000 - According to a Dark Web Informer post shared on X, the package includes the zero-day payload, a curated target list of vulnerable telecom infrastructure, and specialized dorking tools for Shodan, Censys, Fofa, Google, and ZMap designed to identify ...
2 months ago Cybersecuritynews.com
Schneier on Security - Spying and surveillance are different but related things. If I hired that same private detective to put you under surveillance, I would get a different report: where you went, whom you talked to, what you purchased, what you did. Putting someone ...
1 year ago Schneier.com
FTC Bars X-Mode from Selling Sensitive Location Data - Phone app location data brokers are a growing menace to our privacy and safety. Now the app tracks your every move and sends it to a broker, which then sells your location data to the highest bidder, from advertisers to police. The FTC's complaint ...
1 year ago Eff.org
The SAFE Act to Reauthorize Section 702 is Two Steps Forward, One Step Back - Section 702 of the Foreign Intelligence Surveillance Act is one of the most insidious and secretive mass surveillance authorities still in operation today. The Security and Freedom Enhancement Act would make some much-needed and long fought-for ...
1 year ago Eff.org
The Atlas of Surveillance Hits Major Milestones: 2023 in Review - That's what a New York Police Department lieutenant wrote on LinkedIn after someone sent him a link to the Atlas of Surveillance, EFF's moonshot effort to document which U.S. law enforcement agencies are using which technologies, including drones, ...
1 year ago Eff.org
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
Location Data Tracks Abortion Clinic Visits. Here's What to Know - Our concerns about the selling and misuse of location data for those seeking reproductive and gender healthcare are escalating amid a recent wave of cases and incidents demonstrating that the digital trail we leave is being used by anti-abortion ...
1 year ago Eff.org Hunters
The House Intelligence Committee's Surveillance 'Reform' Bill is a Farce - Earlier this week, both the House Committee on the Judiciary and the House Permanent Select Committee on Intelligence marked up two very different bills, both of which would reauthorize Section 702 of the Foreign Intelligence Surveillance Act-but in ...
1 year ago Eff.org
Pegasus Spyware Targets Jordanian Civil Society in Wide-Ranging Attacks - Journalists, lawyers, and human-rights activists in the Middle Eastern nation of Jordan face increased surveillance from the controversial Pegasus spyware app, with nearly three dozen civilians targeted over the past four years. According to an ...
1 year ago Darkreading.com
EFF adds surveillance hub so Americans can check spying The Register - For a country that prides itself on being free, America does seem to have an awful lot of spying going on, as the new Street Surveillance Hub from the Electronic Frontier Foundation shows. The Hub contains detailed breakdowns of the type of ...
1 year ago Go.theregister.com Meow
Attack Vector vs Attack Surface: The Subtle Difference - Cybersecurity discussions about "Attack vectors" and "Attack surfaces" sometimes use these two terms interchangeably. This article guides you through the distinctions between attack vectors and attack surfaces to help you better understand the two ...
2 years ago Trendmicro.com
Recent Surveillance Revelations, Enduring Latin American Issues: 2023 Year in Review - The challenges in ensuring strong privacy safeguards, proper oversight of surveillance powers, and effective remedy for those arbitrarily affected continued during 2023 in Latin America. Amidst the Argentinian presidential elections, a thorny ...
1 year ago Eff.org
Microsoft to remove the Location History feature in Windows - “We are deprecating and removing the Location History feature, an API that allowed Cortana to access 24 hours of device history when location was enabled,” reads Microsoft's announcement. The API behind the feature, ...
5 months ago Bleepingcomputer.com
FTC bans data broker from selling Americans' location data - Today, the U.S. Federal Trade Commission banned data broker Outlogic, formerly X-Mode Social, from selling Americans' raw location data that could be used for tracking purposes. Under the order released today, the first time data brokers were barred ...
1 year ago Bleepingcomputer.com
Clear Spring Life and Annuity Company Announces Data Breach Following Ransomware Attack - On November 21, 2023, Clear Spring Life and Annuity Company filed a notice of data breach with the Attorney General of California after discovering a February 2023 ransomware attack. In this notice, Clear Spring explains that the incident resulted in ...
1 year ago Jdsupra.com
How to Stop Advertisers From Tracking Your Teen Across the Internet | Electronic Frontier Foundation - At 13, children transition abruptly between two extremes—from potential helicopter parental surveillance to surveillance advertising that connects their online activity and search history to marketers serving targeted ads. The Children’s Online ...
9 months ago Eff.org
What is Proposition E and Why Should San Francisco Voters Oppose It? - In addition to removing certain police oversight authority from the Police Commission and expanding the circumstances under which police may conduct high-speed vehicle chases, Proposition E would also amend existing laws passed in 2019 to protect San ...
1 year ago Eff.org
Ring Will Stop Giving Cops a Free Pass on Warrantless Video Requests - Ring, the Amazon-owned home surveillance company known for its long history of partnering with police, announced today that it plans to shut down a controversial tool that allows law enforcement to ask users to share their footage without first ...
1 year ago Wired.com
Unlocking Data Privacy: Mine's No-Code Approach Nets $30 Million in Funding - An Israeli data privacy company, Mine Inc., has announced that it has completed a $30 million Series B fundraising round led by Battery Ventures, PayPal Ventures, as well as the investment arm of US insurance giant Nationwide, with the participation ...
1 year ago Cysecurity.news
CVE-2021-38687 - A stack buffer overflow vulnerability has been reported to affect QNAP NAS running Surveillance Station. If exploited, this vulnerability allows attackers to execute arbitrary code. We have already fixed this vulnerability in the following versions ...
3 years ago
CVE-2023-29129 - A vulnerability has been identified in Mendix SAML (Mendix 7 compatible) (All versions > V1.17.3 < V1.18.0), Mendix SAML (Mendix 7 compatible) (All versions > V1.16.4 < V1.17.3), Mendix SAML (Mendix 8 compatible) (All versions > V2.3.0 ...
1 year ago
Nippon Steel Solutions 0-Day Network Vulnerability Exposes Users' Personal Information - Nippon Steel Solutions has disclosed a significant data breach affecting customer, partner, and employee personal information following a zero-day cyber attack that exploited a previously unknown software vulnerability in their network ...
2 weeks ago Cybersecuritynews.com

Latest Cyber News


Cyber Trends (last 7 days)