Categories: News

Telecoms protocol from 1975 exploited to target 20 crypto executives

At least 20 crypto executives and customers of an Israeli telecommunications company were targeted in a sophisticated SS7 attack last month.

Hackers compromised the Telegram messenger and email accounts of multiple cryptocurrency executives last month by exploiting a vulnerability in a decades old protocol. 

The fraudsters are believed to have been trying to intercept two-factor authentication codes of victims in an attack on Israel-based telecommunications provider Partner Communications Company, formerly known as Orange Israel.

The attacks are currently being investigated by Israel’s National Cyber Security Authority, and national intelligence agency Mossad.

According to cybersecurity publication Bleeping Computer, the devices of at least 20 Partner clients were compromised.

Israel-based cybersecurity firm Pandora Security’s analysis of the event suggests the devices were likely breached via a Signaling System 7 (SS7) attack. SS7 comprises a set of protocols that are used to facilitate the exchange of information within public switched telephone networks (PSTNs) interacting over digital signaling networks.

Hackers can exploit SS7 to intercept text messages and calls by using a roaming feature and “updating the location of their device as if it registered to a different network.”

Despite first being developed in 1975, the SS7 protocol is currently in widespread use globally.

Pandora co-founder Tsashi Ganot warned that national governments must update their telecommunications infrastructure to protect against modern security threats.

He said the hackers had also impersonated their victims on Telegram in unsuccessful attempts to lure close acquaintances into making crypto trades:

“In some cases, the hackers posed as the victims in their [Telegram] accounts and wrote to some of their acquaintances, asking to exchange BTC for ETC and the like […] as far as we’re aware no one fell for the bait.” 

The SS7 attacks are reminiscent of SIM-swapping that reassigns the phone number associated with a victim’s SIM-card to a device under the hackers’ control. 

U.S.-based telecom providers have faced multiple lawsuits from crypto executive clients that have been targeted by SIM-swap attacks.

[…]
Learn more

crypto

Leave a Comment

Recent Posts

Mt. Gox Bitcoin Movements: Market Impact and Ex-Client Risks

The defunct cryptocurrency exchange Mt. Gox is making waves again, this time with huge Bitcoin…

4 months ago

Taproot Assets: Revolutionizing Bitcoin’s Lightning Network

Lightning Labs, a leading developer in Bitcoin's Lightning Network ecosystem, has launched a groundbreaking protocol…

4 months ago

Whale With Ethereum Foundation Link Transfers 92,500 ETH Worth $288M 

According to onchain data, a significant whale holding over 92,500 ether moved the funds to…

4 months ago

Discover the Skinny Bob MemeCoin: NFTs, Multi-Chain, and Cosmic Humor

🛸Inspired by the internet's favorite extraterrestrial, Skinny Bob MemeCoin is revolutionizing the cryptosphere across multiple…

4 months ago

Uncovering the Risks of NFTs for Creators and Buyers

NFTs, or non-fungible tokens, are transforming various industries, including art, music, sports, and real estate.…

4 months ago

Proton Technologies AG Unveils Open Source Bitcoin Wallet

Proton Technologies AG, the Swiss company renowned for its encrypted email and VPN services, has…

4 months ago