Close Menu
Finsider

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    TRX may climb toward $0.50 but PayFi alternatives are stealing market share

    August 3, 2025

    Strategies for Escaping Debt Without Compromising Your Retirement

    August 3, 2025

    WisdomTree Q2 Assets Rise on European Flows and Gains

    August 3, 2025
    Facebook X (Twitter) Instagram
    Trending
    • TRX may climb toward $0.50 but PayFi alternatives are stealing market share
    • Strategies for Escaping Debt Without Compromising Your Retirement
    • WisdomTree Q2 Assets Rise on European Flows and Gains
    • Boost Team Productivity and Security With Windows 11 Pro, Now $15 for Life
    • The ‘120 Minus You Rule’ of Retirement
    • Tim Cook reportedly tells employees Apple ‘must’ win in AI
    • The Rolls-Royce share price smashed its own record this week. Is it too late to buy?
    • DOGE targets $0.80 but newer tokens are attracting long-term whales
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Finsider
    • Markets & Ecomony
    • Tech & Innovation
    • Money & Wealth
    • Business & Startups
    • Visa & Residency
    Finsider
    Home»Tech & Innovation»A surveillance vendor was caught exploiting a new SS7 attack to track people’s phone locations
    Tech & Innovation

    A surveillance vendor was caught exploiting a new SS7 attack to track people’s phone locations

    FinsiderBy FinsiderJuly 18, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    A surveillance vendor was caught exploiting a new SS7 attack to track people's phone locations
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Security researchers say they have caught a surveillance company in the Middle East exploiting a new attack capable of tricking phone operators into disclosing a cell subscriber’s location.

    The attack relies on bypassing security protections that carriers have put in place to protect intruders from accessing SS7, or Signaling System 7, a private set of protocols used by the global phone carriers to route subscribers’ calls and text messages around the world. 

    SS7 also allows the carriers to request information about which cell tower a subscriber’s phone is connected to, typically used for accurately billing customers when they call or text someone from overseas, for example. 

    Researchers at Enea, a cybersecurity company that provides protections for phone carriers, said this week that they have observed the unnamed surveillance vendor exploiting the new bypass attack as far back as late 2024 to obtain the locations of people’s phones without their knowledge.

    Enea VP of Technology Cathal Mc Daid, who co-authored the blog post, told TechCrunch that the company observed the surveillance vendor target “just a few subscribers” and that the attack did not work against all phone carriers. 

    Mc Daid said that the bypass attack allows the surveillance vendor to locate an individual to the nearest cell tower, which in urban or densely populated areas could be narrowed to a few hundred meters.

    Enea notified the phone operator it observed the exploit being used in, but declined to name the surveillance vendor, except to note it was based in the Middle East. 

    Mc Daid told TechCrunch that the attack was part of an increasing trend in malicious operators using these kinds of exploits to obtain a person’s location, warning that the vendors behind their use “would not be discovering and using them if they were not successful somewhere.”

    “We anticipate that more will be found and used,” Mc Daid said.

    Surveillance vendors, which can include spyware makers and providers of bulk internet traffic, are private companies that typically work exclusively for government customers to conduct intelligence-gathering operations against individuals. Governments often claim to use spyware and other exploitative technologies against serious criminals, but the tools have also been used to target members of civil society, including journalists and activists. 

    In the past, surveillance vendors have gained access to SS7 by way of a local phone operator, a misused leased “global title,” or through a government connection. 

    But due to the nature of these attacks happening at the cell network level, there is little that phone subscribers can do to defend against exploitation. Rather, defending against these attacks rests largely on the telecom companies. 

    In recent years, phone companies have installed firewalls and other cybersecurity protections to defend against SS7 attacks, but the patchwork nature of the global cell network means that not all carriers are as protected as others, including in the United States.

    According to a letter sent to Sen. Ron Wyden’s office last year, the U.S. Department of Homeland Security said as far back as 2017 that several countries, notably China, Iran, Israel, and Russia, have used vulnerabilities in SS7 to “exploit U.S. subscribers.” Saudi Arabia has also been found abusing flaws in SS7 to conduct surveillance of its citizens in the United States.

    attack caught exploiting locations peoples phone SS7 surveillance track vendor
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous Article3 Ways to Mitigate Executive Turnover
    Next Article Analyst Report: Travelers Companies Inc.
    Finsider
    • Website

    Related Posts

    Tech & Innovation

    Tim Cook reportedly tells employees Apple ‘must’ win in AI

    August 2, 2025
    Tech & Innovation

    What To Do If Your Amazon Fire TV Stick Is Stuck On The Logo

    August 2, 2025
    Tech & Innovation

    Venture firm CRV raises $750M, downsizing after returning capital to investors

    August 2, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    TRX may climb toward $0.50 but PayFi alternatives are stealing market share

    August 3, 2025

    Cursor snaps up enterprise startup Koala in challenge to GitHub Copilot

    July 18, 2025

    What is Mistral AI? Everything to know about the OpenAI competitor

    July 18, 2025
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Using Gen AI for Early-Stage Market Research

    July 18, 2025

    Cursor snaps up enterprise startup Koala in challenge to GitHub Copilot

    July 18, 2025

    What is Mistral AI? Everything to know about the OpenAI competitor

    July 18, 2025
    news

    TRX may climb toward $0.50 but PayFi alternatives are stealing market share

    August 3, 2025

    Strategies for Escaping Debt Without Compromising Your Retirement

    August 3, 2025

    WisdomTree Q2 Assets Rise on European Flows and Gains

    August 3, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    © 2020 - 2025 The Finsider . Powered by LINC GLOBAL Inc.
    • Contact us
    • Guest Post Policy
    • Privacy Policy
    • Terms of Service

    Type above and press Enter to search. Press Esc to cancel.