Criminals are Now Exploiting SS7 Flaws to Hack Smartphone Two-Factor Authentication Systems
I’ve previously written about the serious vulnerabilities in the SS7 phone routing system. Basically, the system doesn’t authenticate messages. Now, criminals are using it to hack smartphone-based two-factor authentication systems:
In short, the issue with SS7 is that the network believes whatever you tell it. SS7 is especially used for data-roaming: when a phone user goes outside their own provider’s coverage, messages still need to get routed to them. But anyone with SS7 access, which can be purchased for around 1000 Euros according to The Süddeutsche Zeitung, can send a routing request, and the network may not authenticate where the message is coming from.
That allows the attacker to direct a target’s text messages to another device, and, in the case of the bank accounts, steal any codes needed to login or greenlight money transfers (after the hackers obtained victim passwords).
Ninja • May 10, 2017 7:03 AM
Considering some banks are still using 6 digits, all number passwords it’s going to take a lot of damage before this is fixed. I’m trying to disable the option of receiving 2fa codes in my phones but some services don’t have such option unless you remove your phone number entirely, which is not desirable to me for a number of reasons on some services. For now I’m relying on a password manager with 2FA that has no connection to any phone aside from the code generator plus the standalone printed codes. It will surely mitigate any possible exposure but it is far from what I would consider fine. Heck, there’s no peace of mind if you want to actually do your security right, there will always be some caveat.