Key Moments

Exposing The Flaw In Our Phone System

VeritasiumVeritasium
Science & Technology4 min read32 min video
Sep 21, 2024|10,575,646 views|363,326|14,390
Save to Pod
TL;DR

The SS7 phone network has critical flaws, allowing remote interception of calls and texts.

Key Insights

1

The SS7 protocol, designed in the 1980s, has fundamental security vulnerabilities that allow widespread spying.

2

Attackers can intercept phone calls and text messages by exploiting SS7, enabling theft of two-factor authentication codes.

3

Location tracking is also possible via SS7, pinpointing users with surprising accuracy without GPS.

4

While newer protocols exist, SS7's widespread use in legacy systems (2G/3G) and its network effects prevent rapid replacement.

5

Personal protection includes using authenticator apps over SMS for 2FA and opting for encrypted calling services.

THE RISE OF BLUE BOXING AND EARLY EXPLOITS

The history of phone system exploitation began with 'blue boxes' in the 1970s. These devices hacked the telephone network to make long-distance calls for free, demonstrating early vulnerabilities. This era highlighted how a small group could manipulate vast infrastructure. The innovation stemmed from the need to automate manual call connections, leading to rotary dials and later, Touch-Tone phones. Each technological leap, while improving efficiency, also introduced new potential exploit vectors.

THE LIMITATIONS OF ANALOG AND THE BIRTH OF SS7

Early phone systems relied on analog signals. Clear control signals became distorted over longer distances, hindering long-distance automation. The introduction of Touch-Tone phones used tones within the voice band, solving the distance issue but creating new vulnerabilities. Notably, a 2600Hz tone could trick the network into thinking a call was disconnected, allowing free long-distance calls. This led to the development of Signaling System No. 7 (SS7), a separate digital line for control signals to enhance security and reliability.

SS7'S ARCHITECTURE AND GROWING VULNERABILITIES

SS7 was designed in an era dominated by a few trusted telecom operators. It uses Global Titles (GTs) for addressing, and networks generally trust messages from known GTs. This 'walled garden' approach assumed a closed, secure network. However, the landscape has dramatically shifted with over 4,500 networks globally, many of which are less trustworthy. Entities can now lease SS7 access for a few thousand dollars per month, creating numerous entry points for malicious actors.

THE THREE STEPS TO EXPLOITING SS7

Exploiting SS7 typically involves three key steps. First, infiltration, which is gaining access to the SS7 network, often through leased Global Titles. Second, gaining trust, which involves obtaining the target's phone number and uniquely identifying SIM card information like the International Mobile Subscriber Identity (IMSI). Third, the attack phase, where modified SS7 messages are sent to intercept calls, reroute text messages, or track location.

INTERCEPTING CALLS AND TEXT MESSAGES

Once SS7 access is secured and the target's IMSI is known, attackers can intercept calls and text messages. By tricking the network into thinking the target phone is roaming, calls can be rerouted to a number controlled by the attacker. This same technique allows for the interception of SMS messages, including crucial one-time passwords used for two-factor authentication (2FA). This capability poses a significant risk to online accounts, including financial services, as demonstrated by hacking a YouTube account.

LOCATION TRACKING AND REAL-WORLD CONSEQUENCES

Beyond communication interception, SS7 enables sophisticated location tracking. By sending specific commands to the switching center connected to a user's device, attackers can determine the cell tower a phone is connected to, providing location accuracy down to a city block. This has been used to track individuals, including public figures. The Princess Latifa case highlighted how SS7 attacks, combined with other surveillance tools, could be used to locate and abduct individuals, demonstrating the severe real-world consequences of these vulnerabilities.

THE ENDURING CHALLENGE OF SS7 REPLACEMENT

Despite its known flaws, SS7 remains the backbone for 2G and 3G communications. Newer, more secure protocols exist for 4G and 5G networks, but widespread adoption is hindered by network effects and the need for legacy support. Many critical systems, like mandatory emergency call buttons in cars, still rely on older technologies. Consequently, SS7 is likely to persist for many years, estimated to be another 10-20 years, despite ongoing exploits and the availability of more secure alternatives.

PERSONAL PROTECTIONS AND THE IMPORTANCE OF KNOWLEDGE

While individual protection against SS7 exploitation is limited, users can take steps to mitigate risks. It's advised to avoid SMS-based two-factor authentication whenever possible, opting instead for authenticator apps or hardware tokens. For calls, encrypted internet-based services like Signal or WhatsApp offer greater privacy. Ultimately, the video emphasizes that building knowledge and problem-solving skills is the best defense in an ever-evolving technological landscape, empowering individuals to understand and navigate complex issues like SS7 vulnerabilities.

Protecting Yourself from SS7 Vulnerabilities

Practical takeaways from this episode

Do This

Choose alternatives to SMS-based two-factor authentication (use authenticator apps or hardware tokens).
Use encrypted internet-based calling services like Signal or WhatsApp for private calls.
Stay informed about cybersecurity threats and continuously build your knowledge and problem-solving skills.

Avoid This

Rely solely on SMS for two-factor authentication if other options are available.
Assume your phone calls are private when using standard cellular networks, especially if SS7 exploits are prevalent.
Dismiss potential privacy intrusions; even if you have 'nothing to hide,' widespread surveillance can be a threat to democracy.

SS7 Attack Costs and Vulnerabilities

Data extracted from this episode

ItemCost/DescriptionVulnerability/Impact
SS7 ConnectionFew thousand per monthAllows access to the global SS7 network.
Leased US-based GT$113,000 per monthIllegal leasing demonstrates risk of trusted access.
Zero-click hacks (Pegasus)Over $4 million per exploitAdvanced surveillance, gains complete phone access.
Malicious SS7 RequestsMillions per yearTracking and potential interception attempts.
SS7 Location TrackingIdentifies cell tower connectionPlaces target within ~100m in urban areas.
Spyware (Pegasus) PurchaseCostly, requires specific dataTargets specific software/vulnerabilities after gathering device info.
Pre-2014 SS7 LocationAnytime Interrogation RequestProvided location without knowing IMSI; largely deprecated but indicative of past risks.

Common Questions

Attackers exploit SS7 vulnerabilities to trick the network into thinking a phone is roaming, rerouting calls and messages to their control. This allows them to intercept communications and steal sensitive information like two-factor authentication codes.

Topics

Mentioned in this video

personCarsten Niel

Cybersecurity specialist who assists in demonstrating SS7 attack methods.

conceptGlobal Titles (GT)

Unique addresses used in SS7 to identify where network requests are coming from, analogous to IP addresses on the internet.

productTouchtone telephone

An advancement in telephone technology that used dual-tone multi-frequency signaling, which created new opportunities for exploitation.

personTina Jøorgensen

Princess Latifa's Finnish martial arts instructor, who helped her attempt to escape.

personHervé Jaubert

Former French intelligence officer and captain of the yacht Princess Latifa used to escape.

organizationChaos Computer Club

A hacker collective from Berlin associated with a strong belief in privacy as a prerequisite for democracy.

conceptSignaling System No. 7 (SS7)

A protocol used for call setup, control, and other services in telecommunication networks, which is known to have significant security vulnerabilities.

personPrincess Latifa Al Maktoum

Member of the Dubai royal family whose escape and subsequent abduction highlight the dangers of SS7 exploits.

companyVeritasium

The YouTube channel producing this video, with Derek as a host or representative.

personTed Lieu

US Congressman who was tracked using SS7 location methods by researchers.

conceptInternational Mobile Subscriber Identity (IMSI)

A unique 15-digit identifier belonging exclusively to a SIM card, crucial for identifying and targeting mobile subscribers in SS7 attacks.

companyHacksmith

A YouTube channel or entity that calls Lonus as part of the demonstration, unknowingly connecting to Derek.

companyRadio Shack

Mentioned as the source of parts used to build early phone hacking devices like the blue box.

personAlexandra de Ola

Cybersecurity specialist who assists in demonstrating SS7 attack methods.

personSheikh Mohammed

Ruler of Dubai and father of Princess Latifa, implicated in her detention and the use of surveillance technology.

companyNSO Group

An Israeli cyber surveillance firm known for developing spyware like Pegasus and acquiring SS7 tracking companies.

More from Veritasium

View all 90 summaries

Found this useful? Build your knowledge library

Get AI-powered summaries of any YouTube video, podcast, or article in seconds. Save them to your personal pods and access them anytime.

Try Summify free