Weaponizing Mobile Infrastructure
This talk demonstrates how mobile infrastructure, specifically SS7 and Diameter signaling protocols, can be weaponized by state-sponsored actors to perform surveillance, location tracking, and account takeovers. The speaker analyzes how signaling vulnerabilities are exploited to bypass security controls and facilitate unauthorized access to subscriber data and social media accounts. The presentation highlights the critical need for mobile operators to implement robust threat intelligence and signaling firewalls to mitigate these sophisticated, cross-border attacks. The research emphasizes that standard security guidelines are insufficient against adversaries using advanced fuzzing and signaling manipulation techniques.
Weaponizing Signaling Protocols: How SS7 and Diameter Vulnerabilities Enable Global Surveillance
TLDR: Mobile infrastructure protocols like SS7 and Diameter are fundamentally insecure, allowing attackers to perform location tracking, intercept SMS, and hijack social media accounts. This research demonstrates how state-sponsored actors use signaling manipulation and fuzzing to bypass existing security controls. Pentesters and researchers should focus on identifying these protocol-level weaknesses, as standard security guidelines are currently failing to stop these sophisticated, cross-border attacks.
Mobile networks are the backbone of global communication, yet they rely on legacy signaling protocols that were never designed with modern security in mind. While developers obsess over securing web applications and cloud APIs, the underlying infrastructure that routes our SMS and manages our roaming remains a massive, often overlooked, attack surface. Recent research presented at Black Hat 2023 highlights how state-sponsored actors are weaponizing SS7 and Diameter protocols to conduct large-scale surveillance and account takeovers, proving that the trust-based architecture of these networks is a liability.
The Mechanics of Signaling Exploitation
At the core of this issue is the inherent lack of authentication in legacy signaling protocols. SS7 (Signaling System No. 7) and its successor, Diameter, were built on the assumption that only trusted telecommunications carriers would have access to the network. Today, that assumption is dead. Attackers can gain access to these networks through compromised roaming agreements or by purchasing access from unscrupulous providers.
Once inside, an attacker can perform network discovery to map the topology of a target carrier. By sending specially crafted packets, they can identify active network elements and subscriber locations. The research specifically points to the manipulation of TCAP (Transaction Capabilities Application Part) encoding as a primary vector. By injecting malformed TCAP messages, an attacker can trigger unexpected behavior in the target's network nodes.
For example, an attacker might send a SendRoutingInfoForSM request to retrieve the IMSI and current serving MSC (Mobile Switching Center) address of a target subscriber. This is not a bug in the traditional sense; it is a feature of the protocol being used for malicious intent. When combined with fuzzing techniques, these protocols can be forced to leak sensitive subscriber data or even bypass authentication checks.
Bypassing Security Controls with TCAP Manipulation
Standard security guidelines, such as those outlined in GSMA FS.11, provide a baseline for hardening, but they are not a silver bullet. The research demonstrates that attackers are actively using techniques that fall outside these guidelines, effectively treating them as zero-day exploits.
One specific technique involves manipulating the TCAP transaction ID length. While the protocol expects a four-byte length, an attacker can send an eight-byte transaction ID. If the receiving node is not configured to strictly validate this field, it may cause a decoding failure that doesn't drop the connection but instead allows the malformed message to propagate further into the network. This can be used to perform a "fake location update," tricking the network into routing SMS traffic—including two-factor authentication codes—to the attacker's controlled infrastructure.
# Conceptual structure of a malformed TCAP message
# Instead of standard 4-byte TCAP Transaction ID:
[Protocol: TCAP] [Transaction ID: 0x01020304] [Component: MAP_INVOKE]
# Attacker injects 8-byte Transaction ID to trigger decoding errors:
[Protocol: TCAP] [Transaction ID: 0x0102030405060708] [Component: MAP_INVOKE]
This level of manipulation is highly effective because it exploits the gap between protocol specifications and vendor implementations. Even if a firewall is in place, it may be configured to look for known attack patterns rather than protocol anomalies, allowing these "zero-day" signaling attacks to pass through undetected.
Real-World Impact and Pentesting Implications
For a penetration tester, the risk here is not just theoretical. If you are engaged to test a mobile operator's infrastructure, your focus should be on the signaling gateway. Can you send an unsolicited UpdateLocation request? Can you query the subscriber database for arbitrary IMSIs? If you can, you have effectively demonstrated a path to full account takeover for any user on that network.
The impact is particularly severe for high-value targets. By hijacking the signaling path, an attacker can intercept the SMS-based 2FA tokens used by almost every major financial and social media platform. This bypasses the primary security layer of these services, rendering the user's password irrelevant. The research confirms that these attacks are not just targeting individuals but are being used to map entire networks, providing the reconnaissance necessary for more destructive actions, such as large-scale denial-of-service attacks against critical infrastructure.
The Path Forward for Defenders
Defending against these attacks requires moving beyond static firewall rules. Operators must adopt a mindset of continuous threat intelligence, treating signaling traffic with the same level of scrutiny as public-facing web traffic. This means implementing robust monitoring for anomalous signaling patterns, such as sudden spikes in location update requests or traffic originating from unexpected roaming partners.
Furthermore, the industry needs a more unified approach to intelligence sharing. As the research suggests, if an attack is detected on one operator, that information should be shared in real-time to protect others. Frameworks like STIX/TAXII are standard in the enterprise security world and should be adapted for the telecommunications sector to facilitate this exchange.
Security is not a static state achieved by following a set of guidelines. It is a constant process of identifying where the protocol's design meets the reality of modern exploitation. If you are working in this space, stop assuming the signaling layer is secure. Start looking at the packets, look for the anomalies, and assume that if a protocol can be abused, it already is.
Vulnerability Classes
Attack Techniques
OWASP Categories
All Tags
Up Next From This Conference

A New Attack Interface In Java Applications

Inference Attacks on Endpoint Privacy Zones in Fitness Tracking Social Networks

Abusing Azure Active Directory: From MFA Bypass to Listing Global Administrators
Similar Talks

Inside the FBI's Secret Encrypted Phone Company 'Anom'

Kill List: Hacking an Assassination Site on the Dark Web

