SS7 Attack Sequences
Detailed step-by-step analysis of SS7 attack methodologies with technical implementation details, code examples, and mitigation strategies.
Prerequisites
- Access to SS7 network
- Knowledge of target's MSISDN (phone number)
- SS7 exploitation tools (e.g., SigPloit)
Attack Steps
SendRoutingInfoForSM Request
Attacker sends SRI-SM request to victim's HLR, pretending to deliver an SMS
MAP: sendRoutingInfoForSM
MSISDN: +1234567890HLR Response
HLR responds with victim's IMSI and current serving MSC/VLR address
MAP: sendRoutingInfoForSM-Res
IMSI: 123456789012345
MSC/VLR: msc123.network.comAnyTimeInterrogation Request
Attacker sends ATI request to HLR for precise location information
MAP: anyTimeInterrogation
IMSI: 123456789012345
RequestedInfo: locationInformationSteps 4-7: HLR forwards request to MSC/VLR → MSC/VLR provides Cell Global Identity → HLR returns location to attacker → Attacker maps cell ID to physical coordinates
Result: Latitude: 37.7749, Longitude: -122.4194
Accuracy: 50m-2km (depending on cell density)Mitigation Strategies
Filter suspicious ATI requests and location-related operations
High EffectivenessPrevent direct HLR access for SMS-related operations
High EffectivenessKey Attack Steps
UpdateLocation Request
Attacker impersonates a VLR and sends UpdateLocation to victim's HLR
Location Update Process
HLR cancels legitimate VLR, sends subscriber profile to attacker's fake VLR
Call Routing & Interception
Incoming calls routed to attacker who forwards to victim while recording
Defense Mechanisms
High-Value Target
SMS interception is particularly dangerous for OTP-based authentication, enabling account takeovers and financial fraud.
Attack Flow
Protection Measures
SMS Home Routing
Route all SMS through home network for security inspection
Alternative Authentication
Use app-based authenticators (Google Authenticator, Authy) instead of SMS OTPs
SS7 Firewall
Filter suspicious SMS-related signaling messages