AnyTimeInterrogation Attack
Advanced SS7 location tracking through HLR interrogation
High-Risk Attack Vector
Technical Summary
The AnyTimeInterrogation (ATI) MAP operation was designed to allow certain network entities to query subscriber information directly from the HLR at any time, regardless of the subscriber's status. This operation can be exploited by attackers to obtain detailed location information about target subscribers.
Attack Characteristics
Key Technical Details
MAP Operation
AnyTimeInterrogation (ATI) - MAP operation code 71
anyTimeInterrogation OPERATION ::= {
ARGUMENT AnyTimeInterrogationArg
RESULT AnyTimeInterrogationRes
ERRORS { ... }
}
Information Retrieved
- • Current serving MSC/VLR address
- • Cell Global Identity (CGI)
- • Location Area Identity (LAI)
- • Service Area Identity (SAI)
- • Subscriber state information
- • Location age timestamp
Attack Methodology
Technical Requirements
- Access to SS7 network (direct or via compromised operator)
- Knowledge of target's MSISDN (phone number)
- SS7 message crafting capabilities
- Global Title (GT) spoofing ability
- Understanding of MAP protocol operations
Network Access Methods
Direct SS7 Connection
Legitimate or illegitimate access to SS7 network infrastructure
Compromised Operator
Access through a compromised telecommunications operator
SS7 Gateway
Commercial SS7 gateway services or compromised gateways
Detection & Mitigation
Real-World Impact & Case Studies
Government Surveillance
Intelligence agencies have reportedly used ATI operations for mass surveillance programs, tracking political dissidents and journalists.
Corporate Espionage
Business competitors have used location tracking to monitor executive movements and gain competitive intelligence.
Criminal Activities
Criminal organizations have exploited ATI for stalking, kidnapping planning, and other illegal activities.
Privacy Violations
• Unauthorized tracking of personal movements
• Pattern-of-life analysis and behavioral profiling
• Violation of fundamental privacy rights
Physical Security Risks
• Facilitation of physical attacks or kidnapping
• Stalking and harassment enablement
• Compromise of witness protection programs
Business Impact
• Corporate espionage and competitive intelligence
• Compromise of business negotiations
• Reputational damage to telecommunications operators
Attacker
Crafts ATI message
HLR
Processes request
Location Data
Returned to attacker