T1450 Exploit SS7 to Track Device Location
An adversary could exploit signaling system vulnerabilities to track the location of mobile devices. 1 2 3 4 5
Item | Value |
---|---|
ID | T1450 |
Sub-techniques | |
Tactics | TA0038 |
Platforms | Android, iOS |
Version | 1.1 |
Created | 25 October 2017 |
Last Modified | 03 February 2019 |
Procedure Examples
ID | Name | Description |
---|---|---|
S0602 | Circles | Circles can track the location of mobile devices.7 |
Mitigations
ID | Mitigation | Description |
---|---|---|
M1014 | Interconnection Filtering | - |
References
-
Tobias Engel. (2014, December). SS7: Locate. Track. Manipulate.. Retrieved December 19, 2016. ↩
-
Tobias Engel. (2008, December). Locating Mobile Phones using SS7. Retrieved December 19, 2016. ↩
-
3GPP. (2000, January). A Guide to 3rd Generation Security. Retrieved December 19, 2016. ↩
-
Positive Technologies. (n.d.). SS7 Attack Discovery. Retrieved December 19, 2016. ↩
-
Communications Security, Reliability, Interoperability Council (CSRIC). (2017, March). Working Group 10 Legacy Systems Risk Reductions Final Report. Retrieved May 24, 2017. ↩
-
Bill Marczak, John Scott-Railton, Siddharth Prakash Rao, Siena Anstis, and Ron Deibert. (2020, December 1). Running in Circles Uncovering the Clients of Cyberespionage Firm Circles. Retrieved December 23, 2020. ↩