Surveillance Shenanigans: How Hackers Outsmart SS7 to Track Your Location!
Enea reveals a new surveillance attack technique bypassing SS7 protocol protections through TCAP manipulation. By extending Tag codes, attackers hide IMSI fields, tricking telecoms into disclosing user locations. This sneaky method, active since late 2024, exploits outdated security stacks, leaving mobile operators scratching their heads and questioning their life choices.

Hot Take:
Looks like surveillance companies have found a way to turn telecommunications networks into their own personal GPS systems. If they keep this up, they might as well start offering free maps with a “You Are Here” arrow pointing to every unsuspecting user.
Key Points:
- Surveillance company exploits SS7 protocol to track user locations.
- Technique involves TCAP manipulation with extended Tag code in PSI commands.
- Mobile operators’ security checks bypassed due to ‘hidden’ IMSI fields.
- Attack likely successful due to outdated SS7 software stacks.
- Enea recommends blocking malformed PDU structures to mitigate attacks.
Already a member? Log in here