Exploit SS7 to Redirect Phone Calls/SMS (T1449)

View on ATT&CK

In Playbook

Technique & Subtechniques

  • Exploit SS7 to Redirect Phone Calls/SMS

Associated Tactics

  • Network Effects

Network Effects (TA0038)

The adversary is trying to intercept or manipulate network traffic to or from a device. This category refers to network-based techniques that an adversary may be able to use to fulfill his or her objectives without access to the mobile device itself. These include techniques to intercept or manipulate network traffic to and from the mobile device.

View on ATT&CK

Procedure Examples

Description Source(s)
3GPP. (2000, January). A Guide to 3rd Generation Security. Retrieved December 19, 2016. 3GPP-Security
Communications Security, Reliability, Interoperability Council (CSRIC). (2017, March). Working Group 10 Legacy Systems Risk Reductions Final Report. Retrieved May 24, 2017. CSRIC5-WG10-FinalReport
Iain Thomson. (2017, May 3). After years of warnings, mobile network hackers exploit SS7 flaws to drain bank accounts. Retrieved November 8, 2018. TheRegister-SS7
Positive Technologies. (n.d.). SS7 Attack Discovery. Retrieved December 19, 2016. Positive-SS7
Tobias Engel. (2008, December). Locating Mobile Phones using SS7. Retrieved December 19, 2016. Engel-SS7-2008
Tobias Engel. (2014, December). SS7: Locate. Track. Manipulate.. Retrieved December 19, 2016. Engel-SS7
NIST Mobile Threat Catalogue