Exploit SS7 to Track Device Location (T1450)

View on ATT&CK

In Playbook

Technique & Subtechniques

  • Exploit SS7 to Track Device Location

Associated Tactics

  • Network Effects

Network Effects (TA0038)

The adversary is trying to intercept or manipulate network traffic to or from a device. This category refers to network-based techniques that an adversary may be able to use to fulfill his or her objectives without access to the mobile device itself. These include techniques to intercept or manipulate network traffic to and from the mobile device.

View on ATT&CK

Procedure Examples

Description Source(s)
3GPP. (2000, January). A Guide to 3rd Generation Security. Retrieved December 19, 2016. 3GPP-Security
Communications Security, Reliability, Interoperability Council (CSRIC). (2017, March). Working Group 10 Legacy Systems Risk Reductions Final Report. Retrieved May 24, 2017. CSRIC5-WG10-FinalReport
CSRIC-WG1-FinalReport CSRIC-WG1-FinalReport
Positive Technologies. (n.d.). SS7 Attack Discovery. Retrieved December 19, 2016. Positive-SS7
Tobias Engel. (2008, December). Locating Mobile Phones using SS7. Retrieved December 19, 2016. Engel-SS7-2008
Tobias Engel. (2014, December). SS7: Locate. Track. Manipulate.. Retrieved December 19, 2016. Engel-SS7
NIST Mobile Threat Catalogue