🔴🔴 𝙿𝙰𝚁𝚃 3 🔴🔴
𝚂𝙾 𝙷𝙴𝚁𝙴 𝙸𝚂 𝚃𝙷𝙴 𝙽𝙴𝚇𝚃 𝙰𝚁𝚃𝙸𝙲𝙻𝙴 𝙾𝙽 𝚂𝚂7
SS7 attacks can be used to bypass encryption
You can see the implication of hackers and cybercriminals tapping into that kind of data. And this is exactly what is happening. With just your phone number (which is an easily obtainable piece of public information), someone who has hacked into SS7 can:
Forward your calls and record or listen in to them
Read SMS text messages sent between devices
Track the location of a phone
What’s more worrying is that because SS7 allows attackers to read SMS messages, they can also bypass the end-to-end encryption provided by services such as WhatsApp, Telegram, Facebook, etc. This is possible due to an encryption workaround that uses a flaw in two-factor authentication.
For example, to log into Facebook on a new device, you need to fill in a password and a second code, which is sent to you via SMS. Because SS7 exploits allow reading such text messages, the attackers can obtain that code and log in with the user’s credentials. Using an identical approach, cybercriminals have been able to steal money from German banks.
To counter such attacks, you must first stop using regular calls and text messages, and opt for end-to-end encrypted chat and VoIP. Then, you might want to do away with regular telephony and SMS altogether – like we have done for Secure Phone. For more reliable two-factor authentication, you can use a token or an extra password, which is not sent to you via text, but through an encrypted channel.
🔴🔴 DIFFERENT SOURCES + PERSONAL KNOW.🔴🔴
𝙰𝚁𝚃𝙸𝙲𝙻𝙴 𝙱𝚈 :- @gustyvj
💥💥💥💥💥💥💥💥💥💥💥💥
𝙲𝙾𝙿𝚈 𝚆𝙸𝚃𝙷 𝙲𝚁𝙴𝙳𝙸𝚃S
➖@BlackHat_Hacking ➖
𝚂𝙾 𝙷𝙴𝚁𝙴 𝙸𝚂 𝚃𝙷𝙴 𝙽𝙴𝚇𝚃 𝙰𝚁𝚃𝙸𝙲𝙻𝙴 𝙾𝙽 𝚂𝚂7
SS7 attacks can be used to bypass encryption
You can see the implication of hackers and cybercriminals tapping into that kind of data. And this is exactly what is happening. With just your phone number (which is an easily obtainable piece of public information), someone who has hacked into SS7 can:
Forward your calls and record or listen in to them
Read SMS text messages sent between devices
Track the location of a phone
What’s more worrying is that because SS7 allows attackers to read SMS messages, they can also bypass the end-to-end encryption provided by services such as WhatsApp, Telegram, Facebook, etc. This is possible due to an encryption workaround that uses a flaw in two-factor authentication.
For example, to log into Facebook on a new device, you need to fill in a password and a second code, which is sent to you via SMS. Because SS7 exploits allow reading such text messages, the attackers can obtain that code and log in with the user’s credentials. Using an identical approach, cybercriminals have been able to steal money from German banks.
To counter such attacks, you must first stop using regular calls and text messages, and opt for end-to-end encrypted chat and VoIP. Then, you might want to do away with regular telephony and SMS altogether – like we have done for Secure Phone. For more reliable two-factor authentication, you can use a token or an extra password, which is not sent to you via text, but through an encrypted channel.
🔴🔴 DIFFERENT SOURCES + PERSONAL KNOW.🔴🔴
𝙰𝚁𝚃𝙸𝙲𝙻𝙴 𝙱𝚈 :- @gustyvj
💥💥💥💥💥💥💥💥💥💥💥💥
𝙲𝙾𝙿𝚈 𝚆𝙸𝚃𝙷 𝙲𝚁𝙴𝙳𝙸𝚃S
➖@BlackHat_Hacking ➖