Advertisement

Wyden demands answers from telecom giants, NSA over SS7 vulnerabilities

Oregon Senator Ron Wyden is demanding to know how America's largest telecommunications companies plan to stop hackers from exploiting vulnerabilities in an outdated mobile-data transfer framework that remains fundamental to how cellphones function.
Sen. Ron Wyden, D-Ore., pictured at the Web 2.0 Summit (Flickr / JD Lasica)

Sen. Ron Wyden, D-Ore., is demanding to know how America’s largest telecommunications companies plan to stop hackers from exploiting vulnerabilities in an outdated mobile-data transfer framework that remains fundamental to how cellphones function.

Wyden sent a series of letters Thursday to the chief executives of AT&T, Sprint, Verizon and T-Mobile to learn about their efforts to mitigate risks associated with weak points in Signaling System No 7, or SS7, a set of protocols that allow for different mobile phone networks to connect to one another. In addition, he also sent a letter to the NSA director, Adm. Michael Rogers, requesting information about past attempts by adversaries to hack into SS7 for the purpose of spying on Americans, including military personnel, civilians and companies.

The Daily Beast was the first to report on Wyden’s multiple letters.

There are well-known security issues with SS7, including reported cases of intelligence agencies exploiting vulnerabilities in the framework to remotely eavesdrop on targets through their cellphones. Governments, cybercriminals and defense contractors continue to be interested in attacking the framework because of the access it provides to a continuous flow of communications, data, records and the locations of specific devices. By breaching SS7, a hacker would be able to access GPS data to track down an individual.

Advertisement

“I understand that some wireless carriers are further along in the process of implementing protections against SS7 attacks than others. However, information about the progress that each carrier has made, and the extent to which their customers remain vulnerable to SS7 spying is not currently available to the general public, nor even to DHS,” the letters read. “The continued existence of these vulnerabilities and the ease with which they can be exploited by hackers and foreign governments poses a serious threat to U.S. national and economic security.”

The letters are the latest in a broader effort, largely pioneered by Wyden and Rep. Ted Lieu, D-Calif., to inform the public on the existing security issues behind SS7, which was developed in 1975.

Wyden’s letters specifically ask for information about whether AT&T, Sprint, Verizon and T-Mobile have hired outside help to review threats to SS7; how they’ve worked with the Homeland Security Department to date on the issue; and details about how certain vulnerabilities in SS7 could negatively impact customers if a breach were to occur.

Multiple federal agencies, including most recently DHS and the FCC, have published reports focused on the security issues underpinning SS7. DHS, for example, earlier this year noted that there is a realizable threat to SS7 from hackers because “there are tens of thousands of entry points worldwide, many of which are controlled by countries or organizations that support terrorism or espionage.”

Wyden’s request calls for companies to respond before Oct. 13 to his questions.

Advertisement

You can read the letters here:

AT&T | NSA | Sprint | T-MobileVerizon

Chris Bing

Written by Chris Bing

Christopher J. Bing is a cybersecurity reporter for CyberScoop. He has written about security, technology and policy for the American City Business Journals, DC Inno, International Policy Digest and The Daily Caller. Chris became interested in journalism as a result of growing up in Venezuela and watching the country shift from a democracy to a dictatorship between 1991 and 2009. Chris is an alumnus of St. Marys College of Maryland, a small liberal arts school based in Southern Maryland. He's a fan of Premier League football, authentic Laotian food and his dog, Sam.

Latest Podcasts