Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

CISA Urges Companies to Secure Microsoft Intune Systems After Hackers Mass Wipe Stryker Devices

Tools for founders to navigate and move past conflicts

Rivian Sacrifices 2027 Profit Target to Push Deeper into Autonomy

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    Bot traffic to overtake human traffic by 2027, says Cloudflare CEO

    20 March 2026

    Multiverse Computing is pushing its compressed AI models into the mainstream

    19 March 2026

    Sam Altman’s thank you to coders draws memes

    19 March 2026

    The Pentagon is developing alternatives to Anthropic, the report said

    18 March 2026

    Mistral bets on ‘build your own AI’, as with OpenAI, Anthropic in business

    18 March 2026
  • Apps

    Bluesky Announces $100M Series B After CEO Transition

    20 March 2026

    Amazon is bringing Alexa+ to the UK

    19 March 2026

    Rebel Audio is a new AI podcasting tool aimed at first-time creators

    19 March 2026

    Google’s Personal Intelligence feature is expanding to all US users

    18 March 2026

    Kagi brings its “small web” of an all-human web to mobile devices

    18 March 2026
  • Crypto

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025

    Why Benchmark Made a Rare Crypto Bet on Trading App Fomo, with $17M Series A

    6 November 2025

    Solana co-founder Anatoly Yakovenko is a big fan of agentic coding

    30 October 2025

    MoviePass opens Mogul fantasy league game to the public

    29 October 2025
  • Fintech

    Nominations for the Startup Battlefield 200 are still open

    19 March 2026

    Kalshi’s legal woes pile up as Arizona files first criminal charges for ‘illegal gambling operation’

    17 March 2026

    Fuse raises $25M to disrupt legacy loan origination systems used by US credit unions

    16 March 2026

    India neobank Fi removes banking services on its platform

    11 March 2026

    X taps William Shatner to give invitations to his payment service, X Money

    4 March 2026
  • Hardware

    CEO Carl Pei says nothing about smartphone apps disappearing as they’re replaced by artificial intelligence agents

    18 March 2026

    MacBook Neo, AirPods Max 2, iPhone 17e and everything else Apple announced this month

    18 March 2026

    Oura enters India’s smart ring market with Ring 4

    17 March 2026

    Apple quietly launches AirPods Max 2

    17 March 2026

    The MacBook Neo is “the most repairable MacBook” in years, according to iFixit

    16 March 2026
  • Media & Entertainment

    Tubi joins forces with popular TikTokers to create original streaming content

    19 March 2026

    Patreon CEO calls AI companies’ fair use argument ‘bogus’, says creators should be paid

    18 March 2026

    Meet Vurt, the first mobile streaming platform for indie filmmakers embracing vertical video

    18 March 2026

    BuzzFeed debuts AI applications for new revenue

    17 March 2026

    Facebook makes it easy for creators to report copycats

    14 March 2026
  • Security

    CISA Urges Companies to Secure Microsoft Intune Systems After Hackers Mass Wipe Stryker Devices

    20 March 2026

    FBI seizes websites of pro-Iranian hacker group after devastating Stryker attack

    19 March 2026

    FBI is buying location data to track US citizens, director confirms

    19 March 2026

    Russians caught stealing personal data from Ukrainians with new advanced iPhone hacking tools

    18 March 2026

    Stryker says it is restoring systems after pro-Iranian hackers wiped out thousands of employee devices

    17 March 2026
  • Startups

    Tools for founders to navigate and move past conflicts

    20 March 2026

    Anori, Alphabet’s new X spinout, faces one of the world’s most expensive bureaucratic nightmares

    19 March 2026

    This startup wants to make enterprise software more like a prompt

    19 March 2026

    H&M wants to make clothes out of CO2 using this startup’s technology

    18 March 2026

    Why Garry Tan’s Claude Code setup has gotten so much love and hate

    18 March 2026
  • Transportation

    Rivian Sacrifices 2027 Profit Target to Push Deeper into Autonomy

    20 March 2026

    K2 will launch its first high-powered computing satellite into space

    19 March 2026

    EV startup Harbinger unveils smaller work truck with electric and hybrid variants

    18 March 2026

    Rivian spin-out Mind Robotics raises $500M for AI-powered industrial robots

    17 March 2026

    Drivers in fatal Ford BlueCruise crashes were likely distracted before the crash

    17 March 2026
  • Venture

    Sequen raised $16 million to bring TikTok-style personalization technology to any consumer company

    19 March 2026

    AI ‘boys club’ could widen wealth gap for women, says Rana el Kaliouby

    18 March 2026

    Billionaires made a promise – now some want to leave

    17 March 2026

    Antonio Gracias Says He Longs For ‘Pre-Entropic’ Startups – Those Built To Survive Chaos

    17 March 2026

    Founded by a father-son duo, Nyne gives AI agents the human context they’ve been missing

    14 March 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»A surveillance supplier caught up with a new SS7 attack to watch people’s phone positions
Security

A surveillance supplier caught up with a new SS7 attack to watch people’s phone positions

techtost.comBy techtost.com18 July 202503 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
A Surveillance Supplier Caught Up With A New Ss7 Attack
Share
Facebook Twitter LinkedIn Pinterest Email

Security researchers say they have caught a Middle East surveillance company operating a new attack capable of cheating on telephone operators to reveal the position of a cell subscriber.

The attack is based on bypassing the security protection created by carriers to protect invaders from access to the SS7 or Signaling 7, a private set of protocols used by global phone agencies to launch calls and text messages worldwide.

The SS7 also allows carriers to request information on the tower cell connected to the subscriber’s phone, usually used to charge customers when they call or send a message to someone from abroad, for example.

Enea researchers, a cyberspace company providing protection for phone carriers, said this week That they have noticed the anonymous surveillance seller who exploits the new bypass attack by the end of 2024 to acquire the positions of people’s phones without their knowledge.

Enea VP of Cathalo Mc Daid technology, who co-author of the blog post, told TechCrunch that the company observed the target of “only a few subscribers” monitoring seller and that the attack did not work against all telephone players.

MC Daid said the bypass attack allows the surveillance supplier to identify a person on the nearest cell tower, who could be limited to a few hundred meters in urban or densely populated areas.

Enea informed the telephone operator noted that the holding was used, but refused to name the surveillance supplier, except to note that it was based in the Middle East.

Mc Daid told TechCrunch that the attack was part of a growing trend in malicious operators using these types of farms to acquire a person’s location, warning that the sellers behind their use “would not discover them and would use them if they were not successful”.

“We expect that more will be found and used,” Mc Daid said.

Surveillance sellers, who can include spyware manufacturers and online traffic providers, are private companies that usually work exclusively for government clients to conduct intelligence companies against individuals. Governments often claim to use spyware and other exploitative technologies against serious criminals, but tools have also been used to target members of civil society, including journalists and activists.

In the past, surveillance sellers have gained access to SS7 through a local telephone operator, abuse hired “global title”, or through a government connection.

But because of the nature of these attacks that occur at the level of the cell network, there are few that the phone subscribers can make to defend the exploitation. On the contrary, the defense against these attacks is largely based on telecommunications companies.

In recent years, telephone companies have installed protection walls and other cyberspace protections to defend SS7 attacks, but the nature of the world -funded cell network means that not all operators are not as protected as others, including the United States.

According to a letter sent to the office of Senator Ron Wyden last year, the US Ministry of Homeland said in 2017, that several countries, mainly China, Iran, Israel and Russia, used vulnerabilities on the SS7 to “exploit US subscribers”. Saudi Arabia has also been abused by defects on SS7 to carry out monitoring its citizens in the United States.

attack caught Cyber cyberspace Federal Committee of Communications peoples phone positions Signaling System 7 SS7 Supplier surveillance telecommunications Watch
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAvenue raises $ 80 million to feed the self-care eruption driven by Botox and GLP-1 Surge
Next Article By crushing its application, Kesha can be anyone who wants – even a CEO technician
bhanuprakash.cg
techtost.com
  • Website

Related Posts

CISA Urges Companies to Secure Microsoft Intune Systems After Hackers Mass Wipe Stryker Devices

20 March 2026

FBI seizes websites of pro-Iranian hacker group after devastating Stryker attack

19 March 2026

FBI is buying location data to track US citizens, director confirms

19 March 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

CISA Urges Companies to Secure Microsoft Intune Systems After Hackers Mass Wipe Stryker Devices

20 March 2026

Tools for founders to navigate and move past conflicts

20 March 2026

Rivian Sacrifices 2027 Profit Target to Push Deeper into Autonomy

20 March 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

Nominations for the Startup Battlefield 200 are still open

19 March 2026

Kalshi’s legal woes pile up as Arizona files first criminal charges for ‘illegal gambling operation’

17 March 2026

Fuse raises $25M to disrupt legacy loan origination systems used by US credit unions

16 March 2026
Startups

Tools for founders to navigate and move past conflicts

Anori, Alphabet’s new X spinout, faces one of the world’s most expensive bureaucratic nightmares

This startup wants to make enterprise software more like a prompt

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.