TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

SS7 MITM Attack Against WhatsApp and Telegram

209 pointsby aethertapabout 9 years ago

14 comments

moxieabout 9 years ago
This article glosses over a few important details.<p>The reason that end to end encryption exists is precisely because man in the middle attacks are possible, and always will be. This kind of attack is devastating for Telegram, because by default they don&#x27;t use end to end encryption, and instead store the entire plaintext history of every message you&#x27;ve ever sent or received, all of which an attacker instantly gets access to.<p>For WhatsApp, everything is end to end encrypted by default, so the attacker doesn&#x27;t get any message history. All of the contacts for the MITM&#x27;d user also get a notice that their contact&#x27;s security code changed, and a comparison will fail to match. This is exactly what E2E was built to protect against.
评论 #11668974 未加载
评论 #11671568 未加载
评论 #11669226 未加载
评论 #11669502 未加载
评论 #11673485 未加载
评论 #11677366 未加载
Animatsabout 9 years ago
Is there a translation of how they got into SS7? Google rejects the PDF as too large to translate.[1]<p>[1] <a href="http:&#x2F;&#x2F;www.ptsecurity.ru&#x2F;download&#x2F;PT_SS7_security_2014_rus.pdf" rel="nofollow">http:&#x2F;&#x2F;www.ptsecurity.ru&#x2F;download&#x2F;PT_SS7_security_2014_rus.p...</a>
评论 #11669034 未加载
评论 #11671628 未加载
评论 #11673464 未加载
评论 #11668927 未加载
martinaldabout 9 years ago
SMS verification really sucks. It&#x27;s hugely helpful because it is an &#x27;open social graph&#x27; to use a Zuckerbergism. However, it&#x27;s not at all designed to do this. It&#x27;s like the problem with SSL verifying ownership via email - ok at first sight, but then say you run a webmail service and you can register webmaster@, game over without any crypto bother. Or just trojan the webmaster@ mailbox and get control over the guy that runs it and issue a valid cert. Insta-MITM.<p>Mobile numbers are easy to spoof and easy to port away from people. In most countries telco regulators look at how easy it is to port cell numbers as a badge of honour on how efficient their mobile regulation is. Just like everything, attackers will rush to the easiest point of failure. In this it&#x27;s SMS and using phone numbers as a trusted identifier.<p>In the UK you need to get a &quot;PAC code&quot; to change provider, but it&#x27;s not hard to social engineer that if you went through someones trash and grabbed an old cell bill. The number will be ported in a day or less and even worse, there&#x27;s no way for you to port it back quickly since you&#x27;ll have no idea who it&#x27;s got to. And with it your WhatsApp, etc will all be gone security wise.<p>All this talk of &quot;oh just enable these super warnings and scan QR codes&quot; is nonsense. People port phone numbers and move phones all the time, these warnings can&#x27;t be this strong otherwise half your phonebook would false positive.
dbalanabout 9 years ago
SS7 is broken beyond repair, infact it being a walled garden is the only security it ever had.<p>This ccc talk is a good intro - <a href="https:&#x2F;&#x2F;media.ccc.de&#x2F;v&#x2F;31c3_-_6122_-_en_-_saal_1_-_201412271830_-_mobile_self-defense_-_karsten_nohl" rel="nofollow">https:&#x2F;&#x2F;media.ccc.de&#x2F;v&#x2F;31c3_-_6122_-_en_-_saal_1_-_201412271...</a>
评论 #11671470 未加载
jwrabout 9 years ago
The real problem is not Telegram or WhatsApp, it&#x27;s the banks that insist on using SMS as a secure authentication channel for authorizing transactions.
评论 #11671188 未加载
vezycashabout 9 years ago
&gt;...encrypted apps use SMS authentication to identify and authenticate users participating in encrypted conversations<p>Is this true? Because it&#x27;s common knowledge that SMS is insecure. So I don&#x27;t understand how why anyone would want to use it for secure authentication - especially in the case of Whatsapp.
评论 #11668988 未加载
bogomipzabout 9 years ago
I realize every new outlet on the internet is regurgitating this story but if I call you via whats app and are both using wifi does the communication even transit an SS7 gateway at all? Why would it? Also SS7 is generally a closed system, not anyone can connect to an SS7 gateway. To signal to a carrier&#x27;s SS7 gateway you have to either be a subscriber or carrier that has agreement with the owner of a SS7 gateway to terminate traffic, since this is how calls are billed. For an external carrier to connect to another carriers SS7 gateway they need to know your &quot;code points&quot;(kind of like an IP address for SS7.) in advance. There wasn&#x27;t a lot to go on in the google translated doc.
superkuhabout 9 years ago
Stop using&#x2F;requiring phone system in internet based instant messengers.
subliminalpandaabout 9 years ago
All the more reason to find an alternative to SMS based authentication.<p>It is somewhat comforting to know that message history cannot be retrieved from WhatsApp or other E2E apps like Threema.
评论 #11670517 未加载
pepijndevosabout 9 years ago
To mitigate this issue on WhatsApp, enable security notifications in settings and verify your contacts QR code.<p>If you go to a contact there is a QR code you can scan to verify a contact. If the code of a contact changes, WhatsApp will tell you.
leecarraherabout 9 years ago
i can&#x27;t say much for telegram as their encryption has been broken, and is not an openned, but whatsapp&#x27;s new signal protocol designed by moxy marlinspike doesn&#x27;t use sms to authenticate. It doesn&#x27;t by default require authentication, but rather has it as an option and the option generates a long 80 character passcode or QR code, to be communicated in person or via some out of band communication channel, similar to threma. Maybe they are talking about old whatsapp?
评论 #11669120 未加载
评论 #11671218 未加载
zokierabout 9 years ago
So trust on first use -style system can be attacked by intercepting the initial handshake? Yay... I suppose next the researchers will show how to MITM SSH with free wifi hotspot.
danellisabout 9 years ago
When people perform attacks like this, how are they getting access to the SS7 network? Would they not need use of a (presumably expensive) trunk?
评论 #11669639 未加载
评论 #11669823 未加载
jbob2000about 9 years ago
&gt; &quot;The researchers, using their Linux laptop...&quot;<p>My eye twitched a little when I read that. Is the author trying to suggest that Linux is some hackers-only operating system?
评论 #11669175 未加载
评论 #11669496 未加载
评论 #11669099 未加载
评论 #11668805 未加载
评论 #11668797 未加载