PLAY PODCASTS
SS7 Is Still Broken: How Surveillance Firms Are Bypassing Telco Defenses
Episode 177

SS7 Is Still Broken: How Surveillance Firms Are Bypassing Telco Defenses

Daily Security Review

July 21, 202550m 12s

Audio is streamed directly from the publisher (media.transistor.fm) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.

Show Notes

A new attack technique is exposing just how vulnerable global mobile networks remain in 2025. Cybersecurity firm Enea has discovered a surveillance operation that bypasses SS7 firewalls by exploiting a subtle weakness in the TCAP encoding layer—allowing stealth location tracking of mobile users across borders.

The method? Tampering with the IMSI field in ProvideSubscriberInfo (PSI) requests to hide it from detection. Many mobile operators’ SS7 stacks simply fail to decode the malformed tag, allowing unauthorized tracking messages to pass security controls.

In this episode, we cover:

  • The technical anatomy of the IMSI hiding exploit
  • How this attack evades standard SS7 security checks
  • The surveillance firms and platforms involved—WODEN, ASMAN, HURACAN, and others
  • Broader SS7 weaknesses: lack of encryption, lack of authentication, and global trust architecture
  • The disturbing truth: most mobile networks still depend on legacy protocols from the 1970s
  • Why users can’t opt out—and no app can protect you

We also examine the countermeasures: advanced signaling firewalls, protocol filtering, TCAP signing, and why even now, SS7 remains irreplaceable due to the persistence of 2G/3G roaming infrastructure.

This isn’t a theoretical vulnerability—it’s a real-world surveillance method in use today, targeting phones across continents without users ever knowing.

Topics

SS7 vulnerability 2025SS7 TCAP exploitIMSI hiding exploitProvideSubscriberInfo PSI attackEnea SS7 reportmobile network surveillanceSS7 tracking bypasssignaling system 7 breachTCAP message manipulationglobal mobile location trackingmobile phone privacy breachsurveillance via telecom networksmobile operator SS7 defense failurereal-time phone tracking exploitSS7 surveillance platformsmobile location spoofing attacklegacy telecom vulnerabilitiessignaling firewall SS7WODEN surveillance attackHURACAN PSI ISD commandstelecommunication espionage 2025