Close Menu
TechurzTechurz

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Liberate bags $50M at $300M valuation to bring AI deeper into insurance back offices

    October 15, 2025

    Chinese Threat Group ‘Jewelbug’ Quietly Infiltrated Russian IT Network for Months

    October 15, 2025

    Eightfold co-founders raise $35M for Viven, an AI digital twin startup for querying unavailable coworkers

    October 15, 2025
    Facebook X (Twitter) Instagram
    Trending
    • Liberate bags $50M at $300M valuation to bring AI deeper into insurance back offices
    • Chinese Threat Group ‘Jewelbug’ Quietly Infiltrated Russian IT Network for Months
    • Eightfold co-founders raise $35M for Viven, an AI digital twin startup for querying unavailable coworkers
    • Introducing MAESTRO: A framework for securing generative and agentic AI
    • Less than 3 days to secure your exhibit table at Disrupt 2025
    • The full Space Stage agenda at Disrupt 2025
    • The new iPad Pro’s biggest upgrade isn’t the M5 chip – I’d buy it for this feature instead
    • How Attackers Bypass Synced Passkeys
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechurzTechurz
    • Home
    • AI
    • Apps
    • News
    • Guides
    • Opinion
    • Reviews
    • Security
    • Startups
    TechurzTechurz
    Home»News»A surveillance vendor was caught exploiting a new SS7 attack to track people’s phone locations
    News

    A surveillance vendor was caught exploiting a new SS7 attack to track people’s phone locations

    TechurzBy TechurzJuly 18, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    A surveillance vendor was caught exploiting a new SS7 attack to track people's phone locations
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Security researchers say they have caught a surveillance company in the Middle East exploiting a new attack capable of tricking phone operators into disclosing a cell subscriber’s location.

    The attack relies on bypassing security protections that carriers have put in place to protect intruders from accessing SS7, or Signaling System 7, a private set of protocols used by the global phone carriers to route subscribers’ calls and text messages around the world. 

    SS7 also allows the carriers to request information about which cell tower a subscriber’s phone is connected to, typically used for accurately billing customers when they call or text someone from overseas, for example. 

    Researchers at Enea, a cybersecurity company that provides protections for phone carriers, said this week that they have observed the unnamed surveillance vendor exploiting the new bypass attack as far back as late 2024 to obtain the locations of people’s phones without their knowledge.

    Enea VP of Technology Cathal Mc Daid, who co-authored the blog post, told TechCrunch that the company observed the surveillance vendor target “just a few subscribers” and that the attack did not work against all phone carriers. 

    Mc Daid said that the bypass attack allows the surveillance vendor to locate an individual to the nearest cell tower, which in urban or densely populated areas could be narrowed to a few hundred meters.

    Enea notified the phone operator it observed the exploit being used in, but declined to name the surveillance vendor, except to note it was based in the Middle East. 

    Mc Daid told TechCrunch that the attack was part of an increasing trend in malicious operators using these kinds of exploits to obtain a person’s location, warning that the vendors behind their use “would not be discovering and using them if they were not successful somewhere.”

    “We anticipate that more will be found and used,” Mc Daid said.

    Surveillance vendors, which can include spyware makers and providers of bulk internet traffic, are private companies that typically work exclusively for government customers to conduct intelligence-gathering operations against individuals. Governments often claim to use spyware and other exploitative technologies against serious criminals, but the tools have also been used to target members of civil society, including journalists and activists. 

    In the past, surveillance vendors have gained access to SS7 by way of a local phone operator, a misused leased “global title,” or through a government connection. 

    But due to the nature of these attacks happening at the cell network level, there is little that phone subscribers can do to defend against exploitation. Rather, defending against these attacks rests largely on the telecom companies. 

    In recent years, phone companies have installed firewalls and other cybersecurity protections to defend against SS7 attacks, but the patchwork nature of the global cell network means that not all carriers are as protected as others, including in the United States.

    According to a letter sent to Sen. Ron Wyden’s office last year, the U.S. Department of Homeland Security said as far back as 2017 that several countries, notably China, Iran, Israel, and Russia, have used vulnerabilities in SS7 to “exploit U.S. subscribers.” Saudi Arabia has also been found abusing flaws in SS7 to conduct surveillance of its citizens in the United States.

    Attack Caught exploiting locations Peoples Phone SS7 surveillance Track vendor
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleHow China’s Patriotic ‘Honkers’ Became the Nation’s Elite Cyber Spies
    Next Article CaaStle founder charged with fraud, turns herself in
    Techurz
    • Website

    Related Posts

    Security

    A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones

    October 14, 2025
    Security

    Get T-Mobile 5G home internet for $30/month when you bundle with a phone line – here’s how

    October 11, 2025
    Security

    Yes, your iPhone can track every place you visit – here’s how to turn it off

    October 11, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    The Reason Murderbot’s Tone Feels Off

    May 14, 20259 Views

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    CNET’s Daily Tariff Price Tracker: I’m Keeping Tabs on Changes as Trump’s Trade Policies Shift

    May 27, 20258 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    The Reason Murderbot’s Tone Feels Off

    May 14, 20259 Views

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    CNET’s Daily Tariff Price Tracker: I’m Keeping Tabs on Changes as Trump’s Trade Policies Shift

    May 27, 20258 Views
    Our Picks

    Liberate bags $50M at $300M valuation to bring AI deeper into insurance back offices

    October 15, 2025

    Chinese Threat Group ‘Jewelbug’ Quietly Infiltrated Russian IT Network for Months

    October 15, 2025

    Eightfold co-founders raise $35M for Viven, an AI digital twin startup for querying unavailable coworkers

    October 15, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2025 techurz. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.