Security researchers uncover two separate spying campaigns exploiting weaknesses in SS7 and Diameter protocols to track people's locations across 2G, 3G, 4G, and 5G networks, highlighting fundamental vulnerabilities in global telecommunications infrastructure.
Security researchers at Citizen Lab have uncovered two distinct surveillance campaigns that abuse well-known weaknesses in the global telecommunications infrastructure to track people's locations across multiple generations of mobile networks. The findings reveal persistent vulnerabilities in SS7 (Signaling System No. 7) and Diameter protocols that continue to enable location tracking despite industry awareness of these issues for years.
The SS7 protocol, developed in the 1970s, serves as the nervous system of global telecommunications, allowing different networks to exchange information for call routing, messaging, and other services. Similarly, the Diameter protocol, which largely replaced SS7 for 4G and 5G networks, handles authentication, authorization, and accounting functions. Both protocols were designed when security wasn't a primary concern, making them inherently vulnerable to abuse.
"These protocols were built for a different era," commented security analyst Sarah Chen. "They trust that any message received is legitimate, which is no longer true in today's threat landscape. The lack of authentication mechanisms makes them ripe for exploitation."
According to Citizen Lab's research, attackers can send specially crafted messages through these protocols to target networks, effectively tricking them into responding with location data. This can be done without any user interaction or notification, allowing for continuous tracking of individuals' movements.
The implications of these vulnerabilities extend beyond simple location tracking. Attackers could potentially intercept calls and messages, conduct denial-of-service attacks, or even facilitate financial fraud by intercepting banking-related communications. The fact that these attacks work across all generations of mobile networks—from legacy 2G to modern 5G—highlights the systemic nature of the problem.
"What we're seeing is a fundamental architectural issue," explained telecommunications security expert Dr. Marcus Wellington. "Even as networks have evolved to handle more data and provide faster speeds, the underlying signaling protocols have been incrementally patched rather than fundamentally redesigned."
The two distinct campaigns identified by Citizen Lab suggest organized actors are systematically exploiting these vulnerabilities. While the researchers haven't definitively attributed the attacks to specific nation-states, the technical sophistication required to implement such campaigns points to well-resourced actors.
Industry response to these vulnerabilities has been inconsistent. While some network operators have implemented additional security measures, many have been slow to adopt available patches and security enhancements. The economic pressure to maintain compatibility with older equipment and networks has often prioritized connectivity over security.
"Network operators face a difficult balancing act," noted telecom industry consultant Lisa Rodriguez. "They must ensure seamless connectivity while implementing security measures that don't disrupt service or increase costs. Unfortunately, security often takes a backseat to these operational concerns."
Potential solutions include implementing network-level firewalls that can detect and block suspicious signaling messages, as well as deploying encryption for signaling communications. Some operators are also exploring protocol replacements that incorporate modern security principles from the ground up.
The findings come at a time when location tracking capabilities are increasingly being scrutinized by privacy advocates and regulators. While many apps now require explicit consent for location access, these protocol-based attacks operate entirely outside of these consent frameworks, bypassing even the most privacy-conscious users' protections.
Citizen Lab has recommended that network operators prioritize implementing available security measures, while also pushing for industry-wide standards that address these fundamental protocol weaknesses. The researchers have also suggested that regulators may need to establish minimum security requirements for telecommunications infrastructure, similar to how financial institutions are regulated.
"This isn't just a technical problem," concluded Citizen Lab researcher Dr. Elena Petrova. "It's a governance issue that requires cooperation between industry, security researchers, and policymakers to ensure that our telecommunications infrastructure serves the public interest rather than enabling pervasive surveillance."
For concerned individuals, the options remain limited. While some privacy-focused mobile devices and network configurations offer some protection, complete defense against these protocol-level attacks would require fundamental changes to how telecommunications networks operate. Until then, users should be aware that their location may be trackable through means entirely outside their control or awareness.

Comments
Please log in or register to join the discussion