certify
Home arrow Article arrow Article Detail

The protocols of Telecoms from 1975 has exploited for targeting the 20 crypto executives

Profile Image

Crypto Business World Follow

INDIA

Nov, 05 2020

Nov, 05 2020

likes | comments 0

Article Image

Nearly 20 customers and crypto executives from the company which is an Israeli telecommunications bases was targeted in the attack of sophisticated SS7 last month. It seems that hackers have even compromised with the messenger of the telegram and the email account for different cryptocurrency exercise the mast time. They have exploited a vulnerability in the old practical decades. It is believed that the fraudsters may have been intercepting with the authentication code of two factor of the victim in the attack made on Israel-based telecommunications provider which is formerly called the Orange Israel that is quite a known one across the globe. 


As per the publication made by the cybersecurity Bleeping Computer, the devices of nearly 20 partner clients are already compromised. The cybersecurity firm which is an Israel-based called the Pandora Security’s analysis of the event also states that the devices are quite likely to be breached through the attack of signaling system which is popular by the name of SS7. The SS7 consist of the protocols which basically for used for facilitating the information exchange of the within the networking of the within public switched telephone that usually interacts over the networks of digital signaling.


There is even a high possibility for the hackers to further exploit SS7 so that they will be able to intercept the text messages and even calls with the help of roaming feature along with the device location update if it has been registered to another network. Although it has been developed in the year 1975, the potential of SS7 is still being used on the large scale across the globe. It has been also warned out by the pandora co-founder Tshashi Ganot to the national government for updating the infrastructure of telecommunications in order to secure the modern security threats. He further has also added that hackers have impersonated the victim on the telegram in one of the successful attempts to close acquittances in the making crypto trades. 


likes | comments 0

Profile Image

Crypto Business World

CBW - External Analyst

INDIA

Comments
Disclaimer: The information is for informational purposes only.​ This advertisement does not constitute financial advice or any other advice. You should consult with a financial professional to determine what may be best for your individual needs. None of the information and/or content available through this advertisement is intended as an offer or solicitation of an offer to buy or sell, or as a recommendation, endorsement, or sponsorship of any company, financial product, security or commodity. To the maximum extent permitted by law, we disclaim any and all liability in the event any information, commentary, analysis, opinions, advice and/or recommendations prove to be inaccurate, incomplete or unreliable or result in any investment or other losses. In Making the investment decision, investors must rely on their own examination of the issuer and the terms of the offerings, including the merits and risks involved. Investments are speculative, illiquid, and involve a high degree of risk , including the possible loss of investment.