US, UK warn of Iranian hackers exploiting Microsoft Exchange, Fortinet
Russian ransomware gangs start collaborating with Chinese hackers
Windows 11 issue with Intel audio drivers triggers blue screens
Threat actors offer millions for zero-days, developers talk of exploit-as-a-service
Hackers deploy Linux malware, web skimmer on eCommerce servers
Microsoft: Iranian state hackers increasingly target IT sector
New Memento ransomware switches to WinRar after failing at encryption
Microsoft increases Windows 11 rollout pace to Windows 10 devices
Qualys BrowserCheck
Junkware Removal Tool
How to remove the PBlock+ adware browser extension
Remove the Search Redirect
Remove the Search Redirect
Remove the Search Redirect
Remove Security Tool and SecurityTool (Uninstall Guide)
How to remove Antivirus 2009 (Uninstall Instructions)
How to Remove WinFixer / Virtumonde / Msevents / Trojan.vundo
How to remove Google Redirects or the TDSS, TDL3, or Alureon rootkit using TDSSKiller
Locky Ransomware Information, Help Guide, and FAQ
CryptoLocker Ransomware Information Guide and FAQ
CryptorBit and HowDecrypt Information Guide and FAQ
CryptoDefense and How_Decrypt Ransomware Information Guide and FAQ
How to make the Start menu full screen in Windows 10
How to install the Microsoft Visual C++ 2015 Runtime
How to open an elevated PowerShell Admin prompt in Windows 10
How to Translate a Web Page in Google Chrome
How to start Windows in Safe Mode
How to remove a Trojan, Virus, Worm, or other Malware
How to show hidden files in Windows 7
How to see hidden files in Windows
IT Certification Courses
Gear + Gadgets
Can you really buy cellphone tracking services on the dark web?
The existence of Signaling System 7 (SS7) mobile telephony protocol vulnerabilities is something security researchers warned about in 2016, and it only took a year before the first attacks exploiting them were observed.
In the years that followed, governments exploited SS7 flaws to track individuals abroad, and hackers used them to hijack Telegram and email accounts.
Apart from SMS, the SS7 security gaps can be exploited to intercept or forward calls, 2FA codes, locate devices, spoof SMS, and more.
But are these hacking services as abundant as rumored, or is the dark web full of scammers that are merely waiting to snatch the money of aspiring spies?
Analysts at SOS Intelligence have searched the dark web for providers of SS7 exploitation services and found 84 unique onion domains claiming to offer them.
After narrowing down the results to those that appeared to be still active, they ended up with only the following four:
All four claim to offer SMS interception and spoofing, location tracking, and call interception and redirection.
By analyzing the network topology data for these sites, the researchers found that some of them were relatively isolated, not having many inbound links.
This is not a good indication of the reliability and credibility of the site and is typically an indication of recently set-up scamming platforms.
Moreover, the SS7 Hack site appears copied from a clearnet website created in 2021, so it looks like a scam.
Upon trying to use its SS7 exploit kit, hoping for the implementation of an API mirroring function, the researchers got nothing as the service was offline.
On the Dark Fox Market platform, which charges $180 for each targeted phone number, researchers found the same demo videos uploaded by Russian users on YouTube in 2016.
These were most likely stolen from YouTube and had no relevance to the Dark Fox Market platform, which offers no working SS7 exploitation service anyway.
Despite all that, by analyzing the provided cryptocurrency wallets of these platforms, SOS Intelligence found that the scammers are making significant amounts of money.
The above doesn’t mean that there are no SS7 exploitation services on the dark web, but rather that the real ones are hidden behind membership-only hacking forums and marketplaces such as World Market.
As is usually the case on the dark web, the first search results that one can find on the “surface” typically lead to scams.
One would have to dig deeper to get the real deal, but this never eliminates the chances of still landing on the receiving end of a scam.
Sophisticated threat actors have access to cellphone data through affiliations or their own operations, so they don’t need to search for providers of SS7 exploit services.
Russian ransomware gangs start collaborating with Chinese hackers
North Korean cyberspies target govt officials with custom malware
RedCurl corporate espionage hackers resume attacks with updated tools
TikTok phishing threatens to delete influencers’ accounts
Microsoft warns of the evolution of six Iranian hacking groups
Not a member yet? Register Now
Windows 10 21H2 is released, here are the new features
WordPress sites are being hacked in fake ransomware attacks
To receive periodic updates and news from BleepingComputer, please use the form below.
Terms of Use Privacy PolicyEthics Statement
Copyright @ 2003 – 2021 Bleeping Computer® LLC – All Rights Reserved
Not a member yet? Register Now
Read our posting guidelinese to learn what content is prohibited.


You May Also Like

Moses Staff hackers wreak havoc on Israeli orgs with ransomless encryptions

New Microsoft emergency updates fix Windows Server auth issues7 million Robinhood user…

Cisco fixes hard-coded credentials and default SSH key issues

CISA orders federal agencies to fix hundreds of exploited security flawsUS sanctions…

Stealthy WIRTE hackers target governments in the Middle East

Panasonic discloses data breach after network hackIKEA email systems hit by ongoing…

Bulletproof hosting founder imprisoned for helping cybercrime gangs

FBI seized $2.3M from affiliate of REvil, Gandcrab ransomware gangsEwDoor botnet targets…