{"id":25529,"date":"2019-02-01T12:02:30","date_gmt":"2019-02-01T17:02:30","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=25529"},"modified":"2019-11-15T06:29:48","modified_gmt":"2019-11-15T11:29:48","slug":"ss7-hacked","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/ss7-hacked\/25529\/","title":{"rendered":"Cybercriminals intercept codes used for banking to empty your accounts"},"content":{"rendered":"<p>Financial institutions worldwide use two-factor authentication (2FA) to keep their customers\u2019 money safe. You\u2019ve probably used them for your accounts \u2014 those short, 4- to 6-digit codes your bank sends when you try to log in for the first time on a new device, or that you have to input to approve a transaction. Usually, banks send those one-time passwords in SMS text messages. Unfortunately, SMS is one of the weakest ways to implement 2FA, because text messages can be intercepted. Think we\u2019re being paranoid? Nope: That is exactly what just happened in the UK.<\/p>\n<p>How can criminals get your text messages? Well, there are different ways, and one of the most extravagant is exploiting a security flaw in SS7, a protocol used by telecommunications companies to coordinate how they route texts and calls (you can <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/ss7-attack-intercepts-sms\/16877\/\" rel=\"noopener noreferrer nofollow\">read more about it in this post<\/a>). The SS7 network does not care who sent a request. So, if malefactors <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/hacking-cellular-networks\/10633\/\" rel=\"noopener noreferrer nofollow\">manage to access it<\/a>, the network will follow their commands to route text messages or calls, as if those commands were legitimate.<\/p>\n<p>The whole scheme looks something like this: Cybercriminals obtain a target\u2019s online banking username and password \u2014 possibly by using phishing, keyloggers, or banking Trojans. Then, they log in to the online bank and request a money transfer. Nowadays, most banks would ask for additional confirmation of the transfer and send a code for verification to the account owner. If the bank does that in the form of a text message, malefactors can exploit the SS7 vulnerability to intercept the text and enter the code, as if they had your phone. Banks accept the transfer as legitimate because the transaction was authorized twice: once with your password, and then again with the one-time code. So, the money goes to the criminals.<\/p>\n<p>The UK\u2019s Metro Bank confirmed to <a target=\"_blank\" href=\"https:\/\/motherboard.vice.com\/en_us\/article\/mbzvxv\/criminals-hackers-ss7-uk-banks-metro-bank?utm_source=mbtwitter\" rel=\"noopener noreferrer nofollow\">Motherboard<\/a> that some of its customers had been impacted by this type of fraud. Back in 2017, <a target=\"_blank\" href=\"https:\/\/www.sueddeutsche.de\/digital\/it-sicherheit-schwachstelle-im-mobilfunknetz-kriminelle-hacker-raeumen-konten-leer-1.3486504\" rel=\"noopener noreferrer nofollow\">S\u00fcddeutsche Zeitung<\/a> reported that German banks had also faced the same problem.<\/p>\n<p>There is some good news, too. As Metro Bank itself comments, an extremely small number of its clients had to deal with the problem, and \u201cnone have been left out of pocket as a result.\u201d<\/p>\n<p>Of course, the whole thing could\u2019ve been avoided if the banks had used some other form of 2FA that didn\u2019t rely on text messages (for example, an <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/2fa-practical-guide\/24219\/\" rel=\"noopener noreferrer nofollow\">authenticator app<\/a> or, say, a hardware-based authenticator such as YubiKey). Unfortunately, it\u2019s the rare financial institution that allows any means of two-factor authentication other than SMSs. Let\u2019s hope that in the near future more and more banks worldwide protect their clients better by offering other authentication choices.<\/p>\n<p>This story offers two takeaways for users of any financial institution or service:<\/p>\n<ul>\n<li>It\u2019s good to use two-factor authentication wherever possible, but it\u2019s even better to use secure versions of 2FA such as authenticator apps or YubiKeys. Try using these instead of SMS if such an option is available.<\/li>\n<li>Use <a href=\"https:\/\/www.kaspersky.com\/internet-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kismd___\" target=\"_blank\" rel=\"noopener nofollow\">a reliable antivirus solution<\/a> to keep banking Trojans and keyloggers off your systems, so that they can\u2019t steal your logins and passwords.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-banking\">\n","protected":false},"excerpt":{"rendered":"<p>Crooks hacked telecom protocol SS7 to steal banking two-factor authentication codes.<\/p>\n","protected":false},"author":40,"featured_media":25530,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2683],"tags":[1218,519,574,1327],"class_list":{"0":"post-25529","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-2fa","10":"tag-banking","11":"tag-news-2","12":"tag-ss7"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ss7-hacked\/25529\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ss7-hacked\/15179\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ss7-hacked\/12757\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ss7-hacked\/17099\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ss7-hacked\/15296\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ss7-hacked\/14022\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ss7-hacked\/17805\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ss7-hacked\/16875\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ss7-hacked\/22218\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/ss7-hacked\/5651\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/ss7-hacked\/11449\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/ss7-hacked\/10310\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ss7-hacked\/18511\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ss7-hacked\/22358\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ss7-hacked\/17911\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ss7-hacked\/22066\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ss7-hacked\/21999\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/2fa\/","name":"2FA"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25529","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=25529"}],"version-history":[{"count":6,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25529\/revisions"}],"predecessor-version":[{"id":29537,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/25529\/revisions\/29537"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/25530"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=25529"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=25529"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=25529"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}