Committed to connecting the world


ITU Brainstorming session on SS7 vulnerabilities and the impact on different industries including digital financial services

​​​​​Geneva, Switzerland 22 October 2019


The International Telecommunication Union (ITU) organized a “Brainstorming session on Signalling System No.7(SS7 ) vulnerabilities and the impact on different industries including digital financial services”, which took place on the 22 October 2019 (14h00-18h00 Geneva time) at ITU Headquarters, Rue de Varembé 2, Geneva, Switzerland. The workshop took place during the ITU-T Study Group 11 meeting which took place in the same venue from 16-25 October 2019.

Signaling System No. 7 (SS7) is a stack of signaling protocols, which was initially developed by ITU (CCITT) in the mid-1980s. Since then, SS7 standards has become a generic stack which are widely applied in public switched telephone network (PSTN) all over the globe. With the growth of mobile telecommunications and appearance of the MAP and CAP protocols, SS7 stack has become suitable for public land mobile network (PLMN), e.g. 2G, 3G networks. Later, SS7 migrated to SIGTRAN stack developed by IETF which allows operators to setup interconnection of SS7-based networks over IP networks. Furthermore, the SS7 logic migrated to DIAMETER which is currently widely used for interconnection of IMS-based networks, including 4G (VoLTE/ViLTE).

At the development stage, SS7 was designed to be managed by operators with the understanding that anyone connected to SS7 network was considered trustworthy. With the current network environment, including interconnection over the Internet, SS7-based networks have become vulnerable and can be easily attacked. Moreover, the latest move to Diameter protocol has not solved any of the basic vulnerabilities found in SS7.

Presently, there have been multiple cases where SS7 vulnerabilities have been used for different hackers’ attacks. Amongst well-known attacks on SS7 networks include telephone spam, spoofing numbers, location tracking, subscriber fraud, intercept calls and messages, DoS, infiltration attacks, routing attacks, etc.
As of now, more and more stakeholders are using SS7-based ICT networks for over the top services including digital finance services (DFS). However, the vulnerabilities of SS7 have increased the risk of illegal usage of customers’ applications, resulting in the unlawful take-over of their assets.

At present, ITU-T SG11 is working on different aspects on how to improve the situation. Among the achieved outcomes and ongoing activities are:
The workshop was therefore dedicated to brainstorming on the potential way forward to enhance the security mechanisms of SS7 and its adoption rate among telcos in order to defend all stakeholders from related attacks. The key aim of the brainstorming session was to identify the roadmap for fixing these issues.       

Target Audience
Participation in the workshop was open to ITU Member States, Sector Members, Associates and Academic Institutions and to any individual from a country that is a member of ITU, who wished to contribute to the work. This included individuals who are also members of international, regional and national organizations, interested stakeholders, including telecom operators, regulators, SDOs and financial institutes. Participation in the workshop was free of charge, however seats are limited and no fellowships will be granted. The workshop will be held in English only.       ​


SMS OTP Intercept (PayPal Hack) SS7 Call Interception