SlideShare a Scribd company logo
SS7 Attacks and SIM Cloning:
Separating Fact from Fiction
The security of mobile devices is a critical issue in today's digital age. While there are many security protocols in
place, malefactors continue to find ways to exploit vulnerabilities in these systems. One such vulnerability is the
use of the SS7 network, which is used to manage calls and texts between mobile devices. A recent article
discussed a resource that promises SIM card cloning through SS7 attacks, but is this claim legitimate?
The attackers are presenting their latest assault as a form of SIM swap attack. But first, let's clarify what these
attacks entail.
SIM swap attacks can be categorized into three main types. In all cases, the end goal of the attack is to gain
access to SMS messages intended for the victim-subscriber, including messages containing one-time passwords.
1. Social engineering SIM swap
In this scenario, the attacker pretends to be another subscriber or an official representative and requests a SIM
card reissue. If successful, the attacker gains control of the subscriber's phone number until the victim notices and
takes steps to block the number.
secgen.com
2.1. SMS interception on signaling interfaces
To carry out this attack, the attacker needs to gain access to the SS7 or Diameter network. Then, the attacker
initiates a fraudulent registration of the targeted subscriber with a new network, causing the telecom operator to
reroute all SMS messages to the network under the attacker's control. It's worth noting that, in this scenario, the SIM
card remains in the possession of its rightful owner. The phone will no longer be under attack once it is
re-registered back in its original network.
2.2. SIM Tool-Kit vulnerability exploitation (Simjacker)
This attack enables the attacker to gain access to the resources of the SIM card. The unique feature of this attack
is its ability to have a wide impact on the SIM card, but its exploitability is relatively low because it requires multiple
vulnerabilities to be present simultaneously. Specifically, the SIM cards must have vulnerabilities, the binary SMS
message system must have critical design flaws, and the operator's network must have both SS7 and binary SMS
vulnerabilities.
2. Technological SIM swap
3. SIM card cloning SIM swap
It is believed that in order to carry out this attack, the attacker must have a cloned SIM card in their possession.
After cloning, the attacker can receive SMS messages intended for the real subscriber.
The attacker claims to be able to clone SIM cards remotely. We believe that they have managed to combine #2.1,
#2.2, and #3 into a single attack. Let's take a closer look at how this could be possible, if at all.
The following explanation presented is founded on a range of attack methods and techniques that have been
verified in practical and lab contexts or have been proposed theoretically.
First, one should know that in order to clone a SIM card, an intruder need to first extract the data needed for
authentication (Ki) and then decrypt it. Ideally, the information can only be obtained when the original SIM card is
physically in hacker’s hands.
However, it is important to note that the cloning of modern SIM cards is not an easy task, even for those in
possession of the original SIM card. Retrieving the Ki parameter, which is necessary for cloning, is almost
impossible. Exploiting attacks on SS7, the intruder may be able to obtain authentication triplets (for GSM) or
quintuplets (for UMTS), and even ciphering keys for a particular subscriber transaction, this information alone is
useless to clone the SIM card.
At our SIM card security assessment service, one of the tests checks for the possibility of retrieving the encrypted
Ki parameter from the SIM card. We can say that the success rate of this test is quite low, at about 9%. When the
test of Ki retrieval from the physically available SIM card is successful, we may assume that in theory the same
can be done via exploiting of STK vulnerabilities (Simjacker) remotely. Moreover, the result is encrypted using
different versions of the DES algorithm, making decryption of the Ki an additional non-trivial task.
Even if an intruder could extract the necessary information remotely, it may require significant computational
power to decrypt, depending on the cryptographic algorithm used on the SIM card. For instance, newer SIM cards
are more secure and use stronger cryptography such as 3DES.
Our Vision
SecurityGen is a global company focused on telecom
security. We deliver a solid security foundation to drive
secure telecom digital transformations and ensure safe
and robust network operations. Our extensive product and
service portfolio provides complete protection against
existing and advanced telecom security threats.
About SecurityGen
UK | Italy | Czech Republic | Brazil | India | South Korea | Japan
| Malaysia | UAE | Egypt
Email: contact@secgen.com
Website: www.secgen.com
Connect With Us
Our security assessments, such as SS7/Diameter security assessment, STK security assessment, and SIM card
security assessment, can detect if a network is vulnerable to SIM card cloning. If we see a vulnerability in all three
security assessments, then we can conclude that, in theory, the network is likely vulnerable to cloning. However, if
any of the steps in our security assessments are not possible, we can confidently say that SIM card cloning is not
possible even theoretically.
On a separate note, it is worth mentioning that if malefactors do gain access to the SS7 network, they can
intercept one-time passwords in SMS messages. This can help them transfer money from banking accounts and
hijack passwords from internet-based accounts such as social media, email, and messaging platforms.
Therefore, it is crucial to ensure that mobile devices have additional security measures in place, such as
two-factor authentication, to prevent such attacks.
In conclusion, we must admit that the video demonstrating the SIM cloning attack does not reveal any specific
technique, making it difficult to determine its veracity. While it may seem unlikely based on our expertise and
experience, it is possible that attackers are using methods beyond our current knowledge.
secgen.com

More Related Content

PDF
Fake BTS Network Vulnerabilities
PDF
Security issues in_mobile_payment
PDF
What You Don’t Know About SMS Security_ Here’s A Few Things You Should Know!.pdf
PDF
new Algorithm1
PDF
GSM Security 101 by Sushil Singh and Dheeraj Verma
PPTX
Telecom under attack: demo of fraud scenarios and countermeasures
PPTX
Security aspect in GSM
PDF
SS7: 2G/3G's weakest link
Fake BTS Network Vulnerabilities
Security issues in_mobile_payment
What You Don’t Know About SMS Security_ Here’s A Few Things You Should Know!.pdf
new Algorithm1
GSM Security 101 by Sushil Singh and Dheeraj Verma
Telecom under attack: demo of fraud scenarios and countermeasures
Security aspect in GSM
SS7: 2G/3G's weakest link

Similar to SecurityGen-Article-Cloning-SimCard.pdf (20)

PDF
IRJET- ATM Security using GSM and MEMS Sensor
DOC
E-commerce Security
PPT
M Commerce
PPT
Gsm security
PDF
B010331019
DOCX
Mobile Cloning Technology Report
PPTX
Mobile Phone and SIM card cloning
PPT
Gsm security final
PDF
PDF
SS7 Vulnerabilities
PDF
Cloud based Anti-Theft Application for Android Devices: A Literature Review
PDF
Cloud based Anti-Theft Application for Android Devices: A Literature Review
PDF
Empowering Telecom Resilience - SecurityGen's GSMA SS7 Security Unveiled.pdf
PDF
Fortifying Telecom Networks: Exploring GSMA SS7 Security
PDF
SecurityGen Bolsters Defenses with State-of-the-Art Intrusion Detection Syste...
PDF
IDS: INTRUSION DETECTION SYSTEM PLATFORM
PDF
Enhanced adaptive security system for SMS – based One Time Password
PDF
Everything You Should Know About 2FA Bypass Attacks.pdf
PDF
Mobile cloning
PDF
14A81A05B5
IRJET- ATM Security using GSM and MEMS Sensor
E-commerce Security
M Commerce
Gsm security
B010331019
Mobile Cloning Technology Report
Mobile Phone and SIM card cloning
Gsm security final
SS7 Vulnerabilities
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Empowering Telecom Resilience - SecurityGen's GSMA SS7 Security Unveiled.pdf
Fortifying Telecom Networks: Exploring GSMA SS7 Security
SecurityGen Bolsters Defenses with State-of-the-Art Intrusion Detection Syste...
IDS: INTRUSION DETECTION SYSTEM PLATFORM
Enhanced adaptive security system for SMS – based One Time Password
Everything You Should Know About 2FA Bypass Attacks.pdf
Mobile cloning
14A81A05B5
Ad

More from Security Gen (20)

PDF
Protect Your Network_ Invest in Telco Security Solutions Today
PDF
Unlock the Future: SecurityGen's 5G Standalone Solutions
PDF
Address 5G Vulnerabilities with SecurityGen's Expert Solution
PDF
SecurityGen-IDS-enhance-your-signalling-security (1).pdf
PDF
SecurityGen: Your Trusted Partner for Unrivaled Telecom Security
PDF
SecurityGen - Your Shield Against Cyber Threats
PDF
SecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdf
PDF
Why the VoLTE Rush?
PDF
Best 5G Security Solutions - SecurityGen
PDF
Shield Your Network: Prevent DDoS Attacks with SecurityGen
PDF
SecurityGen whitepaper GTP vulnerabilities - A cause for concern in 5G and LT...
PDF
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
PDF
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
PDF
SecurityGen 5G Cyber-security Lab - A holistic 5G view for building a safe & ...
PDF
ACE: ARTIFICIAL CYBERSECURITY EXPERT
PDF
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
PDF
5G Security Program Datasheet (2).pdf
PDF
5G Security Program -Case Studies
PDF
NGFW - An Updated Overview
PDF
Securing the 5G growth story with NFVi (1).pdf
Protect Your Network_ Invest in Telco Security Solutions Today
Unlock the Future: SecurityGen's 5G Standalone Solutions
Address 5G Vulnerabilities with SecurityGen's Expert Solution
SecurityGen-IDS-enhance-your-signalling-security (1).pdf
SecurityGen: Your Trusted Partner for Unrivaled Telecom Security
SecurityGen - Your Shield Against Cyber Threats
SecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdf
Why the VoLTE Rush?
Best 5G Security Solutions - SecurityGen
Shield Your Network: Prevent DDoS Attacks with SecurityGen
SecurityGen whitepaper GTP vulnerabilities - A cause for concern in 5G and LT...
SecurityGen-Cybersecurity-perspective-on-mwc-themes.pdf
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
SecurityGen 5G Cyber-security Lab - A holistic 5G view for building a safe & ...
ACE: ARTIFICIAL CYBERSECURITY EXPERT
TELCO WORKLOADS IN HYPERSCALER CLOUDS SECURITY IN THE 5G CONTROL ROOM
5G Security Program Datasheet (2).pdf
5G Security Program -Case Studies
NGFW - An Updated Overview
Securing the 5G growth story with NFVi (1).pdf
Ad

Recently uploaded (20)

PPTX
MYSQL Presentation for SQL database connectivity
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Modernizing your data center with Dell and AMD
PDF
Empathic Computing: Creating Shared Understanding
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Encapsulation theory and applications.pdf
MYSQL Presentation for SQL database connectivity
Diabetes mellitus diagnosis method based random forest with bat algorithm
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
cuic standard and advanced reporting.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Advanced methodologies resolving dimensionality complications for autism neur...
Per capita expenditure prediction using model stacking based on satellite ima...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Review of recent advances in non-invasive hemoglobin estimation
Modernizing your data center with Dell and AMD
Empathic Computing: Creating Shared Understanding
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
NewMind AI Monthly Chronicles - July 2025
Reach Out and Touch Someone: Haptics and Empathic Computing
“AI and Expert System Decision Support & Business Intelligence Systems”
Understanding_Digital_Forensics_Presentation.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Encapsulation theory and applications.pdf

SecurityGen-Article-Cloning-SimCard.pdf

  • 1. SS7 Attacks and SIM Cloning: Separating Fact from Fiction The security of mobile devices is a critical issue in today's digital age. While there are many security protocols in place, malefactors continue to find ways to exploit vulnerabilities in these systems. One such vulnerability is the use of the SS7 network, which is used to manage calls and texts between mobile devices. A recent article discussed a resource that promises SIM card cloning through SS7 attacks, but is this claim legitimate? The attackers are presenting their latest assault as a form of SIM swap attack. But first, let's clarify what these attacks entail. SIM swap attacks can be categorized into three main types. In all cases, the end goal of the attack is to gain access to SMS messages intended for the victim-subscriber, including messages containing one-time passwords. 1. Social engineering SIM swap In this scenario, the attacker pretends to be another subscriber or an official representative and requests a SIM card reissue. If successful, the attacker gains control of the subscriber's phone number until the victim notices and takes steps to block the number.
  • 2. secgen.com 2.1. SMS interception on signaling interfaces To carry out this attack, the attacker needs to gain access to the SS7 or Diameter network. Then, the attacker initiates a fraudulent registration of the targeted subscriber with a new network, causing the telecom operator to reroute all SMS messages to the network under the attacker's control. It's worth noting that, in this scenario, the SIM card remains in the possession of its rightful owner. The phone will no longer be under attack once it is re-registered back in its original network. 2.2. SIM Tool-Kit vulnerability exploitation (Simjacker) This attack enables the attacker to gain access to the resources of the SIM card. The unique feature of this attack is its ability to have a wide impact on the SIM card, but its exploitability is relatively low because it requires multiple vulnerabilities to be present simultaneously. Specifically, the SIM cards must have vulnerabilities, the binary SMS message system must have critical design flaws, and the operator's network must have both SS7 and binary SMS vulnerabilities. 2. Technological SIM swap 3. SIM card cloning SIM swap It is believed that in order to carry out this attack, the attacker must have a cloned SIM card in their possession. After cloning, the attacker can receive SMS messages intended for the real subscriber. The attacker claims to be able to clone SIM cards remotely. We believe that they have managed to combine #2.1, #2.2, and #3 into a single attack. Let's take a closer look at how this could be possible, if at all. The following explanation presented is founded on a range of attack methods and techniques that have been verified in practical and lab contexts or have been proposed theoretically. First, one should know that in order to clone a SIM card, an intruder need to first extract the data needed for authentication (Ki) and then decrypt it. Ideally, the information can only be obtained when the original SIM card is physically in hacker’s hands. However, it is important to note that the cloning of modern SIM cards is not an easy task, even for those in possession of the original SIM card. Retrieving the Ki parameter, which is necessary for cloning, is almost impossible. Exploiting attacks on SS7, the intruder may be able to obtain authentication triplets (for GSM) or quintuplets (for UMTS), and even ciphering keys for a particular subscriber transaction, this information alone is useless to clone the SIM card. At our SIM card security assessment service, one of the tests checks for the possibility of retrieving the encrypted Ki parameter from the SIM card. We can say that the success rate of this test is quite low, at about 9%. When the test of Ki retrieval from the physically available SIM card is successful, we may assume that in theory the same can be done via exploiting of STK vulnerabilities (Simjacker) remotely. Moreover, the result is encrypted using different versions of the DES algorithm, making decryption of the Ki an additional non-trivial task. Even if an intruder could extract the necessary information remotely, it may require significant computational power to decrypt, depending on the cryptographic algorithm used on the SIM card. For instance, newer SIM cards are more secure and use stronger cryptography such as 3DES. Our Vision
  • 3. SecurityGen is a global company focused on telecom security. We deliver a solid security foundation to drive secure telecom digital transformations and ensure safe and robust network operations. Our extensive product and service portfolio provides complete protection against existing and advanced telecom security threats. About SecurityGen UK | Italy | Czech Republic | Brazil | India | South Korea | Japan | Malaysia | UAE | Egypt Email: contact@secgen.com Website: www.secgen.com Connect With Us Our security assessments, such as SS7/Diameter security assessment, STK security assessment, and SIM card security assessment, can detect if a network is vulnerable to SIM card cloning. If we see a vulnerability in all three security assessments, then we can conclude that, in theory, the network is likely vulnerable to cloning. However, if any of the steps in our security assessments are not possible, we can confidently say that SIM card cloning is not possible even theoretically. On a separate note, it is worth mentioning that if malefactors do gain access to the SS7 network, they can intercept one-time passwords in SMS messages. This can help them transfer money from banking accounts and hijack passwords from internet-based accounts such as social media, email, and messaging platforms. Therefore, it is crucial to ensure that mobile devices have additional security measures in place, such as two-factor authentication, to prevent such attacks. In conclusion, we must admit that the video demonstrating the SIM cloning attack does not reveal any specific technique, making it difficult to determine its veracity. While it may seem unlikely based on our expertise and experience, it is possible that attackers are using methods beyond our current knowledge. secgen.com