Eavesdropping and locating opponents of the regime by the Islamic Republic - Soroush Moradi

94,845 views

Soroush Moradi

Published on Sep 26, 2024
About :

Follow Soroush Moradi on Instagram; / soroush.moradi987 With the advancement of communication technology, mobile networks have become one of the main pillars of everyday communication. The SS7 (Signaling System 7) protocol, which was developed in the 1970s, is used as one of the basic protocols for managing communications in mobile networks. Despite the high efficiency of this protocol in managing mobile phone communications, the security weaknesses in it have made it possible to abuse networks and access sensitive information of users. Exploiting these weaknesses, the Islamic Republic of Iran and other repressive governments have used the SS7 protocol to monitor political opponents and hack their information. In this video, technical points of this protocol, real examples of abuse and methods of dealing with it are discussed. SS7 Protocol: How It Works and Security Vulnerabilities SS7 is a set of signaling protocols that allow mobile networks to manage information such as location, connection of calls, text messages and authentication of users. Simply put, this protocol is responsible for managing communications between mobile and fixed networks. However, SS7 has serious security weaknesses. At the time this protocol was developed, it was assumed that all telecommunication companies and networks using SS7 were trusted. For this reason, modern authentication and security mechanisms are not built into this protocol. This issue allows hackers and even governments to gain access to user information and exploit it by accessing the SS7 network. Security Weaknesses of SS7 1. Location tracking of users: The SS7 protocol allows mobile networks to identify the exact location of users in order to provide them with services. By using signal requests, hackers or security agencies can track a person's exact location without their knowledge. 2. Eavesdropping of conversations and text messages: Another weakness of SS7 is the possibility of eavesdropping on conversations and text messages of users. By sending specific requests to the SS7 network, attackers can eavesdrop on a person's conversations and text messages without their knowledge. 3. Bypassing two-step authentication: Many online services use SMS as one of the ways to send two-step authentication codes. By using SS7 weaknesses, hackers can hijack SMS containing these codes and gain access to individual user accounts. 4. Diverting calls and text messages: Hackers or governments can redirect users' calls and text messages to their own servers. This practice allows them to control and monitor the person's communications without their knowledge. The use of SS7 by the Islamic Republic of Iran to hack users The Islamic Republic of Iran has used the SS7 protocol to control and monitor political opponents, human rights activists, and journalists. Some of the methods used by the Islamic Republic include the following: 1. Tracking political opponents and human rights activists: Iran's security institutions have used mobile networks and SS7 to locate opponents and activists and use this information to arrest and detain. they use 2. Eavesdropping on the conversations and messages of the opponents: Iranian security institutions have intercepted the conversations and text messages of the political opponents by infiltrating the mobile networks and using the SS7 protocol and used this information to identify their communication networks. 3. Bypassing two-step authentication: The Islamic Republic has used the weaknesses of SS7 to access the user accounts of opponents and political activists in social networks. By hijacking text messages containing authentication codes, security agencies have been able to gain access to these people's accounts. Available solutions to counter SS7-based attacks 1. Use encrypted messaging apps: Users should use apps like Signal or WhatsApp that encrypt conversations and text messages. These applications can prevent unauthorized access to information. 2. Application-based two-step authentication: Instead of using SMS to receive authentication codes, users should use secure applications such as Google Authenticator that work independently of SS7 and the risk of identity theft is reduced. 3. Shift to newer protocols: Mobile service providers should move towards using newer and more secure protocols such as Diameter, which is designed for LTE and 5G networks and does not have the weaknesses of SS7. 4. Strengthening the security of networks by operators: Mobile operators can prevent SS7 network abuse by applying more authentication and security mechanisms. This includes restricting network access and increasing monitoring of incoming and outgoing signals.

Trend Videos
3:47
433,178 views   5 days ago
13:18
3:55
453,174 views   4 days ago
3:47
433,178 views   5 days ago
11:34
1,018,886 views   2 days ago
Google AdSense
336 x 280
Up Next
19:29
Илья Sakha Japan. Авто из Японии, Кореи и Китая
12,969 views
11 days ago
44:48
CHEST IMPORT - Автомобили с аукционов Японии
62,945 views
5 months ago
4:43
ZapVl
1,245 views
4 months ago
28:58
Авто из Японии, Кореи и Китая - Япония Экспорт
23,076 views
6 months ago
41:46
PRIORITY AUTO - Авто из Японии, Кореи, Китая
27,199 views
1 year ago
25:30
Kolotysik
29,827 views
3 years ago
13:13
AUTOMANIA_JP
10,051 views
1 year ago
11:51
PRO АВТО
1,874,598 views
3 years ago
50:58
AUTO BUYER 54 Автомобили с аукционов Японии
8,087 views
6 months ago
13:07
DVTransAuto | Авто из Китая, Японии и Кореи
42,578 views
4 months ago
29:04
Константин Половянов
18,233 views
6 months ago
23:20
Япония Транзит
67,400 views
4 years ago
20:36
Авто из Японии, Кореи и Китая - AVTOBAN
1,390 views
1 year ago
43:11
SferaCar Авто из Японии
141,917 views
5 years ago
17:04
Батарейка 25 rus Life
3,480 views
9 months ago
43:19
Japan Auto
95,961 views
10 months ago
21:12
Brothers from Siberia
2,627 views
5 months ago
10:05
DOLGOV AUTO
18,521 views
2 years ago
30:03
Asia Import
48,126 views
2 years ago
11:58
Borisich sibiryak
4,135 views
2 years ago
13:13
AUTOMANIA_JP
10,051 views
1 year ago
41:46
PRIORITY AUTO - Авто из Японии, Кореи, Китая
27,199 views
1 year ago
9:40
Про тачки
36,356 views
2 years ago
13:07
DVTransAuto | Авто из Китая, Японии и Кореи
42,578 views
4 months ago
34:31
WorldСar | Автоаукционы Японии
11,965 views
11 months ago
11:18
PRO АВТО
1,165,715 views
3 years ago
21:39
16:24
10:05
DOLGOV AUTO
18,521 views
2 years ago
45:55
Вячеслав JPVAN
104,053 views
6 months ago
23:20
Япония Транзит
67,400 views
4 years ago
6:48
АВТО ИЗ ЯПОНИИ, КОРЕИ, КИТАЯ | МОТО. ЯПОНИЯ-ТРЕЙД
19,699 views
3 years ago
44:48
CHEST IMPORT - Автомобили с аукционов Японии
62,945 views
5 months ago
25:32
НАКАЧАННЫЕ КОЛЁСА
1,132,110 views
3 years ago
20:36
Авто из Японии, Кореи и Китая - AVTOBAN
1,390 views
1 year ago
Google AdSense
336 x 280

fetery.com. Copyright 2024