Examples of scenarios

Eavesdrop on subcriber's voice call

Hacker obtains subscriber's IMSI and VMSC number. The hacker will then overwrite the subcriber information in VMSC to render call control of mobile originated call to a hacker node. VMSC could not tell if this is malicious or not as this is a normal operation.

Hacker node connect the call to the B-number as intended while eavesdropping the voice conversation at the same time.

Problem: Subscriber's voice call could be listened or recorded.

Solution: SS7 Firewall can prevent the eavesdropping.


Track subscriber location to street level

Hacker obtains subscriber's IMSI and VMSC number. Then the hacker will request current location information from VMSC. The VMSC will oblige as no authentication can be performed.

Hacker obtains the location information of the subscriber to the cell level.

Problem: Subscriber's location made known to potentially ill-intention party.

Solution: SS7 Firewall can prevent the tracking of location.


Deny subscriber from making voice call

Hacker obtains subscriber's IMSI and VMSC number. Then tampers with the subscriber's information in VMSC so that all calls originated are barred.

This will result in subscriber to not be able to make any outgoing calls.

Problem: Subcriber unable to make potentially important phone call. The mobile operator gets blamed.

Solution: SS7 Firewall can prevent the denying of making voice call.


Spoof subscriber while making voice call

Hacker obtains subscriber's IMSI and VMSC number. Then tampers subscriber's information in VMSC so that all calls originated are bearing the identity of another caller(victim).

B-party sees call from viction and call charged to victim as well.

Problem: Subscriber made to pay for the usage of hackers. The hacker also managed to impersonate as another subscriber.

Solution: SS7 Firewall can prevent the spoofing.