
-
- Home
>
-
- Blog
>
-
- SIEM Trends
How to Detect and Respond to SS7 Attacks with LogRhythm SIEM
- Sep 30, 2024
- Leonardo Hutabarat
- 3 minutes to read
Table of Contents
In the telecom environment, using Signaling System No.7 (SS7) protocol is very crucial, especially in 2G networks. If you’re wondering how SS7 works, SS7 protocol is an international telecommunications standard used to set up public switched telephone network (PSTN) and one of the services that it offers is for Short Message Service (SMS). A common concern is that attackers try to exploit security vulnerabilities in the SS7 protocol which compromises voice and SMS communications.
To detect an SS7 attack, Positive Technologies developed a solution called Telecom Attack Discovery (TAD). Due to the nature and extent of an attack, which can cross from information technology (IT) to operational technology (OT), we have implemented TAD into LogRhythm SIEM to help combat SS7 attacks.
How to Detect and Respond to an SS7 Network Attack with LogRhythm SIEM’s TAD Integration
Here are four of the most common SS7 vulnerabilities customers and telecommunications organizations can detect using LogRhythm SIEM’s integration with TAD.
1. Detect Prohibited Interconnect Packets
Attackers can exploit messages received from interconnected links from other networks, without any explicit agreement to do so. Here are examples of what damages this type of SS7 attack can cause:
Denial of Service (DoS)
- Disruption of network nodes operation
- Disruption of phone subscription services
Fraud
- Illegal use of network resources or services
- Money transfer from subscriber’s account
- Call redirection
- Modification of subscriber’s profile
Data leakage
- Disclosure, interception, or theft of subscriber information such as location, text messages, and conversations
- Access to network configuration details
For all of these examples, LogRhythm SIEM has automated alert and alarm capabilities using Risk-Based Priority (RBP) in order to detect these types of attacks and notifications are sent to the appropriate user or groups.

2. Detect Packets from an Unauthorized Network Requiring an Answer
This attack exploits messages which should mainly be received in relation to an inbound roaming (visiting) subscriber from that subscriber’s home network and require an answer. The impact of this attack is data leakage.

3. Detect Suspicious Location Packets
This SS7 attack exploits messages related to a roaming subscriber activity (other than subscriber registration) from the visited network that the subscriber is currently roaming in. The calling signaling connection control part (SCCP) address of such messages should normally match the current visitor location register (VLR) address. The impact of this attack is data leakage.

4. Detect Suspicious Registration Attempts
This attack exploits messages directly involved in subscriber registration such as UL and serving area interface (SAI). These should normally be received only in relation to a roaming subscriber from the visited network that the subscriber is currently roaming in. Impact of this attack is DoS and fraud.

Identify and Respond to an SS7 Attack in the Telco Environment
Providing 24×7 monitoring is another important step to detecting an SS7 attack in the telco environment. LogRhythm SIEM’s Event Dashboard and Analyze Dashboard layouts both leverage the same building blocks (widgets) to deliver use cases that help analysts identify and investigate activity. LogRhythm SIEM provides a Telco Security Dashboard which accumulates all the information from TAD and projects it in live form. This way customers can easily be able to monitor any abnormality triggered in their OT telco environment.

Scheduled Reporting Capabilities
LogRhythm SIEM’s comprehensive reporting capabilities combine the convenience of prepackaged reports with the flexibility of custom reports to allow for effortless distribution of data. LogRhythm SIEM can be configured to send alerts and reports directly to individuals, groups, shared directories, helpdesks — or any combination — allowing for the effective dissemination of information across a distributed workforce. Reports can be scheduled for delivery or generated on-demand. They are easily accessed via the real-time Personal Dashboard, email notifications, or exported tools such as Excel files and PDF files.

Respond to SS7 Attacks with SOAR
LogRhythm SIEM’s Case Management and SmartResponse automation™ streamline incident response and enable security orchestration with prescribed analyst workflows, team collaboration tools, and built-in escalation processes. To help mitigate SS7 attacks, SmartResponse enables automated incident response which improves time to response (TTR). Analysts can execute fully automated actions such as case creation or assign playbooks. LogRhythm SIEM also has options for workflow automation to specific users for review before they are executed in semi-automated, approval-based response actions. Teams can decide which actions to automate so that they can focus on more critical issues and less manual tasks.

Secure Your Telecommunication Organization with LogRhythm SIEM
With the increasing number of cyberattacks on telecommunication organizations, it’s critical to mature your security operations by implementing a security orchestration, automation, and response (SOAR) solution that can streamline threat investigation. LogRhythm’s SOAR capabilities decrease workflow steps by dissecting use cases into manageable pieces. As your team standardizes process and becomes more efficient, you can take on complex telco-relevant use cases at scale.

Leonardo Hutabarat
Director Sales Engineering, APJ | Exabeam | Leonardo Hutabarat is Director Sales Engineering, APJ at Exabeam. He works with customers and partners to increase their cybersecurity posture. He has over 20 years of experience in the cybersecurity field. Leonardo received a Bachelor's degree in Electrical Engineering and an MBA. He also has certifications in CISSP, CISM, CISA, CRISC, GSEC, and 50+ others cybersecurity certifications. Leonardo is a seasoned public speaker at cybersecurity events such as Gartner, GovWare, Cyber DSA, and ISC2. Leonardo contributes to the community as a SANS mentor and lecturer in local universities. He enjoys sharing his expertise with journalists and media outlets such as CNN, Channel News Asia, AsiaOne, The Business Times, and The Straits Times on recent cyberattacks and related topics.
More posts by Leonardo HutabaratLearn More About Exabeam
Learn about the Exabeam platform and expand your knowledge of information security with our collection of white papers, podcasts, webinars, and more.