Skip to content

Securing the Future of Work: Agent Behavior Analytics with Google Cloud — Read the Blog

How to Detect and Respond to SS7 Attacks with LogRhythm SIEM

  • Sep 30, 2024
  • Leonardo Hutabarat
  • 3 minutes to read

Table of Contents

    In the telecom environment, using Signaling System No.7 (SS7) protocol is very crucial, especially in 2G networks. If you’re wondering how SS7 works, SS7 protocol is an international telecommunications standard used to set up public switched telephone network (PSTN) and one of the services that it offers is for Short Message Service (SMS). A common concern is that attackers try to exploit security vulnerabilities in the SS7 protocol which compromises voice and SMS communications.

    To detect an SS7 attack, Positive Technologies developed a solution called Telecom Attack Discovery (TAD). Due to the nature and extent of an attack, which can cross from information technology (IT) to operational technology (OT), we have implemented TAD into LogRhythm SIEM to help combat SS7 attacks.

    How to Detect and Respond to an SS7 Network Attack with LogRhythm SIEM’s TAD Integration

    Here are four of the most common SS7 vulnerabilities customers and telecommunications organizations can detect using LogRhythm SIEM’s integration with TAD.

    1. Detect Prohibited Interconnect Packets

    Attackers can exploit messages received from interconnected links from other networks, without any explicit agreement to do so. Here are examples of what damages this type of SS7 attack can cause:

    Denial of Service (DoS)

    • Disruption of network nodes operation
    • Disruption of phone subscription services

    Fraud

    • Illegal use of network resources or services
    • Money transfer from subscriber’s account
    • Call redirection
    • Modification of subscriber’s profile

    Data leakage

    • Disclosure, interception, or theft of subscriber information such as location, text messages, and conversations
    • Access to network configuration details

    For all of these examples, LogRhythm SIEM has automated alert and alarm capabilities using Risk-Based Priority (RBP) in order to detect these types of attacks and notifications are sent to the appropriate user or groups.

    2. Detect Packets from an Unauthorized Network Requiring an Answer

    This attack exploits messages which should mainly be received in relation to an inbound roaming (visiting) subscriber from that subscriber’s home network and require an answer. The impact of this attack is data leakage.

    3. Detect Suspicious Location Packets

    This SS7 attack exploits messages related to a roaming subscriber activity (other than subscriber registration) from the visited network that the subscriber is currently roaming in. The calling signaling connection control part (SCCP) address of such messages should normally match the current visitor location register (VLR) address. The impact of this attack is data leakage.

    4. Detect Suspicious Registration Attempts

    This attack exploits messages directly involved in subscriber registration such as UL and serving area interface (SAI). These should normally be received only in relation to a roaming subscriber from the visited network that the subscriber is currently roaming in. Impact of this attack is DoS and fraud.

    Identify and Respond to an SS7 Attack in the Telco Environment

    Providing 24×7 monitoring is another important step to detecting an SS7 attack in the telco environment. LogRhythm SIEM’s Event Dashboard and Analyze Dashboard layouts both leverage the same building blocks (widgets) to deliver use cases that help analysts identify and investigate activity. LogRhythm SIEM provides a Telco Security Dashboard which accumulates all the information from TAD and projects it in live form. This way customers can easily be able to monitor any abnormality triggered in their OT telco environment.

    Scheduled Reporting Capabilities

    LogRhythm SIEM’s comprehensive reporting capabilities combine the convenience of prepackaged reports with the flexibility of custom reports to allow for effortless distribution of data. LogRhythm SIEM can be configured to send alerts and reports directly to individuals, groups, shared directories, helpdesks — or any combination — allowing for the effective dissemination of information across a distributed workforce. Reports can be scheduled for delivery or generated on-demand. They are easily accessed via the real-time Personal Dashboard, email notifications, or exported tools such as Excel files and PDF files.

    Respond to SS7 Attacks with SOAR

    LogRhythm SIEM’s Case Management and SmartResponse automation™ streamline incident response and enable security orchestration with prescribed analyst workflows, team collaboration tools, and built-in escalation processes. To help mitigate SS7 attacks, SmartResponse enables automated incident response which improves time to response (TTR). Analysts can execute fully automated actions such as case creation or assign playbooks. LogRhythm SIEM also has options for workflow automation to specific users for review before they are executed in semi-automated, approval-based response actions. Teams can decide which actions to automate so that they can focus on more critical issues and less manual tasks.

    Secure Your Telecommunication Organization with LogRhythm SIEM

    With the increasing number of cyberattacks on telecommunication organizations, it’s critical to mature your security operations by implementing a security orchestration, automation, and response (SOAR) solution that can streamline threat investigation. LogRhythm’s SOAR capabilities decrease workflow steps by dissecting use cases into manageable pieces. As your team standardizes process and becomes more efficient, you can take on complex telco-relevant use cases at scale.

    Leonardo Hutabarat

    Leonardo Hutabarat

    Director Sales Engineering, APJ | Exabeam | Leonardo Hutabarat is Director Sales Engineering, APJ at Exabeam. He works with customers and partners to increase their cybersecurity posture. He has over 20 years of experience in the cybersecurity field. Leonardo received a Bachelor's degree in Electrical Engineering and an MBA. He also has certifications in CISSP, CISM, CISA, CRISC, GSEC, and 50+ others cybersecurity certifications. Leonardo is a seasoned public speaker at cybersecurity events such as Gartner, GovWare, Cyber DSA, and ISC2. Leonardo contributes to the community as a SANS mentor and lecturer in local universities. He enjoys sharing his expertise with journalists and media outlets such as CNN, Channel News Asia, AsiaOne, The Business Times, and The Straits Times on recent cyberattacks and related topics.

    More posts by Leonardo Hutabarat

    Learn More About Exabeam

    Learn about the Exabeam platform and expand your knowledge of information security with our collection of white papers, podcasts, webinars, and more.

    • Blog

      UEBA vs. XDR: Rethinking SIEM Augmentation in the AI Era

    • Blog

      How Exabeam Helps Organizations Adapt to Australia’s Privacy Reforms

    • White Paper

      Using MITRE ATT&CK® in Threat Hunting and Detection

    • Webinar

      LogRhythm SIEM: October 2025 Quarterly Launch

    • Podcast

      Are You Relying on the Right Tools?

    • Blog

      Can You Detect Intent Without Identity? Securing AI Agents in the Enterprise 

    • Show More