R Systems and HP solution to secure mobile networks from hacker attacks

London, May 2015. R Systems has collaborated with HP to secure the network of a leading Eastern European mobile carrier. The partnership co-developed a new solution to block SS7 attacks and secure subscriber information from hackers. This allowed the mobile operator to reassure governing bodies and subscribers that their privacy and security cannot be compromised.

SS7 is a set of telephony protocols that handles the key functions on a mobile network that includes voice calls and text messages. As these protocols were developed over 30 years ago, SS7 is vulnerable to attacks in today’s interconnected world, while all mobile networks are potentially exposed to SS7 security breaches. By pretending to be an SMSE, hackers can gain access to the international mobile subscriber identity (IMSI) number and reroute calls and texts or even discover what cell site a mobile device is connected to in order to track a subscriber. Due to international roaming agreements, hackers do not even need to be in the same country as the target.

The new robust solution works by checking the authenticity of the short message service engine (SMSE). It can block attacks and allow legitimate messages to get through securely.

“SS7 is an integral part of almost all mobile networks. This vulnerability is therefore a significant problem for carriers, governments and subscribers. It could only be a matter of time before a large-scale hack gains international attention,” said Florin Oltean, Practice Principal/Solution Domain Manager at HP. “Operators need to act now to secure their networks and prevent embarrassing and potential dangerous attacks.”

“We worked closely with HP to develop a solution that can protect operators and their subscribers from attacks while maintaining normal network operation,” said Bogdan Danila, Business Unit Director, Consultancy and System Integration for R Systems. “The solution is proven to work and is already up and running in a number of mobile networks. All operators should adopt a solution that prevents attacks before it is too late.”

Leave a Comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Scroll to Top

Apply to this job

Contact us

Send your CV