Effective SS7 protection ITU Workshop on SS7 Security, June 29 th 2016

Similar documents
Trojans in SS7 - how they bypass all security measures

Mobile network security report: Ukraine

Mobile operators vs. Hackers: new security measures for new bypassing techniques

GSM security country report: Estonia

GSM security country report: Thailand

MAP - Mobile Application Part

Communication Networks 2 Signaling 2 (Mobile)

TSGS#27(05)0138. Technical Specification Group Services and System Aspects Meeting #27, March 2005, Tokyo, Japan

Positive Technologies Telecom Attack Discovery DATA SHEET

Understanding IMSI Privacy!

Outstanding Communications Solutions. Root Canal. A new class of SS7 vulnerabilities

Fractured Backbones Incidents Detection and Forensics in Telco Networks

10 Call Set-up. Objectives After this chapter the student will: be able to describe the activities in the network during a call set-up.

Taking Over Telecom Networks

Mobile Security Fall 2013

MOBILE NUMBER PORTABILITY IN SWITZERLAND (NETWORK-NETWORK-INTERFACE SPECIFICATION)

IS-13 TOPS Special Solicitation Volume Report

Enterprise price plan guide Vodafone One Net Business

SS7. Mercantec H2 2009

Cyber Security Threats to Telecom Networks. Rosalia D Alessandro Hardik Mehta Loay Abdelrazek

THREATS TO PACKET CORE SECURITY OF 4G NETWORK

Mavenir Keynote. Think Smarter Secure communication Innovate Services. By Mohamed Issa Regional Head of Africa Sales

DataKom Vodafone Mobile Tariff Minimum 30 day end of month notice cancellation - Subject to contract. DataKom O2 Mobile Tariff. All prices exclude VAT

TELECOMMUNICATION SYSTEMS

GSMK. Cryptography Network Security. GSMK Oversight SS7 Firewall and Intrusion Detection System

3GPP TS V7.0.0 ( )

Enterprise price plan guide Vodafone One Net Business

PLEASE NOTE: firms may submit one set of research questionnaires covering both China and Hong Kong or separate sets for each jurisdiction

The telephone supports 2 SIM cards. All functions are available for both SIM cards and have independent settings.

Analysis of attacks / vulnerabilities SS7 / Sigtran using Wireshark (and / or tshark) and Snort

Liberalisation and User Driven

PRIMARY SECURITY THREATS FOR SS7 CELLULAR NETWORKS

@First Anti Fraud Interconnect Roaming & Security of Transactions

ETSI TS V3.0.0 ( )

GSM Open-source intelligence

The Next Generation Signaling Transfer Point

HLR Configuration Mode Commands

Addressing Geoff Huston APNIC

MNPTF PT2. NPM2V1F 17 july Mobile Number Portability Task Force : PT2 : Network Architecture and Signalling

Spoka Meet Audio Calls Rates Dial-In UK

Prototyping and evaluation of TCAPsec

GPRS security. Helsinki University of Technology S Security of Communication Protocols

E N H A N C E D F R A U D D E T E C T I O N U S I N G S I G N A L I N G. W U G M a l a y s i a

CONTENTS. Subscriber denial of service...9 Causes of vulnerabilities Recommendations for protection Conclusion... 13

Mega Event Testing Methodologies and benefits explained with examples from FIFA Florian Leeder

Interworking Internet Telephony and Wireless

Ghost Telephonist. Link Hijack Exploitations in 4G LTE CS Fallback. Yuwei ZHENG, Lin HUANG, Qing YANG, Haoqi SHAN, Jun LI

Out of Bundle Vodafone

MAP Service Configuration Mode Commands

Shell Global Helpline - Telephone Numbers

Telephony Fraud and Abuse. Merve Sahin

Marcus Wong

Drone /12/2018. Threat Model. Description. Threats. Threat Source Risk Status Date Created

VCL-NetProbe Product Brochure & Data Sheet

SMS Inspector Product Overview

HAUD SYSTEMS PRODUCT AND SERVICES PORTFOLIO

3GPP TS V6.0.0 ( )

COPYRIGHTED MATERIAL. Global System for Mobile Communications (GSM) 1.1 Circuit-Switched Data Transmission

Mobile Security Fall 2012

Three kinds of number portability

Subscriber Data Management

HLR Configuration Mode Commands

Information Technology Mobile Computing Module: GSM Handovers

A Guide to our Tariffs

No Purchase needed

GSM Interception IMSI Catcher and Voice Interception

Alternative phone number: Credit card/debit card number Expiry date: / / DD MM YYYY

OTT - THREAT OR OPPORTUNITY FOR AFRICAN TELCOS? DR CHRISTOPH STORK

We Know Where You Are!

Turquoise Terminal Returns User Guide for Creating & Uploading a Turquoise Terminal Return

Improving digital infrastructure for a better connected Thailand

GPRS Intercept: Wardriving your country. Karsten Nohl, Luca Melette,

Express Monitoring 2019

ITU REGIONAL ECONOMIC & FINANCIAL FORUM OF TELECOMMUNICATIONS/ICT FOR AFRICA INTERNATIONAL ROAMING SADC PERSPECTIVE

EE Pay Monthly Add-Ons & Commitment Packs. Version

PCS (GSM) 1900 Service Provider Number Portability

The Smart Enterprise. InGuard Application. 24/7/365 Protection from Toll Fraud Attack

Rev

Transforming networks and services for communications service providers

Hybrid Wide-Area Network Application-centric, agile and end-to-end

LET S TALK MONEY. Fahad Pervaiz. Sam Castle, Galen Weld, Franziska Roesner, Richard Anderson

Technology Lifecycle Management Assessment. Know your network - achieve business agility

ITU Arab Regional Workshop on Mobile Roaming: National & International Practices 27 to 29 of Oct, 2015 Sudan - Khartoum

Lecture 9 Mobility Management and Mobile Application Part (MAP)

3GPP TS ( )

5G World 2016 VoLTE Roaming: an opportunity for new business models. Cédric Bonnet - Orange London June 30 th, 2016

SYMANTEC ENTERPRISE SECURITY. Symantec Internet Security Threat Report September 2005 Power and Energy Industry Data Sheet

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Vodafone Global FACTS

Endpoint Security - what-if analysis 1

Step 1: New Portal User User ID Created Using IdentityIQ (IIQ)

Copyright

Unbundling roaming services. An effective way to create competition for roaming services in the European Union

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. June 18, 2015

NETWORK SECURITY. Ch. 3: Network Attacks

Stealthy SS7 Attacks

Telecom MISP. Building a Telecom Information Sharing Platform. Alexandre De Oliveira

Collaborative Regulation in the APP Economy

Fraud Detection in International Calls Using Fuzzy Logic

Benefits of Local Manufacturing

Transcription:

Effective SS7 protection ITU Workshop on SS7 Security, June 29 th 2016 Luca Melette <luca@srlabs.de> SRLabs Template v12

Motivation: Operators and their users still vulnerable to SS7 attacks

Agenda 3 attack scenarios 10 attack messages 4 defense measures 3

SS7 enables mobile abuse on different frontiers Attacker objective A Tracking Find subscriber s whereabouts B C Intercept Fraud Listen to calls, read short messages, intercept Internet traffic Make illegitimate calls/send SMS; disable usage limits 4

A Tracking through ATI has become commonplace Phone number (MSISDN) Subscriber location (LAC or Cell ID or GPS) AnytimeInterrogation 5

AnytimeInterrogation is blocked now in a lot of places. Tracking still works, though! 6

A Accurate tracking is possible with standard messages Shown in 60 Minutes Attack Probe MSC for subscriber location MSC HLR STP Attacker LAC/CID database SRI-SM [MSISDN] ACK [MSC, IMSI] Variant: Start here and send PSI to all MSCs PSI [IMSI] ACK [LAC,CID] 7

A Tracking can happen using many more signaling messages Send to phone number or all HLRs or directly to MSC Phone number (MSISDN) Subscriber location (LAC or Cell ID or GPS) AnytimeInterrogation SRI/-SM IMSI & MSC Impersonate HLR towards MSC: SendIMSI Brute-force all MSCs ProvideRN InsertSubData ForwardSM SRI-GPRS IMSI MSC PSI PSL 8

B Remote intercept is possible through Camel Shown in 60 Minutes Attack Rewrite numbers over Camel 2. Phone calls, is called, or sends an SMS MSC Call out Call in SMS out 1.InsertSubscriber- Data(Camel server) sets triggering points 3. Sends destination number to Camel server for verification SMS in Call intercept works for all Camel versions SMS intercept requires Camel v3 SS7 STP 4. Corrects number gsmscf Attacker MITM server 5.Connects call or sends SMS to attacker 9

B Location update also achieves remote intercept Shown in 60 Minutes Attack Register as subscriber HLR Real MSC Attacker MSC Call out Call in UpdateLocation [IMSI] SMS out SMS in Connects all incoming calls and SMS Forward call/sms to reach subscriber 10

C Selective denial-of-service is possible remotely Signaling message CancelLocation DeleteSubData InsertSubData PurgeMS Send to MSC MSC MSC HLR Effect For some phones: No service until reboot Nothing works until next LU No Incoming SMS / Calls 11

Agenda 3 attack scenarios 10 attack messages 4 defense measures 12

SS7 attacks are happening across the words Some Thousands Millions Observed attacks [GSMA FASG reports] Attack message Orange 22 countries Vodafone 19 cntrs Deutsche Telekom (Germany) NTT (Japan) 1. ATI 2. SRI-(SM) Tracking 3. PSI? 4. PSL? - 5. SendIMSI Remote intercept 6. ActivateSS 7. Update location 8. ISD? No measurements reported to the FASG so far Fraud 9. DSD 10. SendID 13

Attacks originate in a diverse set of networks Attacking network Africa Middle East South America Other Orange Vodafone Deutsche Telekom Morocco Seychelles Gabon Egypt Madagascar Ghana Niger Morocco Seychelles Ethiopia Morocco Nigeria NTT Ethiopia Saudi Arabia Qatar Qatar Qatar Iran Iran Oman Bolivia Peru Chile Mexico Bolivia Peru UK Albania Bosnia China 14

Agenda 3 attack scenarios 10 attack messages 4 defense measures 15

An SS7 firewall is necessary to defend from advanced attacks Defense Drop these messages Messages 1. ATI Where 1 Block 2. SRI 5. SendIMSI STP 10.SendID Re-route Home-routing + IMSI obfuscation 2. SRI-SM 2 HLR Check origin Check location Compare GT and IMSI: Is the operator asking about their own subscriber? Compare GT with subscriber location: Is your subscriber in that country? 3. PSI 8. ISD 9. DSD 6. ActivateSS 7. UpdateLoc 3 Simple SS7 firewall State-full SS7 firewall -orsimple firewall + ATI 4 + Monitor, Monitor, Monitor! 16

Take away It s about time to solve 99% of the current SS7 problem by addressing 3 attack scenarios (Track, Intercept, Fraud)... which rely on 10 SS7 messages... that we can rejected using just 4 defense measures: STP, HLR, SS7 Firewall, and Monitoring! Questions? Luca Melette <luca@srlabs.de> 17

18

Protection from SS7 threats varies; can be improved Exposure scan available from SRLabs Threat category Unprotected Standard attacks prevented Illustrative Advanced attacks prevented A B C Tracking Remotely query subscriber location Intercept Read SMS or listen to calls, locally or remotely Denial-of-service Remotely disrupt subscribers service D Fraud Add premium number charges to bill E Spam Subscribers with SMS $Operator protection level 19

B Local and remote intercept is enabled through various signaling messages Objective Attack path Local intercept (calls and SMS; in and out) Passive intercept (2G/3G) Fake base station (2G/3G) Intercepted calls/sms including IMSI Attacked phone; IMSI SendIdentification SendIdentification SendAuthInfo Encryption key Authentication & encryption key Remote intercept (starting from IMSI + MSC) Calls (incoming) Calls (in & out) Phone number Phone number SS_activate UpdateLocation InsertSubscriberData (expires with LU) Receive call and forward to correct MSC (or do SS_erase) Man-in-the-middle -or- Spoof voicemail and forward later SMS (incoming) Phone number UpdateLocation Receive (and forward) SMS RestoreData Find phone number IMSI Update- Location InsertSubscriber- Data MSISDN 20

Not all SS7 attacks can simply be blocked Abuse scenario 1 Local passive intercept Example SS7 attack message SendIdentification Mitigation effort Easy Block message at network boundary 2 3 IMSI Catcher Rerouting attacks SendAuthenticationInfo SS_activate/register UpdateLocation Camel messages (Probably others) More complex Messages are required for operations, need to be plausibility-checked 21

STP is the central instance for SS7 filtering Interconnect Core network Roaming partners SCP Other networks SCCP carriers STP MSC HLR Attacker SMSC Attacker strategy STP defense Impersonate interconnect partners Address target elements by GT or SSN Issue unexpected MAP commands Block. Verify that CgPA belongs to a trusted partner L3 Firewall. Enforce GT / SSN relationships L7 Firewall. Enforce MAP / GT relationships 22