SlideShare a Scribd company logo
1 of 37
Download to read offline
LTE Network Automation
under Threat
Altaf Shaik
(Technische Universität Berlin & Kaitiaki Labs)
Ravishankar Borgaonkar
(SINTEF Digital & Kaitiaki Labs)
8 August 2018
KAITIAKI
Blackhat USA 2018, Las Vegas
We Do…
• Mobile network and devices security
• Telecommunication protocol and device analysis
• Attacks and defenses
• Secure network building
8 August 2018
KAITIAKI
Overview
• 4G/LTE & SON operations
• Vulnerabilities and exploitation
• Setup and DoS attacks
• Impact and status
• Mitigations
• Takeaways
8 August 2018
Mobile Network Architecture
8 August 2018
• UE: User Equipment
• eNodeB: Evolved NodeB
• X2: New interface connecting
eNodeBs
• P: Propreitary
Recap - Telco Attacks
• IMSI Catchers
8 August 2018
• Man-in-the-middle
• Interception (Passive)
• SS7
• Locate, Track, Manipulate
• DoS (Radio channels & HLR)
Our Focus – Network Automation
• Favorite Target we know ->
• What about attacking base stations ->
• Is it possible?
• Remotely, without detection?
• Base stations can operate automatically (self operated)
• Self Organized Network (SON)
8 August 2018
Self Organized Network (SON)
• New X2 interface in LTE
• Plug & play network elements - Low CAPEX and OPEX
• Base stations - Automatic configure and control
• 3GPP standardized from LTE Rel. 8 (32.500)
• 5G SON : low-latency, end-to-end intelligent, complex networks
8 August 2018
X2
SON
• Software package installed on eNodeB or OAM
• Mix of standards and implementations
• Vendor implementations (UltraSON, Elastic-SON, NGSON, AirSON)
• 90% Operators support SON
• No reported attacks till now..!
8 August 2018
8 August 2018
Background
8 August 2018
SON Operation in Practice
Self-Configuration
Self-Optimization
Self-Healing
Control System
SON Technical Features
• ANR – Automatic Neighbor Relation
• Discover & add new base stations into the network
• PCI Optimization
• Solve adjacent cell ID conflicts
• MRO – Mobility Robustness Optimization
• Control handover settings to adjust coverage
8 August 2018
SON Operation Modes
• Off
• Collect data, no parameter-change
• Manual apply
• Parameter-change with operator confirmation
• Automatic apply
• Automatic parameter change, autonomous operation
8 August 2018
SON Design Issue
information from phones & base stations
8 August 2018
SON logic and
intelligence
Trusted and Unverified
Design Flaw
Key Question
Rogue eNodeB
Real eNodeB
8 August 2018
UE
LTE networkLTE network
Automation in LTE – Vulnerable Points
• Cell configurations
• PCI (Physical Cell ID)
• Neighbor relations
• Discover eNodeBs, share configs - neighbor cells, load info
• Handover analysis
• Performance statistics, success/drop rates
• Coverage enhancements
• Radio Link Failure (RLF) report
8 August 2018
8 August 2018
Design Vulnerabilities
LTE PCI Optimization
8 August 2018
• PCI: Physical Cell ID
• Adjacent cells: unique PCI, same frequency
• Network scanners, UE reports report PCI conflicts
• Same PCI: collision/confusion for UEs
• Handover failures, connection issues
122
PCI = 100
**eNodeB forced to change their config**
155
122
133
129
Automatic Neighbor Relation (ANR)
8 August 2018
• Discover new
eNodeBs
• Connect on X2
interface
X2
Source: 3GPP
Automatic Neighbor Relation (ANR)
8 August 2018
• Neighbor relation table
• No Remove
• NoHo : No Handover
• NoX2
**No attributes to authorize X2 setup** Source: 3GPP
LTE Handover
8 August 2018
• X2 connected handovers
• GSM vs LTE handover
• No neighbor cell list for UE – detect all
• Based on PCI and EARFCN only
**Reported Cells can be real or fake
– No verification**
X2
LTE Handover
8 August 2018
Handover Analysis
• Handover failure types
• Early HO, Late HO, HO to wrong cell
• Identify faults
• RLF reports (UE -> eNodeB)
• HO reports (eNodeB <-> eNodeB)
• Periodic KPI monitoring
• Solve faults, How?
• Adjust coverage settings
**HO blacklist (KPI < HO success threshold)**
8 August 2018
Handover success rate
Handover preparation success rate
Handover execution success rate
Handover problems – solutions
• Increase/decrease coverage
• Change cell index offset
Rogue Data Injection
• Measurement report
• Can contain false information (3GPP 36.331) - for handovers and ANR
• Radio Link Failure (RLF) report
• Can contain false information (3GPP 36.331) - for MRO
• Handover reports
• Reports between eNodeBs about handover failures - for MRO
• Information received from UE - content is not verified
• Attackers can inject rogue data
8 August 2018
Vulnerable Mobile Network Functions
• Cell detection and addition
• Cell ID interference detections
• LTE handover process
• Handover analysis
• Network coverage tuning
8 August 2018
8 August 2018
Exploitation
Rogue eNodeB
• 200 $ setup
• Broadcast channels sufficient
• Spoof cell IDs of a legitimate eNodeB
• No interaction with UE
• Operating range depends on hardware
• 50 meters without amplifiers
• Open source software SRSLTE
• For testing - SON base stations, faraday cage
8 August 2018
122
• Adjacent eNodeBs are connected via X2 (ANR)
• Rogue eNodeB - legitimate PCI and ECGI (133, 272, 112)
• UEs report PCI 133 to eNodeB
• ANR begins to add 133 to NRT
• Problem
• Zero control/authorize for X2 setup
• Effect
• X2 signaling flood when more cells are impersonated
• Handover failures
-> Exploiting X2 Signaling
8 August 2018
133
PCI = 100
133
X2
X2
NR PCI No
Remove
No
HO
No
X2
1 122 √
2 109 √
NR PCI No
Remove
No
HO
No
X2
1 122 √
2 109 √
3 133
200
• Adjacent cells/eNodeBs use unique PCI to avoid collision
• Rogue eNodeB Broadcast legitimate PCIs (100, 200, 300)
• Problem
• Adjacent eNodeBs cannot use same PCI and starts optimization
• Effect
• Restart eNodeB/cell and choose a new PCI
• Restart time roughly 7-8 minutes
• Release the connected UEs to other base stations (2G/3G)
-> Remotely Kill & Restart LTE Base Station
8 August 2018
PCI = 100
100
200
300
300
100
• UE in a voice call and sends periodic measurement reports
• Rogue eNodeB Broadcast legitimate neighboring PCI (100)
• Strong signal from PCI 100 causes handover
• PCI 100 already in neighbor list
• Problem
• Handover with false information
• Effect
• UE connects to rogue eNodeB – Handover hijacked
• RLF– report created against a real eNodeB
• Ongoing calls are dropped
-> Handover Hijacking (Dropping Calls)
8 August 2018
PCI = 200
100
Start X2
Handover
Handover
to PCI=100
Handover
failed
Re-establish
connectionrejectRLF report
Handover
Impact of Handover Hijacking
• Rogue eNodeB calumniates (defames) a real eNodeB
• RLF reports with false data
• Handover failures
• Coverage changes
• KPI drops – HO blacklisted or eNodeB/cell is shutdown
• 1 rogue eNodeB, 5 seconds – drop all cell (call + data) traffic..!
8 August 2018
Impact – Grand Scale
• Detection by operators – no known methods to detect
• Persistent attacks – time needed for SON to heal
• Full Paper : https://dl.acm.org/citation.cfm?id=3212497
8 August 2018
Subscriber Operator
Call and data drops eNodeB maintenance and repairs
Poor network coverage Poor network coverage
UE downgrades to 3G/2G Revenue loss
Customer complaints
8 August 2018
Security Status
Affected Products
• All LTE phones complying to 3GPP 36.331 >= Rel. 8
• 4 basebands vendors (based on tested UEs)
• All network products complying with 32.500 >= Rel.8
• 4 network vendors (based on available product documentation)
8 August 2018
Vulnerability Status
• Disclosed with two operators (SON experts) and GSMA
• Biggest European operators experts confirmed the issues
• Comments from GSMA and operators
• Switch to less automation – reduce risk
• PCI reallocation during maintenance period
• Unplug a defective eNodeB (not really defective)
• Difficulties to detect & add mitigations
• GSMA guidelines document (ongoing) – protection from rogue base stations
8 August 2018
Solutions
• Signed broadcast messages
• Prevent connection to rogue base stations (5G: NO, complicated design)
• Content verification
• Verify measurement reports from UE
• Compatibility issues, power issues, efficiency problems
• Adding actionable intelligence to SON
• Built-in baseband features to detect rogue base stations
• Ongoing work with a vendor
8 August 2018
Takeaways
• SON operate with unverified information from phones
• Current SON techniques cannot deal with Rogue base station attacks
• Lack of appropriate parameters for optimal automation decisions
• Automation lacks data verification and rely on few parameters
• A 200 $ rogue device can modify network configurations and turn it OFF..!
8 August 2018
8 August 2018
Thank you
altaf329@sect.tu-berlin.de
rbbo@kth.se
director@kaitiaki.in

More Related Content

What's hot

15222845 pss7-ans
15222845 pss7-ans15222845 pss7-ans
15222845 pss7-ans15222845
 
HITCON 2015 - Building Automation and Control: Hacking Subsidized Energy Savi...
HITCON 2015 - Building Automation and Control: Hacking Subsidized Energy Savi...HITCON 2015 - Building Automation and Control: Hacking Subsidized Energy Savi...
HITCON 2015 - Building Automation and Control: Hacking Subsidized Energy Savi...Philippe Lin
 
15250423 pss7-ans
15250423 pss7-ans15250423 pss7-ans
15250423 pss7-anscbb0205
 
RFID Application
RFID ApplicationRFID Application
RFID Applicationngjklmn
 
RFID Application
RFID ApplicationRFID Application
RFID Application15223515
 
RFID Application
RFID ApplicationRFID Application
RFID Applicationvianchow
 
Presentation 15251470 pss7
Presentation 15251470 pss7Presentation 15251470 pss7
Presentation 15251470 pss7chrisalmighty
 
2010 11 18 Substation Automation Systems By Gin Quesada
2010 11 18  Substation Automation Systems By Gin Quesada2010 11 18  Substation Automation Systems By Gin Quesada
2010 11 18 Substation Automation Systems By Gin Quesadaginquesada
 
Aether Engineering, San Diego State Senior Design Fall 2015
Aether Engineering, San Diego State Senior Design Fall 2015Aether Engineering, San Diego State Senior Design Fall 2015
Aether Engineering, San Diego State Senior Design Fall 2015Lionel Fox
 
RFID Application
RFID ApplicationRFID Application
RFID Applicationerichuieric
 
RFID & ITS APPLICATIONS
RFID & ITS APPLICATIONSRFID & ITS APPLICATIONS
RFID & ITS APPLICATIONS15250202
 
15219690 pss7-ans
15219690 pss7-ans15219690 pss7-ans
15219690 pss7-ansGCIT1015
 
15251446 pss7
15251446 pss715251446 pss7
15251446 pss7宣 曾
 
Taking a closer look at level 0 and level 1 security
Taking a closer look at level 0 and level 1 securityTaking a closer look at level 0 and level 1 security
Taking a closer look at level 0 and level 1 securityMatt Loong
 

What's hot (20)

15222845 pss7-ans
15222845 pss7-ans15222845 pss7-ans
15222845 pss7-ans
 
HITCON 2015 - Building Automation and Control: Hacking Subsidized Energy Savi...
HITCON 2015 - Building Automation and Control: Hacking Subsidized Energy Savi...HITCON 2015 - Building Automation and Control: Hacking Subsidized Energy Savi...
HITCON 2015 - Building Automation and Control: Hacking Subsidized Energy Savi...
 
15250423 pss7-ans
15250423 pss7-ans15250423 pss7-ans
15250423 pss7-ans
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
15250385 pss7-ans
15250385 pss7-ans15250385 pss7-ans
15250385 pss7-ans
 
Presentation 15251470 pss7
Presentation 15251470 pss7Presentation 15251470 pss7
Presentation 15251470 pss7
 
2010 11 18 Substation Automation Systems By Gin Quesada
2010 11 18  Substation Automation Systems By Gin Quesada2010 11 18  Substation Automation Systems By Gin Quesada
2010 11 18 Substation Automation Systems By Gin Quesada
 
HomeControl
HomeControlHomeControl
HomeControl
 
15250377 pss7-ans
15250377 pss7-ans15250377 pss7-ans
15250377 pss7-ans
 
Aether Engineering, San Diego State Senior Design Fall 2015
Aether Engineering, San Diego State Senior Design Fall 2015Aether Engineering, San Diego State Senior Design Fall 2015
Aether Engineering, San Diego State Senior Design Fall 2015
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID & ITS APPLICATIONS
RFID & ITS APPLICATIONSRFID & ITS APPLICATIONS
RFID & ITS APPLICATIONS
 
15219690 pss7-ans
15219690 pss7-ans15219690 pss7-ans
15219690 pss7-ans
 
14250128-pss7-ans
14250128-pss7-ans14250128-pss7-ans
14250128-pss7-ans
 
15251446 pss7
15251446 pss715251446 pss7
15251446 pss7
 
Taking a closer look at level 0 and level 1 security
Taking a closer look at level 0 and level 1 securityTaking a closer look at level 0 and level 1 security
Taking a closer look at level 0 and level 1 security
 
4G Mobile Interception (Edecision)
4G Mobile Interception (Edecision)4G Mobile Interception (Edecision)
4G Mobile Interception (Edecision)
 

Similar to LTE Network Automation Under Threat

422738668-LTE-Downlink-Throughput-Optimization-Based-on-Performance-Data [Rep...
422738668-LTE-Downlink-Throughput-Optimization-Based-on-Performance-Data [Rep...422738668-LTE-Downlink-Throughput-Optimization-Based-on-Performance-Data [Rep...
422738668-LTE-Downlink-Throughput-Optimization-Based-on-Performance-Data [Rep...SudheeraIndrajith
 
Practical security testing for lte networks
Practical security testing for lte networksPractical security testing for lte networks
Practical security testing for lte networksPfedya
 
Link Labs LPWA Webinar
Link Labs LPWA WebinarLink Labs LPWA Webinar
Link Labs LPWA WebinarBrian Ray
 
Implications of 4G Deployments (MEF for MPLS World Congress Ethernet Wholesa...
Implications of 4G Deployments (MEF for MPLS World Congress  Ethernet Wholesa...Implications of 4G Deployments (MEF for MPLS World Congress  Ethernet Wholesa...
Implications of 4G Deployments (MEF for MPLS World Congress Ethernet Wholesa...Javier Gonzalez
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesThe IOT Academy
 
Wireless technologies and .11n
Wireless technologies and .11nWireless technologies and .11n
Wireless technologies and .11nswathi b
 
Device-level AI for 5G and beyond
Device-level AI for 5G and beyondDevice-level AI for 5G and beyond
Device-level AI for 5G and beyond3G4G
 
IOT, It's the Internet...only bigger
IOT, It's the Internet...only biggerIOT, It's the Internet...only bigger
IOT, It's the Internet...only biggerAPNIC
 
Link labs 2 g 3g cdma transition webinar slides
Link labs 2 g 3g cdma transition webinar slidesLink labs 2 g 3g cdma transition webinar slides
Link labs 2 g 3g cdma transition webinar slidesBrian Ray
 
Link labs 2 g 3g cdma transition webinar slides
Link labs 2 g 3g cdma transition webinar slidesLink labs 2 g 3g cdma transition webinar slides
Link labs 2 g 3g cdma transition webinar slidesBrian Ray
 
Link labs 2G 3G CDMA transition webinar slides
Link labs 2G 3G CDMA transition webinar slidesLink labs 2G 3G CDMA transition webinar slides
Link labs 2G 3G CDMA transition webinar slidesBrian Ray
 
Radio Frequency Identification Technology In IOT
Radio Frequency Identification Technology In IOTRadio Frequency Identification Technology In IOT
Radio Frequency Identification Technology In IOTNikhil Patankar
 
Materi seminar 5 g ieee comsoc lecture 5g evolution v2
Materi seminar 5 g ieee comsoc lecture 5g evolution v2Materi seminar 5 g ieee comsoc lecture 5g evolution v2
Materi seminar 5 g ieee comsoc lecture 5g evolution v2indonesiabelajar
 
Link labs LTE-M NB-IOT Hype Webinar slides
Link labs LTE-M NB-IOT Hype Webinar slidesLink labs LTE-M NB-IOT Hype Webinar slides
Link labs LTE-M NB-IOT Hype Webinar slidesBrian Ray
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8Waqas Ahmed Nawaz
 
Mobile IoT Network :Current Status and Future Evolution
Mobile IoT  Network :Current Status and Future EvolutionMobile IoT  Network :Current Status and Future Evolution
Mobile IoT Network :Current Status and Future EvolutionSivasothy Shanmugalingam
 

Similar to LTE Network Automation Under Threat (20)

422738668-LTE-Downlink-Throughput-Optimization-Based-on-Performance-Data [Rep...
422738668-LTE-Downlink-Throughput-Optimization-Based-on-Performance-Data [Rep...422738668-LTE-Downlink-Throughput-Optimization-Based-on-Performance-Data [Rep...
422738668-LTE-Downlink-Throughput-Optimization-Based-on-Performance-Data [Rep...
 
Practical security testing for lte networks
Practical security testing for lte networksPractical security testing for lte networks
Practical security testing for lte networks
 
Link Labs LPWA Webinar
Link Labs LPWA WebinarLink Labs LPWA Webinar
Link Labs LPWA Webinar
 
Implications of 4G Deployments (MEF for MPLS World Congress Ethernet Wholesa...
Implications of 4G Deployments (MEF for MPLS World Congress  Ethernet Wholesa...Implications of 4G Deployments (MEF for MPLS World Congress  Ethernet Wholesa...
Implications of 4G Deployments (MEF for MPLS World Congress Ethernet Wholesa...
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and Challenges
 
unit 2.pdf
unit 2.pdfunit 2.pdf
unit 2.pdf
 
Cma5000a gige
Cma5000a   gigeCma5000a   gige
Cma5000a gige
 
Wireless technologies
Wireless technologiesWireless technologies
Wireless technologies
 
Wireless technologies and .11n
Wireless technologies and .11nWireless technologies and .11n
Wireless technologies and .11n
 
Device-level AI for 5G and beyond
Device-level AI for 5G and beyondDevice-level AI for 5G and beyond
Device-level AI for 5G and beyond
 
IOT, It's the Internet...only bigger
IOT, It's the Internet...only biggerIOT, It's the Internet...only bigger
IOT, It's the Internet...only bigger
 
Link labs 2 g 3g cdma transition webinar slides
Link labs 2 g 3g cdma transition webinar slidesLink labs 2 g 3g cdma transition webinar slides
Link labs 2 g 3g cdma transition webinar slides
 
Link labs 2 g 3g cdma transition webinar slides
Link labs 2 g 3g cdma transition webinar slidesLink labs 2 g 3g cdma transition webinar slides
Link labs 2 g 3g cdma transition webinar slides
 
Link labs 2G 3G CDMA transition webinar slides
Link labs 2G 3G CDMA transition webinar slidesLink labs 2G 3G CDMA transition webinar slides
Link labs 2G 3G CDMA transition webinar slides
 
Radio Frequency Identification Technology In IOT
Radio Frequency Identification Technology In IOTRadio Frequency Identification Technology In IOT
Radio Frequency Identification Technology In IOT
 
Materi seminar 5 g ieee comsoc lecture 5g evolution v2
Materi seminar 5 g ieee comsoc lecture 5g evolution v2Materi seminar 5 g ieee comsoc lecture 5g evolution v2
Materi seminar 5 g ieee comsoc lecture 5g evolution v2
 
Bell4GLTE
Bell4GLTEBell4GLTE
Bell4GLTE
 
Link labs LTE-M NB-IOT Hype Webinar slides
Link labs LTE-M NB-IOT Hype Webinar slidesLink labs LTE-M NB-IOT Hype Webinar slides
Link labs LTE-M NB-IOT Hype Webinar slides
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
 
Mobile IoT Network :Current Status and Future Evolution
Mobile IoT  Network :Current Status and Future EvolutionMobile IoT  Network :Current Status and Future Evolution
Mobile IoT Network :Current Status and Future Evolution
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 

Recently uploaded (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 

LTE Network Automation Under Threat

  • 1. LTE Network Automation under Threat Altaf Shaik (Technische Universität Berlin & Kaitiaki Labs) Ravishankar Borgaonkar (SINTEF Digital & Kaitiaki Labs) 8 August 2018 KAITIAKI Blackhat USA 2018, Las Vegas
  • 2. We Do… • Mobile network and devices security • Telecommunication protocol and device analysis • Attacks and defenses • Secure network building 8 August 2018 KAITIAKI
  • 3. Overview • 4G/LTE & SON operations • Vulnerabilities and exploitation • Setup and DoS attacks • Impact and status • Mitigations • Takeaways 8 August 2018
  • 4. Mobile Network Architecture 8 August 2018 • UE: User Equipment • eNodeB: Evolved NodeB • X2: New interface connecting eNodeBs • P: Propreitary
  • 5. Recap - Telco Attacks • IMSI Catchers 8 August 2018 • Man-in-the-middle • Interception (Passive) • SS7 • Locate, Track, Manipulate • DoS (Radio channels & HLR)
  • 6. Our Focus – Network Automation • Favorite Target we know -> • What about attacking base stations -> • Is it possible? • Remotely, without detection? • Base stations can operate automatically (self operated) • Self Organized Network (SON) 8 August 2018
  • 7. Self Organized Network (SON) • New X2 interface in LTE • Plug & play network elements - Low CAPEX and OPEX • Base stations - Automatic configure and control • 3GPP standardized from LTE Rel. 8 (32.500) • 5G SON : low-latency, end-to-end intelligent, complex networks 8 August 2018 X2
  • 8. SON • Software package installed on eNodeB or OAM • Mix of standards and implementations • Vendor implementations (UltraSON, Elastic-SON, NGSON, AirSON) • 90% Operators support SON • No reported attacks till now..! 8 August 2018
  • 10. 8 August 2018 SON Operation in Practice Self-Configuration Self-Optimization Self-Healing Control System
  • 11. SON Technical Features • ANR – Automatic Neighbor Relation • Discover & add new base stations into the network • PCI Optimization • Solve adjacent cell ID conflicts • MRO – Mobility Robustness Optimization • Control handover settings to adjust coverage 8 August 2018
  • 12. SON Operation Modes • Off • Collect data, no parameter-change • Manual apply • Parameter-change with operator confirmation • Automatic apply • Automatic parameter change, autonomous operation 8 August 2018
  • 13. SON Design Issue information from phones & base stations 8 August 2018 SON logic and intelligence Trusted and Unverified Design Flaw
  • 14. Key Question Rogue eNodeB Real eNodeB 8 August 2018 UE LTE networkLTE network
  • 15. Automation in LTE – Vulnerable Points • Cell configurations • PCI (Physical Cell ID) • Neighbor relations • Discover eNodeBs, share configs - neighbor cells, load info • Handover analysis • Performance statistics, success/drop rates • Coverage enhancements • Radio Link Failure (RLF) report 8 August 2018
  • 16. 8 August 2018 Design Vulnerabilities
  • 17. LTE PCI Optimization 8 August 2018 • PCI: Physical Cell ID • Adjacent cells: unique PCI, same frequency • Network scanners, UE reports report PCI conflicts • Same PCI: collision/confusion for UEs • Handover failures, connection issues 122 PCI = 100 **eNodeB forced to change their config** 155 122 133 129
  • 18. Automatic Neighbor Relation (ANR) 8 August 2018 • Discover new eNodeBs • Connect on X2 interface X2 Source: 3GPP
  • 19. Automatic Neighbor Relation (ANR) 8 August 2018 • Neighbor relation table • No Remove • NoHo : No Handover • NoX2 **No attributes to authorize X2 setup** Source: 3GPP
  • 20. LTE Handover 8 August 2018 • X2 connected handovers • GSM vs LTE handover • No neighbor cell list for UE – detect all • Based on PCI and EARFCN only **Reported Cells can be real or fake – No verification** X2
  • 22. Handover Analysis • Handover failure types • Early HO, Late HO, HO to wrong cell • Identify faults • RLF reports (UE -> eNodeB) • HO reports (eNodeB <-> eNodeB) • Periodic KPI monitoring • Solve faults, How? • Adjust coverage settings **HO blacklist (KPI < HO success threshold)** 8 August 2018 Handover success rate Handover preparation success rate Handover execution success rate Handover problems – solutions • Increase/decrease coverage • Change cell index offset
  • 23. Rogue Data Injection • Measurement report • Can contain false information (3GPP 36.331) - for handovers and ANR • Radio Link Failure (RLF) report • Can contain false information (3GPP 36.331) - for MRO • Handover reports • Reports between eNodeBs about handover failures - for MRO • Information received from UE - content is not verified • Attackers can inject rogue data 8 August 2018
  • 24. Vulnerable Mobile Network Functions • Cell detection and addition • Cell ID interference detections • LTE handover process • Handover analysis • Network coverage tuning 8 August 2018
  • 26. Rogue eNodeB • 200 $ setup • Broadcast channels sufficient • Spoof cell IDs of a legitimate eNodeB • No interaction with UE • Operating range depends on hardware • 50 meters without amplifiers • Open source software SRSLTE • For testing - SON base stations, faraday cage 8 August 2018
  • 27. 122 • Adjacent eNodeBs are connected via X2 (ANR) • Rogue eNodeB - legitimate PCI and ECGI (133, 272, 112) • UEs report PCI 133 to eNodeB • ANR begins to add 133 to NRT • Problem • Zero control/authorize for X2 setup • Effect • X2 signaling flood when more cells are impersonated • Handover failures -> Exploiting X2 Signaling 8 August 2018 133 PCI = 100 133 X2 X2 NR PCI No Remove No HO No X2 1 122 √ 2 109 √ NR PCI No Remove No HO No X2 1 122 √ 2 109 √ 3 133
  • 28. 200 • Adjacent cells/eNodeBs use unique PCI to avoid collision • Rogue eNodeB Broadcast legitimate PCIs (100, 200, 300) • Problem • Adjacent eNodeBs cannot use same PCI and starts optimization • Effect • Restart eNodeB/cell and choose a new PCI • Restart time roughly 7-8 minutes • Release the connected UEs to other base stations (2G/3G) -> Remotely Kill & Restart LTE Base Station 8 August 2018 PCI = 100 100 200 300 300
  • 29. 100 • UE in a voice call and sends periodic measurement reports • Rogue eNodeB Broadcast legitimate neighboring PCI (100) • Strong signal from PCI 100 causes handover • PCI 100 already in neighbor list • Problem • Handover with false information • Effect • UE connects to rogue eNodeB – Handover hijacked • RLF– report created against a real eNodeB • Ongoing calls are dropped -> Handover Hijacking (Dropping Calls) 8 August 2018 PCI = 200 100 Start X2 Handover Handover to PCI=100 Handover failed Re-establish connectionrejectRLF report Handover
  • 30. Impact of Handover Hijacking • Rogue eNodeB calumniates (defames) a real eNodeB • RLF reports with false data • Handover failures • Coverage changes • KPI drops – HO blacklisted or eNodeB/cell is shutdown • 1 rogue eNodeB, 5 seconds – drop all cell (call + data) traffic..! 8 August 2018
  • 31. Impact – Grand Scale • Detection by operators – no known methods to detect • Persistent attacks – time needed for SON to heal • Full Paper : https://dl.acm.org/citation.cfm?id=3212497 8 August 2018 Subscriber Operator Call and data drops eNodeB maintenance and repairs Poor network coverage Poor network coverage UE downgrades to 3G/2G Revenue loss Customer complaints
  • 33. Affected Products • All LTE phones complying to 3GPP 36.331 >= Rel. 8 • 4 basebands vendors (based on tested UEs) • All network products complying with 32.500 >= Rel.8 • 4 network vendors (based on available product documentation) 8 August 2018
  • 34. Vulnerability Status • Disclosed with two operators (SON experts) and GSMA • Biggest European operators experts confirmed the issues • Comments from GSMA and operators • Switch to less automation – reduce risk • PCI reallocation during maintenance period • Unplug a defective eNodeB (not really defective) • Difficulties to detect & add mitigations • GSMA guidelines document (ongoing) – protection from rogue base stations 8 August 2018
  • 35. Solutions • Signed broadcast messages • Prevent connection to rogue base stations (5G: NO, complicated design) • Content verification • Verify measurement reports from UE • Compatibility issues, power issues, efficiency problems • Adding actionable intelligence to SON • Built-in baseband features to detect rogue base stations • Ongoing work with a vendor 8 August 2018
  • 36. Takeaways • SON operate with unverified information from phones • Current SON techniques cannot deal with Rogue base station attacks • Lack of appropriate parameters for optimal automation decisions • Automation lacks data verification and rely on few parameters • A 200 $ rogue device can modify network configurations and turn it OFF..! 8 August 2018
  • 37. 8 August 2018 Thank you altaf329@sect.tu-berlin.de rbbo@kth.se director@kaitiaki.in