SlideShare a Scribd company logo
1 of 51
Download to read offline
Hidden Agendas:
bypassing GSMA
recommendations
on SS7 networks
Kirill Puzankov
Ongoing
security
research
Signaling System 7
(SS7) security report
2014
Vulnerabilities of
mobile Internet (GPRS)
2014
Primary security threats
to SS7 cellular networks
2016
Next-generation networks, next-
level cybersecurity problems
(Diameter vulnerabilities)
2017
Threats to packet core
security of 4G network
2017
SS7 Vulnerabilities and
Attack Exposure Report
2018
Diameter Vulnerabilities
Exposure Report
2018
Responsible disclosure –
responsible attitude
History,
facts & figures
History of signaling security
SS7 network developed. Trusted
environment for fixed-line
operators only. No security
mechanisms in the protocol stack.
SIGTRAN (SS7 over IP)
introduced. Number of operators
grows. Security is still missing.
Huge number of MNOs, MVNOs,
and VAS providers. SS7 widely
used, Diameter added and
spreading. Still not enough
security!
Growing number of SS7
interconnections, increasing
amount of SS7 traffic. No security
policies or restrictions.
Innovations of TODAY
rely on OBSOLETE technologies
from YESTERDAY
Although 4G networks use another signaling
protocol (Diameter), they still need to
interface with previous-generation mobile
networks for converting incoming SS7
messages into equivalent Diameter ones.
Trusted
ecosystem
1980
No security
2000
Massive
growth
Not trusted
anymore
2019
The state of signaling security
has not changed for almost 40 years.
Now what can a hacker do?
Easily
From
anywhere
Any mobile
operator
No special
skills needed
Steal your money
Get access to your
email and social media
Track your location
Intercept your data, calls
and SMS messages
Take control of
your digital identity
SS7
GTP
Diameter
Different Protocols
Same Threats
Perform massive denial
of service attacks
Are these threats real?
Our worldwide research statistic
based on 70+ telecom security audits:
ALL
LTE networks are vulnerable
to denial of service attacks
4,000+
attacks hit a mobile network
operator per day
75%
of mobile networks put
subscribers at risk of geotracking
67%
of networks fail to prevent
bypass of SS7 protections
53%
of call tapping attempts
on 3G networks succeed
9 out of 10
of SMS messages can be
intercepted
Most dangerous layers in SS7 structure
We found the vulnerability in the mid 2018.
During the year, we tested it on different telecom equipment and security tools.
TCAP Begin
Operation 1
Operation 2
Positive Technologies: Double MAP CVD-2018-0015 (Dec 2018).
https://infocentre2.gsma.com/gp/wg/FSG/CVD/CVD%20Repository1/CVD-2018-0015%20-%20UNDER%20REVIEW/CVD-2018-0015%20Submission%20Form_PT_Double_MAP.pdf
Double MAP Vulnerability
Double MAP vulnerability idea
Hide an illegitimate MAP component after another one that looks legal is
encapsulated in the same TCAP message.
TCAP Begin
Operation 1
Operation 2
There is one big problem — Application Context Name.
ACN
The Application Context Name is defined only once in a TCAP message.
The Application Context Name value should accord with one particular OpCode.
• The first component is implemented, the second one is ignored.
• Terminating equipment rejects the TCAP message.
Nuances exist
TCAP structure
TCAP Message Type—mandatory
Transaction IDs—mandatory
Dialogue Portion—optional
Component Portion—optional
TCAP—Transaction Capabilities Application Part
SMS delivery with no SMS Home Routing in place
Basic nodes and identifiers
HLR — Home Location Register
MSC/VLR — Mobile Switching
Center and Visited Location Register
SMS-C — SMS Centre
MSISDN — Mobile Subscriber
Integrated Services Digital Number
IMSI — International Mobile
Subscriber Identity
STP — Signaling Transfer Point
GT — Global Title, address of a core
node element
Basic nodes and IDs
SMS delivery with no SMS Home Routing in place
IMSI
An IMSI identifier, by itself, is not valuable to an intruder
But intruders can carry out many malicious actions against
subscribers when they know the IMSI, such as:
 Location tracking
 Service disturbance
 SMS interception
 Voice call eavesdropping
The IMSI is considered personal data as per GDPR.
IMSI
SMS delivery with no SMS Home Routing in place
STP
MSC
1. SRI4SM Request
• MSISDN
1. SRI4SM Request
• MSISDN
2. SRI4SM Response
• IMSI
• MSC Address
2. SRI4SM Response
• IMSI
• MSC Address
3. MT-SMS
• IMSI
• SMS Text
3. MT-SMS
• IMSI
• SMS Text
SRI4SM — SendRoutingInfoForSM
HLR
SMS-C
Simple SMS delivery
SMS delivery with no SMS Home Routing in place
SRI4SM abuse by a malefactor
STP
MSC
1. SRI4SM Request
• MSISDN
1. SRI4SM Request
• MSISDN
2. SRI4SM Response
• IMSI
• MSC Address
2. SRI4SM Response
• IMSI
• MSC Address
HLR
SRI4SM abuse by a malefactor
SMS delivery with no SMS Home Routing in place
SMS Router
SMS Home Routing
STP
HLR
MSC
1. SRI4SM Request
• MSISDN
1. SRI4SM Request
• MSISDN
3. MT-SMS
• Fake IMSI
• SMS Text
3. MT-SMS
• Fake IMSI
• SMS Text
4. SRI4SM Request
• MSISDN
6. MT-SMS
• Real IMSI
• SMS Text
SMS-C
5. SRI4SM Response
• Real IMSI
• MSC Address
2. SRI4SM Response
• Fake IMSI
• SMS-R Address
2. SRI4SM Response
• Fake IMSI
• SMS-R Address
SMS Home Routing in place
SMS delivery with no SMS Home Routing in place
SMS Router
SMS Home Routing against malefactors
STP
HLR
MSC
1. SRI4SM Request
• MSISDN
1. SRI4SM Request
• MSISDN
2. SRI4SM Response
• Fake IMSI
• SMS-R Address
2. SRI4SM Response
• Fake IMSI
• SMS-R Address
SMS Home Routing against
malefactors
Case 1. Use the ACN for the illegitimate
component
TCAP Begin
Operation 1
Operation 2
ACN
Send me info….quack! quack!
Don’t understand. Repeat one more time.
Case 1. Use the ACN for the illegitimate
component
STP HLR
SS7 FW SMS Router
TCAP Begin
SendRoutingInfoForSM_REQ
StatusReport_REQ
Send the message to
the SS7 FW for
inspection
Inspect the first
component only
and pass the
message into the
network
Case 1. Use the ACN for the illegitimate
component
STP HLR
SS7 FW SMS Router
TCAP Begin
SendRoutingInfoForSM_REQ
StatusReport_REQ
TCAP Continue
Reject
Case 1. Use the ACN for the illegitimate
component
STP HLR
SS7 FW SMS Router
TCAP Begin
SendRoutingInfoForSM_REQ
StatusReport_REQ
TCAP Continue
SendRoutingInfoForSM_REQ
TCAP Continue
Reject
Case 1. Use the ACN for the illegitimate
component
STP HLR
SS7 FW SMS Router
TCAP Begin
SendRoutingInfoForSM_REQ
StatusReport_REQ
TCAP Continue
SendRoutingInfoForSM_REQ
TCAP Continue
Reject
TCAP End
SendRoutingInfoForSM_RES
Reject
Case 2. Remove the Dialogue Portion
No Dialogue Portion
between Transaction ID
and Component Portion
STP HLR
SS7 FW
TCAP Begin
SendRoutingInfo_REQ
UpdateLocation_REQ
Send the message to
the SS7 FW for
inspection
Inspect the first
component only
and pass the
message into the
network
Case 3. Use the ACN appropriate for both
components
Application Context Name Operation
NetworkLocUpContext UpdateLocation
RestoreData
SubscriberDataMngtContext InsertSubscriberData
DeleteSubscriberData
ShortMsgGatewayContext SendRoutingInfoForSM
ReportSM-DeliveryStatus
TCAP Begin
Operation 1
Operation 2
ACN
SMS delivery with no SMS Home Routing in place
RAN
HLR
Once a subscriber has been
registered and a profile is
delivered to a new VLR, an
HLR of the home network
may update the profile
MSC/VLR
UpdateLocation Request: IMSI, MSC, VLR
VLR updates the
profile in the DB
InsertSubscriberData: Profile
ReturnResultLast
UpdateLocation Response
InsertSubscriberData Request: IMSI, Profile parameters
InsertSubscriberData Response
TCAP End
. . .
Profile change scenario
SMS delivery with no SMS Home Routing in place
International / National
SS7 network
MSC/VLR
HLR
SMS-C
STP
Sending the InsertSubscriberData message using IMSI of a target
subscriber, the hacker is able to change the profile in the VLR. These
changes may influence on service availability or a call processing.
InsertSubscriberData: IMSI, Profile details
Input data: IMSI identity, VLR address as a destination node.
How to abuse
SMS delivery with no SMS Home Routing in place
RAN
HLR MSC/VLR
InsertSubscriberData Request: IMSI, Profile parameters
SCCP Calling GT: Subscriber home network
InsertSubscriberData Request: IMSI, Profile parameters
SCCP Calling GT: Hacker provider
The InsertSubscriberData message normally may come from external connections. This message must be addressed to
subscribers of the message originated network.
If the InsertSubscriberData message comes from external links and subscriber's origin does not correlate with
originating address it should be blocked. This is the Category 2 message regarding GSMA FASG classification.
How to protect: ISD
Case 3. Use the ACN appropriate for both
components
STP
SS7 FW
TCAP Begin
DeleteSubscriberData_REQ
InsertSubscriberData_REQ
MSC/VLR
Send the message to
the SS7 FW for
inspection
Inspect the first
component only
and pass the
message into the
network
STP
SS7 FW
TCAP Begin
DeleteSubscriberData_REQ
InsertSubscriberData_REQ
TCAP Continue
ReturnError
MSC/VLR
Case 3. Use the ACN appropriate for both
components
STP
SS7 FW
TCAP Begin
DeleteSubscriberData_REQ
InsertSubscriberData_REQ
TCAP Continue
ReturnError
TCAP Continue
InsertSubscriberData_REQ
InsertSubscriberData_REQ
MSC/VLR
Inspect the first
component only
and pass the
message into the
network
Case 3. Use the ACN appropriate for both
components
STP
SS7 FW
TCAP Begin
DeleteSubscriberData_REQ
InsertSubscriberData_REQ
TCAP Continue
ReturnError
TCAP Continue
InsertSubscriberData_REQ
InsertSubscriberData_REQ
TCAP Continue
ReturnResultLast
MSC/VLR
Case 3. Use the ACN appropriate for both
components
STP
SS7 FW
TCAP Begin
DeleteSubscriberData_REQ
InsertSubscriberData_REQ
TCAP Continue
ReturnError
TCAP Continue
InsertSubscriberData_REQ
InsertSubscriberData_REQ
TCAP Continue
ReturnResultLast
TCAP Continue
ReturnResultLast
MSC/VLR
Case 3. Use the ACN appropriate for both
components
STP
SS7 FW
TCAP Begin
DeleteSubscriberData_REQ
InsertSubscriberData_REQ
TCAP Continue
ReturnError
TCAP Continue
InsertSubscriberData_REQ
InsertSubscriberData_REQ
TCAP Continue
ReturnResultLast
TCAP Continue
ReturnResultLast
TCAP End
MSC/VLR
Case 3. Use the ACN appropriate for both
components
STP
SS7 FW
TCAP Begin
DeleteSubscriberData_REQ
InsertSubscriberData_REQ
TCAP Continue
ReturnError
TCAP Continue
InsertSubscriberData_REQ
InsertSubscriberData_REQ
TCAP Continue
ReturnResultLast
TCAP Continue
ReturnResultLast
TCAP End
MSC/VLR
Case 3. Use the ACN appropriate for both
components
STP
SS7 FW
TCAP Begin
DeleteSubscriberData_REQ
InsertSubscriberData_REQ
TCAP Continue
InsertSubscriberData_REQ
InsertSubscriberData_REQ
TCAP Continue
ReturnResultLast
TCAP End
MSC/VLR
TCAP Continue
ReturnResultLast
TCAP Continue
ReturnError
Case 3. Use the ACN appropriate for both
components
TCAP Begin
Operation 1
Operation 2
ACN
Send me info….quack! quack!
Don’t understand. Repeat one more time.
Case 4. Infinite loop
STP
SS7 FW
TCAP Begin
ProvideSubscriberInfo_REQ
InsertSubscriberData_REQ
MSC/VLR
If the SS7 FW
inspects all the
components it does
not find any
illegitimate data
Both MAP components
do not contradict FS.11
Case 4. Infinite loop
STP
SS7 FW
TCAP Begin
ProvideSubscriberInfo_REQ
InsertSubscriberData_REQ
MSC/VLR
TCAP Continue
Reject
ReturnError
Case 4. Infinite loop
STP
SS7 FW
TCAP Begin
ProvideSubscriberInfo_REQ
InsertSubscriberData_REQ
MSC/VLR
TCAP Continue
ProvideSubscriberInfo_REQ
TCAP Continue
Reject
ReturnError
Case 4. Infinite loop
STP
SS7 FW
TCAP Begin
ProvideSubscriberInfo_REQ
InsertSubscriberData_REQ
MSC/VLR
TCAP Continue
Reject
ReturnError
TCAP Continue
ProvideSubscriberInfo_REQ
TCAP Continue
Reject
Case 4. Infinite loop
STP
SS7 FW
TCAP Begin
ProvideSubscriberInfo_REQ
InsertSubscriberData_REQ
MSC/VLR
TCAP Continue
Reject
ReturnError
TCAP Continue
ProvideSubscriberInfo_REQ
TCAP Continue
Reject
TCAP Continue
ProvideSubscriberInfo_REQ
Case 4. Infinite loop
STP
SS7 FW
TCAP Begin
ProvideSubscriberInfo_REQ
InsertSubscriberData_REQ
MSC/VLR
TCAP Continue
Reject
ReturnError
TCAP Continue
ProvideSubscriberInfo_REQ
TCAP Continue
Reject
TCAP Continue
ProvideSubscriberInfo_REQ
TCAP Continue
Reject
Case 4. Infinite loop
SS7 FW
TCAP Begin
ProvideSubscriberInfo_REQ
InsertSubscriberData_REQ
TCAP Continue
Reject
ReturnError
TCAP Continue
ProvideSubscriberInfo_REQ
TCAP Continue
Reject
TCAP Continue
ProvideSubscriberInfo_REQ
TCAP Continue
Reject
TCAP Continue
ProvideSubscriberInfo_REQ
TCAP Continue
Reject
TCAP Continue
ProvideSubscriberInfo_REQ
TCAP Continue
Reject
TCAP Continue
ProvideSubscriberInfo_REQ
TCAP Continue
Reject
MSC/VLR
STP
In a testbed, this transaction kept working for
about 60 hours — from Friday evening until
Monday morning.
Threats
• Signaling channels load
• Processor load
• May affect a signaling monitoring system
Case 4. Infinite loop
Operation Code Tag abuse
Bonus vulnerability
= 2
= 6
ITU-T Q.773 – Transaction capabilities formats and encoding
ITU-T Q.773 Recommendation
STP/FW HLR
MSC/VLR
SMS Router
The STP/FW is looking for
a Local OpCode. Global
OpCodes are ignored.
Operation Code Tag abuse
STP/FW HLR
MSC/VLR
SMS Router
The destination network
element replies with the
Local OpCode and
requested data.
The STP/FW is looking for
a Local OpCode. Global
OpCodes are ignored.
Operation Code Tag abuse
SMS Router
STP/FW HLR
MSC/VLR
Equipment of four vendors reply to signaling
messages with the Global OpCode.
The destination network
element replies with the
Local OpCode and
requested data.
The STP/FW is looking for
a Local OpCode. Global
OpCodes are ignored.
Operation Code Tag abuse
1. Check if your security tools are effective against new vulnerabilities.
2. Use an intrusion detection solution along with an SS7 firewall in order to detect
threats promptly and block a hostile source.
3. Block TCAP Begin messages with multiple MAP components.
We observed only one legal pair:
BeginSubscriberActivity + ProcessUnstructuredSS-Data.
4. Configure the STP and SS7 firewall carefully. Do not forget about Global
OpCodes.
5. All this information goes to FS.11 within the current CR.
Conclusion
Thank you!
Kirill Puzankov
kpuzankov@ptsecurity.com
SMS delivery with no SMS Home Routing in place

More Related Content

Similar to D1T2 - Bypassing GSMA Recommendations on SS7 Networks - Kirill Puzankov.pdf

fdocuments.net_gsm-call-flows-5584455b2833e.ppt
fdocuments.net_gsm-call-flows-5584455b2833e.pptfdocuments.net_gsm-call-flows-5584455b2833e.ppt
fdocuments.net_gsm-call-flows-5584455b2833e.ppt
HazemElabed2
 
GSM security solution by FINETUNE Technologies
GSM security solution by FINETUNE TechnologiesGSM security solution by FINETUNE Technologies
GSM security solution by FINETUNE Technologies
Engr.MEESHU SHARKER
 
Wireless intelligent networking
Wireless intelligent networkingWireless intelligent networking
Wireless intelligent networking
Manish Kumar
 
Image Encoding to Short Text Message
Image Encoding to Short Text MessageImage Encoding to Short Text Message
Image Encoding to Short Text Message
ijtsrd
 

Similar to D1T2 - Bypassing GSMA Recommendations on SS7 Networks - Kirill Puzankov.pdf (20)

Securing Wireless Cellular Systems
Securing Wireless Cellular SystemsSecuring Wireless Cellular Systems
Securing Wireless Cellular Systems
 
Mobile Messaging - Part 5 - Mms Arch And Transactions
Mobile Messaging  - Part 5 - Mms Arch And TransactionsMobile Messaging  - Part 5 - Mms Arch And Transactions
Mobile Messaging - Part 5 - Mms Arch And Transactions
 
Telecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasuresTelecom under attack: demo of fraud scenarios and countermeasures
Telecom under attack: demo of fraud scenarios and countermeasures
 
Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)Mobile Networks Overview (2G / 3G / 4G-LTE)
Mobile Networks Overview (2G / 3G / 4G-LTE)
 
IMS + VoLTE Overview
IMS + VoLTE OverviewIMS + VoLTE Overview
IMS + VoLTE Overview
 
Project
ProjectProject
Project
 
Gsm
GsmGsm
Gsm
 
GSM Network
GSM NetworkGSM Network
GSM Network
 
fdocuments.net_gsm-call-flows-5584455b2833e.ppt
fdocuments.net_gsm-call-flows-5584455b2833e.pptfdocuments.net_gsm-call-flows-5584455b2833e.ppt
fdocuments.net_gsm-call-flows-5584455b2833e.ppt
 
Modul 7 gprs operation
Modul 7    gprs operationModul 7    gprs operation
Modul 7 gprs operation
 
GSM security solution by FINETUNE Technologies
GSM security solution by FINETUNE TechnologiesGSM security solution by FINETUNE Technologies
GSM security solution by FINETUNE Technologies
 
InfiltrateCon 2016 - Why Nation-State Hack Telco Networks
InfiltrateCon 2016 - Why Nation-State Hack Telco NetworksInfiltrateCon 2016 - Why Nation-State Hack Telco Networks
InfiltrateCon 2016 - Why Nation-State Hack Telco Networks
 
Wireless intelligent networking
Wireless intelligent networkingWireless intelligent networking
Wireless intelligent networking
 
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
 
Gsm training
Gsm trainingGsm training
Gsm training
 
Gsm
GsmGsm
Gsm
 
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics
 
Chapter 7 - Wireless and Mobile Networks
Chapter 7 - Wireless and Mobile NetworksChapter 7 - Wireless and Mobile Networks
Chapter 7 - Wireless and Mobile Networks
 
M2M Day Two
M2M Day TwoM2M Day Two
M2M Day Two
 
Image Encoding to Short Text Message
Image Encoding to Short Text MessageImage Encoding to Short Text Message
Image Encoding to Short Text Message
 

More from AliAlwesabi

More from AliAlwesabi (18)

pdfslide.net_ims-enabling-services-wherever-the-customer-and-whatever-the-acc...
pdfslide.net_ims-enabling-services-wherever-the-customer-and-whatever-the-acc...pdfslide.net_ims-enabling-services-wherever-the-customer-and-whatever-the-acc...
pdfslide.net_ims-enabling-services-wherever-the-customer-and-whatever-the-acc...
 
pdfslide.net_ims-basics-standardization-ims-components-and-ip-multimedia-subs...
pdfslide.net_ims-basics-standardization-ims-components-and-ip-multimedia-subs...pdfslide.net_ims-basics-standardization-ims-components-and-ip-multimedia-subs...
pdfslide.net_ims-basics-standardization-ims-components-and-ip-multimedia-subs...
 
pdfslide.net_status-of-ims-based-next-generation-networks-for-fixed-of-ims-ba...
pdfslide.net_status-of-ims-based-next-generation-networks-for-fixed-of-ims-ba...pdfslide.net_status-of-ims-based-next-generation-networks-for-fixed-of-ims-ba...
pdfslide.net_status-of-ims-based-next-generation-networks-for-fixed-of-ims-ba...
 
pdfslide.net_architectural-overview-of-ip-multimedia-subsystem-3-3gpp-ims-arc...
pdfslide.net_architectural-overview-of-ip-multimedia-subsystem-3-3gpp-ims-arc...pdfslide.net_architectural-overview-of-ip-multimedia-subsystem-3-3gpp-ims-arc...
pdfslide.net_architectural-overview-of-ip-multimedia-subsystem-3-3gpp-ims-arc...
 
lte-design-and-deployment-strategies-zeljko-savic.pdf
lte-design-and-deployment-strategies-zeljko-savic.pdflte-design-and-deployment-strategies-zeljko-savic.pdf
lte-design-and-deployment-strategies-zeljko-savic.pdf
 
Securing the LTE Core the Road to NFV 2014.pdf
Securing the LTE Core the Road to NFV 2014.pdfSecuring the LTE Core the Road to NFV 2014.pdf
Securing the LTE Core the Road to NFV 2014.pdf
 
us-19-Stone-Securing-The-System-A-Deep-Dive-Into-Reversing-Android-Preinstall...
us-19-Stone-Securing-The-System-A-Deep-Dive-Into-Reversing-Android-Preinstall...us-19-Stone-Securing-The-System-A-Deep-Dive-Into-Reversing-Android-Preinstall...
us-19-Stone-Securing-The-System-A-Deep-Dive-Into-Reversing-Android-Preinstall...
 
eu-19-Yazdanmehr-Mobile-Network-Hacking-IP-Edition-2.pdf
eu-19-Yazdanmehr-Mobile-Network-Hacking-IP-Edition-2.pdfeu-19-Yazdanmehr-Mobile-Network-Hacking-IP-Edition-2.pdf
eu-19-Yazdanmehr-Mobile-Network-Hacking-IP-Edition-2.pdf
 
CCC-AdaptiveMobileSecurity_WhoWatchesTheWatchers_v7_FINAL.pdf
CCC-AdaptiveMobileSecurity_WhoWatchesTheWatchers_v7_FINAL.pdfCCC-AdaptiveMobileSecurity_WhoWatchesTheWatchers_v7_FINAL.pdf
CCC-AdaptiveMobileSecurity_WhoWatchesTheWatchers_v7_FINAL.pdf
 
D2T2 - Emmanuel Gadaix and Philippe Langlois - The SS7 Protocols.pdf
D2T2 - Emmanuel Gadaix and Philippe Langlois - The SS7 Protocols.pdfD2T2 - Emmanuel Gadaix and Philippe Langlois - The SS7 Protocols.pdf
D2T2 - Emmanuel Gadaix and Philippe Langlois - The SS7 Protocols.pdf
 
CISSP -Access Control Domain knowlege.pdf
CISSP -Access Control Domain knowlege.pdfCISSP -Access Control Domain knowlege.pdf
CISSP -Access Control Domain knowlege.pdf
 
VPN Guide to Network Defense and countermeasures
VPN Guide to Network Defense and countermeasuresVPN Guide to Network Defense and countermeasures
VPN Guide to Network Defense and countermeasures
 
zero trust - how to build zero trust.pdf
zero trust - how to build zero trust.pdfzero trust - how to build zero trust.pdf
zero trust - how to build zero trust.pdf
 
Foot printing as phase of Hacking in cybersecurity
Foot printing as phase of Hacking in cybersecurityFoot printing as phase of Hacking in cybersecurity
Foot printing as phase of Hacking in cybersecurity
 
Guide to Network Defense Router Security
Guide to Network Defense Router SecurityGuide to Network Defense Router Security
Guide to Network Defense Router Security
 
DNS Security Issues NES 554 for DNS Security
DNS Security Issues  NES 554 for DNS SecurityDNS Security Issues  NES 554 for DNS Security
DNS Security Issues NES 554 for DNS Security
 
Intrusion detection and prevention systems.pdf
Intrusion detection and prevention systems.pdfIntrusion detection and prevention systems.pdf
Intrusion detection and prevention systems.pdf
 
ISP Network Design workshops how to design networks
ISP Network Design workshops  how to design networksISP Network Design workshops  how to design networks
ISP Network Design workshops how to design networks
 

Recently uploaded

Recently uploaded (20)

Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 

D1T2 - Bypassing GSMA Recommendations on SS7 Networks - Kirill Puzankov.pdf

  • 2. Ongoing security research Signaling System 7 (SS7) security report 2014 Vulnerabilities of mobile Internet (GPRS) 2014 Primary security threats to SS7 cellular networks 2016 Next-generation networks, next- level cybersecurity problems (Diameter vulnerabilities) 2017 Threats to packet core security of 4G network 2017 SS7 Vulnerabilities and Attack Exposure Report 2018 Diameter Vulnerabilities Exposure Report 2018 Responsible disclosure – responsible attitude
  • 4. History of signaling security SS7 network developed. Trusted environment for fixed-line operators only. No security mechanisms in the protocol stack. SIGTRAN (SS7 over IP) introduced. Number of operators grows. Security is still missing. Huge number of MNOs, MVNOs, and VAS providers. SS7 widely used, Diameter added and spreading. Still not enough security! Growing number of SS7 interconnections, increasing amount of SS7 traffic. No security policies or restrictions. Innovations of TODAY rely on OBSOLETE technologies from YESTERDAY Although 4G networks use another signaling protocol (Diameter), they still need to interface with previous-generation mobile networks for converting incoming SS7 messages into equivalent Diameter ones. Trusted ecosystem 1980 No security 2000 Massive growth Not trusted anymore 2019 The state of signaling security has not changed for almost 40 years.
  • 5. Now what can a hacker do? Easily From anywhere Any mobile operator No special skills needed Steal your money Get access to your email and social media Track your location Intercept your data, calls and SMS messages Take control of your digital identity SS7 GTP Diameter Different Protocols Same Threats Perform massive denial of service attacks
  • 7. Our worldwide research statistic based on 70+ telecom security audits: ALL LTE networks are vulnerable to denial of service attacks 4,000+ attacks hit a mobile network operator per day 75% of mobile networks put subscribers at risk of geotracking 67% of networks fail to prevent bypass of SS7 protections 53% of call tapping attempts on 3G networks succeed 9 out of 10 of SMS messages can be intercepted
  • 8. Most dangerous layers in SS7 structure
  • 9. We found the vulnerability in the mid 2018. During the year, we tested it on different telecom equipment and security tools. TCAP Begin Operation 1 Operation 2 Positive Technologies: Double MAP CVD-2018-0015 (Dec 2018). https://infocentre2.gsma.com/gp/wg/FSG/CVD/CVD%20Repository1/CVD-2018-0015%20-%20UNDER%20REVIEW/CVD-2018-0015%20Submission%20Form_PT_Double_MAP.pdf Double MAP Vulnerability
  • 10. Double MAP vulnerability idea Hide an illegitimate MAP component after another one that looks legal is encapsulated in the same TCAP message. TCAP Begin Operation 1 Operation 2 There is one big problem — Application Context Name. ACN The Application Context Name is defined only once in a TCAP message. The Application Context Name value should accord with one particular OpCode. • The first component is implemented, the second one is ignored. • Terminating equipment rejects the TCAP message. Nuances exist
  • 11. TCAP structure TCAP Message Type—mandatory Transaction IDs—mandatory Dialogue Portion—optional Component Portion—optional TCAP—Transaction Capabilities Application Part
  • 12. SMS delivery with no SMS Home Routing in place Basic nodes and identifiers HLR — Home Location Register MSC/VLR — Mobile Switching Center and Visited Location Register SMS-C — SMS Centre MSISDN — Mobile Subscriber Integrated Services Digital Number IMSI — International Mobile Subscriber Identity STP — Signaling Transfer Point GT — Global Title, address of a core node element Basic nodes and IDs
  • 13. SMS delivery with no SMS Home Routing in place IMSI An IMSI identifier, by itself, is not valuable to an intruder But intruders can carry out many malicious actions against subscribers when they know the IMSI, such as:  Location tracking  Service disturbance  SMS interception  Voice call eavesdropping The IMSI is considered personal data as per GDPR. IMSI
  • 14. SMS delivery with no SMS Home Routing in place STP MSC 1. SRI4SM Request • MSISDN 1. SRI4SM Request • MSISDN 2. SRI4SM Response • IMSI • MSC Address 2. SRI4SM Response • IMSI • MSC Address 3. MT-SMS • IMSI • SMS Text 3. MT-SMS • IMSI • SMS Text SRI4SM — SendRoutingInfoForSM HLR SMS-C Simple SMS delivery
  • 15. SMS delivery with no SMS Home Routing in place SRI4SM abuse by a malefactor STP MSC 1. SRI4SM Request • MSISDN 1. SRI4SM Request • MSISDN 2. SRI4SM Response • IMSI • MSC Address 2. SRI4SM Response • IMSI • MSC Address HLR SRI4SM abuse by a malefactor
  • 16. SMS delivery with no SMS Home Routing in place SMS Router SMS Home Routing STP HLR MSC 1. SRI4SM Request • MSISDN 1. SRI4SM Request • MSISDN 3. MT-SMS • Fake IMSI • SMS Text 3. MT-SMS • Fake IMSI • SMS Text 4. SRI4SM Request • MSISDN 6. MT-SMS • Real IMSI • SMS Text SMS-C 5. SRI4SM Response • Real IMSI • MSC Address 2. SRI4SM Response • Fake IMSI • SMS-R Address 2. SRI4SM Response • Fake IMSI • SMS-R Address SMS Home Routing in place
  • 17. SMS delivery with no SMS Home Routing in place SMS Router SMS Home Routing against malefactors STP HLR MSC 1. SRI4SM Request • MSISDN 1. SRI4SM Request • MSISDN 2. SRI4SM Response • Fake IMSI • SMS-R Address 2. SRI4SM Response • Fake IMSI • SMS-R Address SMS Home Routing against malefactors
  • 18. Case 1. Use the ACN for the illegitimate component TCAP Begin Operation 1 Operation 2 ACN Send me info….quack! quack! Don’t understand. Repeat one more time.
  • 19. Case 1. Use the ACN for the illegitimate component STP HLR SS7 FW SMS Router TCAP Begin SendRoutingInfoForSM_REQ StatusReport_REQ Send the message to the SS7 FW for inspection Inspect the first component only and pass the message into the network
  • 20. Case 1. Use the ACN for the illegitimate component STP HLR SS7 FW SMS Router TCAP Begin SendRoutingInfoForSM_REQ StatusReport_REQ TCAP Continue Reject
  • 21. Case 1. Use the ACN for the illegitimate component STP HLR SS7 FW SMS Router TCAP Begin SendRoutingInfoForSM_REQ StatusReport_REQ TCAP Continue SendRoutingInfoForSM_REQ TCAP Continue Reject
  • 22. Case 1. Use the ACN for the illegitimate component STP HLR SS7 FW SMS Router TCAP Begin SendRoutingInfoForSM_REQ StatusReport_REQ TCAP Continue SendRoutingInfoForSM_REQ TCAP Continue Reject TCAP End SendRoutingInfoForSM_RES Reject
  • 23. Case 2. Remove the Dialogue Portion No Dialogue Portion between Transaction ID and Component Portion STP HLR SS7 FW TCAP Begin SendRoutingInfo_REQ UpdateLocation_REQ Send the message to the SS7 FW for inspection Inspect the first component only and pass the message into the network
  • 24. Case 3. Use the ACN appropriate for both components Application Context Name Operation NetworkLocUpContext UpdateLocation RestoreData SubscriberDataMngtContext InsertSubscriberData DeleteSubscriberData ShortMsgGatewayContext SendRoutingInfoForSM ReportSM-DeliveryStatus TCAP Begin Operation 1 Operation 2 ACN
  • 25. SMS delivery with no SMS Home Routing in place RAN HLR Once a subscriber has been registered and a profile is delivered to a new VLR, an HLR of the home network may update the profile MSC/VLR UpdateLocation Request: IMSI, MSC, VLR VLR updates the profile in the DB InsertSubscriberData: Profile ReturnResultLast UpdateLocation Response InsertSubscriberData Request: IMSI, Profile parameters InsertSubscriberData Response TCAP End . . . Profile change scenario
  • 26. SMS delivery with no SMS Home Routing in place International / National SS7 network MSC/VLR HLR SMS-C STP Sending the InsertSubscriberData message using IMSI of a target subscriber, the hacker is able to change the profile in the VLR. These changes may influence on service availability or a call processing. InsertSubscriberData: IMSI, Profile details Input data: IMSI identity, VLR address as a destination node. How to abuse
  • 27. SMS delivery with no SMS Home Routing in place RAN HLR MSC/VLR InsertSubscriberData Request: IMSI, Profile parameters SCCP Calling GT: Subscriber home network InsertSubscriberData Request: IMSI, Profile parameters SCCP Calling GT: Hacker provider The InsertSubscriberData message normally may come from external connections. This message must be addressed to subscribers of the message originated network. If the InsertSubscriberData message comes from external links and subscriber's origin does not correlate with originating address it should be blocked. This is the Category 2 message regarding GSMA FASG classification. How to protect: ISD
  • 28. Case 3. Use the ACN appropriate for both components STP SS7 FW TCAP Begin DeleteSubscriberData_REQ InsertSubscriberData_REQ MSC/VLR Send the message to the SS7 FW for inspection Inspect the first component only and pass the message into the network
  • 29. STP SS7 FW TCAP Begin DeleteSubscriberData_REQ InsertSubscriberData_REQ TCAP Continue ReturnError MSC/VLR Case 3. Use the ACN appropriate for both components
  • 30. STP SS7 FW TCAP Begin DeleteSubscriberData_REQ InsertSubscriberData_REQ TCAP Continue ReturnError TCAP Continue InsertSubscriberData_REQ InsertSubscriberData_REQ MSC/VLR Inspect the first component only and pass the message into the network Case 3. Use the ACN appropriate for both components
  • 31. STP SS7 FW TCAP Begin DeleteSubscriberData_REQ InsertSubscriberData_REQ TCAP Continue ReturnError TCAP Continue InsertSubscriberData_REQ InsertSubscriberData_REQ TCAP Continue ReturnResultLast MSC/VLR Case 3. Use the ACN appropriate for both components
  • 32. STP SS7 FW TCAP Begin DeleteSubscriberData_REQ InsertSubscriberData_REQ TCAP Continue ReturnError TCAP Continue InsertSubscriberData_REQ InsertSubscriberData_REQ TCAP Continue ReturnResultLast TCAP Continue ReturnResultLast MSC/VLR Case 3. Use the ACN appropriate for both components
  • 33. STP SS7 FW TCAP Begin DeleteSubscriberData_REQ InsertSubscriberData_REQ TCAP Continue ReturnError TCAP Continue InsertSubscriberData_REQ InsertSubscriberData_REQ TCAP Continue ReturnResultLast TCAP Continue ReturnResultLast TCAP End MSC/VLR Case 3. Use the ACN appropriate for both components
  • 34. STP SS7 FW TCAP Begin DeleteSubscriberData_REQ InsertSubscriberData_REQ TCAP Continue ReturnError TCAP Continue InsertSubscriberData_REQ InsertSubscriberData_REQ TCAP Continue ReturnResultLast TCAP Continue ReturnResultLast TCAP End MSC/VLR Case 3. Use the ACN appropriate for both components
  • 35. STP SS7 FW TCAP Begin DeleteSubscriberData_REQ InsertSubscriberData_REQ TCAP Continue InsertSubscriberData_REQ InsertSubscriberData_REQ TCAP Continue ReturnResultLast TCAP End MSC/VLR TCAP Continue ReturnResultLast TCAP Continue ReturnError Case 3. Use the ACN appropriate for both components
  • 36. TCAP Begin Operation 1 Operation 2 ACN Send me info….quack! quack! Don’t understand. Repeat one more time. Case 4. Infinite loop
  • 37. STP SS7 FW TCAP Begin ProvideSubscriberInfo_REQ InsertSubscriberData_REQ MSC/VLR If the SS7 FW inspects all the components it does not find any illegitimate data Both MAP components do not contradict FS.11 Case 4. Infinite loop
  • 39. STP SS7 FW TCAP Begin ProvideSubscriberInfo_REQ InsertSubscriberData_REQ MSC/VLR TCAP Continue ProvideSubscriberInfo_REQ TCAP Continue Reject ReturnError Case 4. Infinite loop
  • 40. STP SS7 FW TCAP Begin ProvideSubscriberInfo_REQ InsertSubscriberData_REQ MSC/VLR TCAP Continue Reject ReturnError TCAP Continue ProvideSubscriberInfo_REQ TCAP Continue Reject Case 4. Infinite loop
  • 41. STP SS7 FW TCAP Begin ProvideSubscriberInfo_REQ InsertSubscriberData_REQ MSC/VLR TCAP Continue Reject ReturnError TCAP Continue ProvideSubscriberInfo_REQ TCAP Continue Reject TCAP Continue ProvideSubscriberInfo_REQ Case 4. Infinite loop
  • 42. STP SS7 FW TCAP Begin ProvideSubscriberInfo_REQ InsertSubscriberData_REQ MSC/VLR TCAP Continue Reject ReturnError TCAP Continue ProvideSubscriberInfo_REQ TCAP Continue Reject TCAP Continue ProvideSubscriberInfo_REQ TCAP Continue Reject Case 4. Infinite loop
  • 43. SS7 FW TCAP Begin ProvideSubscriberInfo_REQ InsertSubscriberData_REQ TCAP Continue Reject ReturnError TCAP Continue ProvideSubscriberInfo_REQ TCAP Continue Reject TCAP Continue ProvideSubscriberInfo_REQ TCAP Continue Reject TCAP Continue ProvideSubscriberInfo_REQ TCAP Continue Reject TCAP Continue ProvideSubscriberInfo_REQ TCAP Continue Reject TCAP Continue ProvideSubscriberInfo_REQ TCAP Continue Reject MSC/VLR STP In a testbed, this transaction kept working for about 60 hours — from Friday evening until Monday morning. Threats • Signaling channels load • Processor load • May affect a signaling monitoring system Case 4. Infinite loop
  • 44. Operation Code Tag abuse Bonus vulnerability
  • 45. = 2 = 6 ITU-T Q.773 – Transaction capabilities formats and encoding ITU-T Q.773 Recommendation
  • 46. STP/FW HLR MSC/VLR SMS Router The STP/FW is looking for a Local OpCode. Global OpCodes are ignored. Operation Code Tag abuse
  • 47. STP/FW HLR MSC/VLR SMS Router The destination network element replies with the Local OpCode and requested data. The STP/FW is looking for a Local OpCode. Global OpCodes are ignored. Operation Code Tag abuse
  • 48. SMS Router STP/FW HLR MSC/VLR Equipment of four vendors reply to signaling messages with the Global OpCode. The destination network element replies with the Local OpCode and requested data. The STP/FW is looking for a Local OpCode. Global OpCodes are ignored. Operation Code Tag abuse
  • 49. 1. Check if your security tools are effective against new vulnerabilities. 2. Use an intrusion detection solution along with an SS7 firewall in order to detect threats promptly and block a hostile source. 3. Block TCAP Begin messages with multiple MAP components. We observed only one legal pair: BeginSubscriberActivity + ProcessUnstructuredSS-Data. 4. Configure the STP and SS7 firewall carefully. Do not forget about Global OpCodes. 5. All this information goes to FS.11 within the current CR. Conclusion
  • 51. SMS delivery with no SMS Home Routing in place