SlideShare a Scribd company logo
1 of 5
Download to read offline
The very nature of the Telecom industry, where critical infrastructure is used to store
and transmit sizeable sensitive data, makes it a soft target for cyberattacks.
Additionally, with the adoption of 5G and the rising integration of technologies,
interoperability and virtualisation security has become even more challenging and
complex for the MNOs.
We have seen how hackers have been taking advantage of this complex telco
landscape and executing advanced attacks recently. And marking the first
cyberattack of the year, 2022 came the news of Vodafone Portugal just a few days
back. As per initial industry reports, Vodafone Portugal was hit by a "deliberate and
malicious" cyberattack on Feb 7, 2022. The attack suspended 4G and 5G networks
for customers and digital TV and SMS services.
This brings to light how the telecommunications industry faces an increased threat
of DoS attacks, which was highlighted in a recent study by Cloudflare in the latter
half of 2021. With DoS becoming a preferred network attack technique, let's look at
how a bad actor can execute DoS attacks on the telecom network.
DOS (Denial-of-Service):
A Rising Concern For Telcos
secgen.com
DoS attacks on SS7 networks, which may affect 2G/3G
networks:
MSRN (Mobile Station Roaming Number) pool exhausting: During this attack, an
intruder needs to send many messages ‘ProvideRoamingNumber’ to allocate all
MSRN pool numbers. As soon as the intruder assigns all the MSRN numbers, no
incoming voice calls are available for the subscribers registered on the attacked
mobile switch. In this case, the network gets restored immediately once the
attacker stops sending ‘ProvideRoamingNumber’ messages.
Subscriber registration storm: The network denial-of-service attack can also be
executed via the MAP Reset signalling message. In such a scenario, the message
informs a visited subscriber databasem – VLR – node that a home subscriber
database – HLR – for one or a set of subscribers was restarted for some reason.
And all the subscribers from that HLR need to update their location information
initiating new registration procedures. If the intruder spoofs an HLR with many
subscribers, the simultaneous registrations of all of them can lead to a signalling
storm from the affected VLR to the affected HLR, overloading the equipment CPUs
and signalling channels on all involved interfaces. This resulting storm can impact
a significant network segment.
Illegitimate subsystem prohibition: Another type of SS7 attack is connected with
the routing protocol SCCP, more precisely with the node management
mechanism on the SCCP layer – SCCPMG. A network element can inform the
network environment that a particular subsystem has witnessed a failure. After
receiving such instruction, a network element should stop communicating with the
indicated subsystem until the system is fully restored. The SCCPMG protocol
messages should be working within the dedicated network segment only. However,
if the configuration errors allow the network to receive this kind of message routed
globally, the intruders can send fake information about network element failures.
Thus, prohibiting the network environment from communicating between essential
functions.
DoS attacks that could affect 4G and 5G:
Subscriber DoS via S6a CLR to random IMSI numbers: During this attack, the
malefactor sends S6a Cancel Location Requests to all target MNO's MME nodes.
Each request targets random IMSI in the operator's range to affect as many
different subscribers as possible. Once MME receives such a message, the
secgen.com
Network Equipment DoS via S6a CLR: This attack is similar to the previous one, but
each S6a CLRs contains flags to reconnect immediately instead. As a result, all
targeted subscribers will disconnect and reconnect again. This reconnection traffic
may cause a signalling storm which, in turn, may lead to Denial of Service for Evolved
Packet Core nodes (MME and HSS specifically).
Network Equipment DoS via S6a RSR: This attack also aims to create a signalling
storm. Here the idea is to send S6a Reset requests towards all operators’ MME. These
messages are targeted using IMSI prefixes instead of full IMSIs. S6a RSRs indicate that
HSS was restarted, and target subscribers may need to reconnect. As a result, it is
possible to target all MNO subscribers using only a handful of requests – one to each
MNO's MME. While, theoretically, all affected subscribers should reconnect, generating
much internal signalling, we are yet to see this effect in practice. Even though this
attack looks unfeasible, it is still reported in FS.19.
Removal or alteration subscriber information in HSS: A vendor-specific attack.
FS.19 mentions that some nodes parse all incoming Diameter requests without
checking for any constraints on which Diameter AVPs may be present in which
requests. As a result, it may be possible to create an S6a Update-Location Request
(S6a ULR) that includes additional S6a Insert Subscriber Data Request (S6a IDR) AVPs
or even AVPs from messages of other interfaces that HSS will parse. This may lead to
alteration of subscriber's data in the HSS. So, each malformed S6a ULR sent from the
external Network by malefactor using a random IMSI may lead to breaking one
subscriber configuration within the HSS. The attack continues while such S6a ULR are
coming towards the Network, as, even in case of proper backups of subscriber
database being restored, new subscribers continue to get affected.
Internal nodes start a Diameter DoS attack by sending a high volume of packets:
Here, the internal malefactor reconfigures the nodes to generate high volumes of
signalling traffic, e.g. by installing additional software. The result may be signalling
storm or DDoS of a single Evolved Packet Core entity, e.g. HSS.
subscriber's UE is disconnected from the 4G network. Usually, this also affects internet
connection; even in cases, 3G may still be available. The period during which services
remain suspended depends on the Network and UE in question. For example, some
phones may start reconnecting in a matter of seconds and thus, not get impacted
by the attacks, while the 4G modems may continue to be disconnected until a restart
or a relatively long time (ranging from 30 mins to an hour). Restarting UE usually helps
to reconnect the network and fix internet access.
secgen.com
Internal malefactor starting a Diameter DoS attack by sending a high volume
of malformed packets targeting Vendor-specific issues: During our
assessments, we often found that internal malefactor can discover a specific
malformed packet that can affect EPC node ability to handle incoming signalling.
For example, we were able to find a packet that, when sent repeatedly, led to the
restart of the MME node of a particular vendor. If the malefactor keeps sending
such packets, the node keeps rebooting, resulting in a network element DoS attack.
Attacks to the 5G Core elements using rogue Network Elements and abusing SBI
interface messages created to allow flexible and resilient networks.
Attacks to the Virtual Infrastructure, which is the norm for modern 4G and 5G
networks and, depending on the Security Posture and policies, may take much
time to recover.
Security practices to prevent DoS attacks
Monitor your environment, especially the assets that deliver customer service.
Segregate these assets from the remaining infrastructure, including the
authentication systems.
Virtualisation and dynamic networks make this task hard on any SOC; Mobile
Operators should ensure that security must follow the same approach while going
for a hyperscale approach and automation on Network.
Ensure MFA, logging and close automatic monitoring for any access to telecom
assets. It's crucial to avoid compromise through the same methods used against
companies worldwide.
Implement NG Firewall to block malicious messages coming from the IPX network.
Perform regular signalling security assessments to see if there are new ways to
bypass current protection measures.
secgen.com
UK | Italy | Czech Republic | Brazil | Mexico | India | South Korea | Japan | Malaysia |
Middle East
Email: contact@secgen.com
Website: www.secgen.com
Founded in 2022, SecurityGen is a global start-up focused on telecom security. We deliver
a solid security foundation for driving secure Telco digital transformations and ensuring
next-gen enterprise intelligent connectivity.Our extensive product and service portfolio
provides complete protection against existing and advanced telecom security threats.
About SecurityGen
Connect With Us
Apart from our comprehensive Telecom Security Assessments, we also provide
Next-Generation Firewalls and IDS for Signalling protocols SS7, Diameter and GTP.
Given the modern complex network systems, we recently launched our SecurityGen
Breach and Attack Simulation Platform. This innovative AI-enabled platform provides
network owners with an automated system that can continuously perform network
assessments and provide remediation guidance to address existing threats in the
network according to priority. Thus, ensuing proactive security coverage and
strengthening the security posture of network owners.

More Related Content

Similar to SecurityGen's Signalling Security: A Shield for Uninterrupted Connectivity

Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modification
iaemedu
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)
Mumbai Academisc
 
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...
eSAT Journals
 

Similar to SecurityGen's Signalling Security: A Shield for Uninterrupted Connectivity (20)

Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modification
 
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and VulnerabilitiesMeletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
 
Eaack—a secure intrusion detection system for manets ns2
Eaack—a secure intrusion detection system for manets ns2Eaack—a secure intrusion detection system for manets ns2
Eaack—a secure intrusion detection system for manets ns2
 
Eaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manetsEaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manets
 
SecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdf
SecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdfSecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdf
SecurityGen-VoLTE-article-What's-wrong-with-fast-VoLTE-deployments.pdf
 
Mastering GTP Protocols: Your Roadmap to Success
Mastering GTP Protocols: Your Roadmap to SuccessMastering GTP Protocols: Your Roadmap to Success
Mastering GTP Protocols: Your Roadmap to Success
 
Unraveling GTP: Threads of Efficient Communication
Unraveling GTP: Threads of Efficient CommunicationUnraveling GTP: Threads of Efficient Communication
Unraveling GTP: Threads of Efficient Communication
 
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLSECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING ML
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
 
N010617783
N010617783N010617783
N010617783
 
An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksAn overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networks
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)
 
Wp ci securing_layer2
Wp ci securing_layer2Wp ci securing_layer2
Wp ci securing_layer2
 
Build Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationBuild Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-Segmentation
 
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer ApproachScaling Mobile Network Security for LTE: A Multi-Layer Approach
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
 
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...
 
Improvement of quality of service parameters using
Improvement of quality of service parameters usingImprovement of quality of service parameters using
Improvement of quality of service parameters using
 
Unleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdfUnleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdf
 
Strengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenStrengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGen
 
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity VigilanceTelecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
 

More from SecurityGen1

More from SecurityGen1 (20)

Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGenUnderstanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
 
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity Solutions
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity SolutionsSecuring the Digital Frontier: SecurityGen's Telecom Cybersecurity Solutions
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity Solutions
 
Enhance Your Network Security with NGFW Firewall Solutions by SecurityGen
Enhance Your Network Security with NGFW Firewall Solutions by SecurityGenEnhance Your Network Security with NGFW Firewall Solutions by SecurityGen
Enhance Your Network Security with NGFW Firewall Solutions by SecurityGen
 
SecurityGen's IDS/IPS Solutions for Proactive Threat Management
SecurityGen's IDS/IPS Solutions for Proactive Threat ManagementSecurityGen's IDS/IPS Solutions for Proactive Threat Management
SecurityGen's IDS/IPS Solutions for Proactive Threat Management
 
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
 
Unleashing SecurityGen's Intelligent Intrusion Detection System.pdf
Unleashing SecurityGen's Intelligent Intrusion Detection System.pdfUnleashing SecurityGen's Intelligent Intrusion Detection System.pdf
Unleashing SecurityGen's Intelligent Intrusion Detection System.pdf
 
Unleashing the Power of Breach and Attack Simulation with SecurityGen
Unleashing the Power of Breach and Attack Simulation with SecurityGenUnleashing the Power of Breach and Attack Simulation with SecurityGen
Unleashing the Power of Breach and Attack Simulation with SecurityGen
 
SecurityGen's Pioneering Approach to 5G Security Services
SecurityGen's Pioneering Approach to 5G Security ServicesSecurityGen's Pioneering Approach to 5G Security Services
SecurityGen's Pioneering Approach to 5G Security Services
 
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern OperationsSecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
 
Secure Your Network with Confidence Understanding - GTP Protocols by Security...
Secure Your Network with Confidence Understanding - GTP Protocols by Security...Secure Your Network with Confidence Understanding - GTP Protocols by Security...
Secure Your Network with Confidence Understanding - GTP Protocols by Security...
 
Empowering Telecom Resilience - SecurityGen's GSMA SS7 Security Unveiled.pdf
Empowering Telecom Resilience - SecurityGen's GSMA SS7 Security Unveiled.pdfEmpowering Telecom Resilience - SecurityGen's GSMA SS7 Security Unveiled.pdf
Empowering Telecom Resilience - SecurityGen's GSMA SS7 Security Unveiled.pdf
 
Security Gen Ensures Robust Telecom Security with Comprehensive Assessments
Security Gen Ensures Robust Telecom Security with Comprehensive AssessmentsSecurity Gen Ensures Robust Telecom Security with Comprehensive Assessments
Security Gen Ensures Robust Telecom Security with Comprehensive Assessments
 
Elevate Safety with Security Gen: Unraveling the Power of Signaling Security
Elevate Safety with Security Gen: Unraveling the Power of Signaling SecurityElevate Safety with Security Gen: Unraveling the Power of Signaling Security
Elevate Safety with Security Gen: Unraveling the Power of Signaling Security
 
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdfSecurity Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
 
Proactive Signalling Network Security with SecurityGen
Proactive Signalling Network Security with SecurityGenProactive Signalling Network Security with SecurityGen
Proactive Signalling Network Security with SecurityGen
 
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
 
SecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdf
SecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdfSecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdf
SecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdf
 
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdfElevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
 
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and FirewallGuardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
 
Fortifying Telecom Networks: Exploring GSMA SS7 Security
Fortifying Telecom Networks: Exploring GSMA SS7 SecurityFortifying Telecom Networks: Exploring GSMA SS7 Security
Fortifying Telecom Networks: Exploring GSMA SS7 Security
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

SecurityGen's Signalling Security: A Shield for Uninterrupted Connectivity

  • 1. The very nature of the Telecom industry, where critical infrastructure is used to store and transmit sizeable sensitive data, makes it a soft target for cyberattacks. Additionally, with the adoption of 5G and the rising integration of technologies, interoperability and virtualisation security has become even more challenging and complex for the MNOs. We have seen how hackers have been taking advantage of this complex telco landscape and executing advanced attacks recently. And marking the first cyberattack of the year, 2022 came the news of Vodafone Portugal just a few days back. As per initial industry reports, Vodafone Portugal was hit by a "deliberate and malicious" cyberattack on Feb 7, 2022. The attack suspended 4G and 5G networks for customers and digital TV and SMS services. This brings to light how the telecommunications industry faces an increased threat of DoS attacks, which was highlighted in a recent study by Cloudflare in the latter half of 2021. With DoS becoming a preferred network attack technique, let's look at how a bad actor can execute DoS attacks on the telecom network. DOS (Denial-of-Service): A Rising Concern For Telcos
  • 2. secgen.com DoS attacks on SS7 networks, which may affect 2G/3G networks: MSRN (Mobile Station Roaming Number) pool exhausting: During this attack, an intruder needs to send many messages ‘ProvideRoamingNumber’ to allocate all MSRN pool numbers. As soon as the intruder assigns all the MSRN numbers, no incoming voice calls are available for the subscribers registered on the attacked mobile switch. In this case, the network gets restored immediately once the attacker stops sending ‘ProvideRoamingNumber’ messages. Subscriber registration storm: The network denial-of-service attack can also be executed via the MAP Reset signalling message. In such a scenario, the message informs a visited subscriber databasem – VLR – node that a home subscriber database – HLR – for one or a set of subscribers was restarted for some reason. And all the subscribers from that HLR need to update their location information initiating new registration procedures. If the intruder spoofs an HLR with many subscribers, the simultaneous registrations of all of them can lead to a signalling storm from the affected VLR to the affected HLR, overloading the equipment CPUs and signalling channels on all involved interfaces. This resulting storm can impact a significant network segment. Illegitimate subsystem prohibition: Another type of SS7 attack is connected with the routing protocol SCCP, more precisely with the node management mechanism on the SCCP layer – SCCPMG. A network element can inform the network environment that a particular subsystem has witnessed a failure. After receiving such instruction, a network element should stop communicating with the indicated subsystem until the system is fully restored. The SCCPMG protocol messages should be working within the dedicated network segment only. However, if the configuration errors allow the network to receive this kind of message routed globally, the intruders can send fake information about network element failures. Thus, prohibiting the network environment from communicating between essential functions. DoS attacks that could affect 4G and 5G: Subscriber DoS via S6a CLR to random IMSI numbers: During this attack, the malefactor sends S6a Cancel Location Requests to all target MNO's MME nodes. Each request targets random IMSI in the operator's range to affect as many different subscribers as possible. Once MME receives such a message, the
  • 3. secgen.com Network Equipment DoS via S6a CLR: This attack is similar to the previous one, but each S6a CLRs contains flags to reconnect immediately instead. As a result, all targeted subscribers will disconnect and reconnect again. This reconnection traffic may cause a signalling storm which, in turn, may lead to Denial of Service for Evolved Packet Core nodes (MME and HSS specifically). Network Equipment DoS via S6a RSR: This attack also aims to create a signalling storm. Here the idea is to send S6a Reset requests towards all operators’ MME. These messages are targeted using IMSI prefixes instead of full IMSIs. S6a RSRs indicate that HSS was restarted, and target subscribers may need to reconnect. As a result, it is possible to target all MNO subscribers using only a handful of requests – one to each MNO's MME. While, theoretically, all affected subscribers should reconnect, generating much internal signalling, we are yet to see this effect in practice. Even though this attack looks unfeasible, it is still reported in FS.19. Removal or alteration subscriber information in HSS: A vendor-specific attack. FS.19 mentions that some nodes parse all incoming Diameter requests without checking for any constraints on which Diameter AVPs may be present in which requests. As a result, it may be possible to create an S6a Update-Location Request (S6a ULR) that includes additional S6a Insert Subscriber Data Request (S6a IDR) AVPs or even AVPs from messages of other interfaces that HSS will parse. This may lead to alteration of subscriber's data in the HSS. So, each malformed S6a ULR sent from the external Network by malefactor using a random IMSI may lead to breaking one subscriber configuration within the HSS. The attack continues while such S6a ULR are coming towards the Network, as, even in case of proper backups of subscriber database being restored, new subscribers continue to get affected. Internal nodes start a Diameter DoS attack by sending a high volume of packets: Here, the internal malefactor reconfigures the nodes to generate high volumes of signalling traffic, e.g. by installing additional software. The result may be signalling storm or DDoS of a single Evolved Packet Core entity, e.g. HSS. subscriber's UE is disconnected from the 4G network. Usually, this also affects internet connection; even in cases, 3G may still be available. The period during which services remain suspended depends on the Network and UE in question. For example, some phones may start reconnecting in a matter of seconds and thus, not get impacted by the attacks, while the 4G modems may continue to be disconnected until a restart or a relatively long time (ranging from 30 mins to an hour). Restarting UE usually helps to reconnect the network and fix internet access.
  • 4. secgen.com Internal malefactor starting a Diameter DoS attack by sending a high volume of malformed packets targeting Vendor-specific issues: During our assessments, we often found that internal malefactor can discover a specific malformed packet that can affect EPC node ability to handle incoming signalling. For example, we were able to find a packet that, when sent repeatedly, led to the restart of the MME node of a particular vendor. If the malefactor keeps sending such packets, the node keeps rebooting, resulting in a network element DoS attack. Attacks to the 5G Core elements using rogue Network Elements and abusing SBI interface messages created to allow flexible and resilient networks. Attacks to the Virtual Infrastructure, which is the norm for modern 4G and 5G networks and, depending on the Security Posture and policies, may take much time to recover. Security practices to prevent DoS attacks Monitor your environment, especially the assets that deliver customer service. Segregate these assets from the remaining infrastructure, including the authentication systems. Virtualisation and dynamic networks make this task hard on any SOC; Mobile Operators should ensure that security must follow the same approach while going for a hyperscale approach and automation on Network. Ensure MFA, logging and close automatic monitoring for any access to telecom assets. It's crucial to avoid compromise through the same methods used against companies worldwide. Implement NG Firewall to block malicious messages coming from the IPX network. Perform regular signalling security assessments to see if there are new ways to bypass current protection measures.
  • 5. secgen.com UK | Italy | Czech Republic | Brazil | Mexico | India | South Korea | Japan | Malaysia | Middle East Email: contact@secgen.com Website: www.secgen.com Founded in 2022, SecurityGen is a global start-up focused on telecom security. We deliver a solid security foundation for driving secure Telco digital transformations and ensuring next-gen enterprise intelligent connectivity.Our extensive product and service portfolio provides complete protection against existing and advanced telecom security threats. About SecurityGen Connect With Us Apart from our comprehensive Telecom Security Assessments, we also provide Next-Generation Firewalls and IDS for Signalling protocols SS7, Diameter and GTP. Given the modern complex network systems, we recently launched our SecurityGen Breach and Attack Simulation Platform. This innovative AI-enabled platform provides network owners with an automated system that can continuously perform network assessments and provide remediation guidance to address existing threats in the network according to priority. Thus, ensuing proactive security coverage and strengthening the security posture of network owners.