Simjacker:
how to protect your network from
the latest hot vulnerability
Sergey Puzankov
Lead Security Researcher |
Ongoing
security research
Responsible disclosure – responsible attitude
2014
Signaling System 7 (SS7)
security report
2014
Vulnerabilities of mobile
Internet (GPRS)
2016
Primary security threats
to SS7 cellular networks
2017
Threats to packet core
security of 4G network
2017
Next-generation networks,
next-level cybersecurity problems
(Diameter vulnerabilities)
2018
SS7 Vulnerabilities and
Attack Exposure Report
2018
Diameter Vulnerabilities
Exposure Report
2019 5G security issues
Simjacker publications
V
V
V
History
of the technology
VSIM Application Toolkit (STK)
implements an SMS-based menu
STK menus customized by MNOs
SIM card providers try to unify
their solutions: S@T Browser
is just one of the unifications
Typical STK operations:
 Send location data
 Send an SMS to a particular number
 Make a call
 Initiate a packet data session
 Send internal IDs
 Beep loudspeaker
History of
the vulnerability
https://www.theregister.co.uk/2013/09/23/white_hat_sim_hacker_disillusioned_and_dismayed_by_operator_response/
https://securityaffairs.co/wordpress/31663/hacking/hacking-4g-usb-modems.html
V
2013
V
2014
V
2019
Short message service
SMS-CMSC MSC
SS7
STK platformSMS router SMS-CSTP
VAS
providers
Simjacker malefactor
SMS-CMSC MSC
SS7
STK platformSMS router SMS-CSTP
VAS
providers
Mitigation
SMS-CMSC MSC
SS7
STK platformSMS router SMS-CSTP
VAS
providers
Prohibit P2P STK SMS
messages
Prohibit STK SMS
messages from
unauthorized platforms
SMS-C
Prohibit STK SMS
messages from
external connections
to home subscribers
SMS router
Mitigation
VMT SMS message with SIM STK command VMO SMS message with SIM STK command
Advanced hacker
SMS-CMSC MSC
SS7
STK platformSMS router SMS-CSTP
VAS
providers
Assess your network
SMS-CMSC MSC
SS7
STK platformSMS router SMS-CSTP
VAS
providers
?
?
Assessment statistics
2017 2018 2019
Protect
SMS-CMSC MSC
SS7
STK platformSMS router SMS-CSTP
VAS
providers
Add monitoring
SMS-CMSC MSC
SS7
STK platformSMS router SMS-CSTP
VAS
providers
TAD
TAD
Assess
Monitor
Protect
Auditing provides the essential
visibility to fully understand your
ever changing network risks.
Continual real time monitoring
is essential to measure network
security efficiency and provide
rapid detection and mitigation.
Completely secure
your network by
addressing both
generic vulnerabilities
(GSMA) and the
threats that actually
effect you as an
ongoing process.
Delivering
Signalling
Security
With Positive
Technologies
Scheme of the demo
MSC
SS7
STK platformSMS router SMS-CSTP
Thank
you

Simjacker: how to protect your network from the latest hot vulnerability