SlideShare a Scribd company logo
1 of 39
Transparent Botnet Command and
Control for Smartphones over Text
             Messages
         Georgia Weidman
Why Smartphone Botnets
• Ubiquitous smartphones

• Common development platforms

• Strong technical specs
Why Text Messages?
• Battery managements

• Difficult to monitor

• Fault Tolerant
How an SMS is sent and received




                                  4
How an SMS is sent and received




            © Georgia Weidman 2011   5
How an SMS is sent and received




            © Georgia Weidman 2011   6
How an SMS is sent and received




           © Georgia Weidman 2011   7
How an SMS is sent and received




           © Georgia Weidman 2011   8
How an SMS is sent and received




           © Georgia Weidman 2011   9
How an SMS is sent and received




           © Georgia Weidman 2011   10
How an SMS is sent and received




           © Georgia Weidman 2011   11
How an SMS is sent and received




           © Georgia Weidman 2011   12
How an SMS is sent and received




           © Georgia Weidman 2011   13
Previous Work: SMS Fuzzing



    At Blackhat 2009, Charlie Miller & Collin
    Mulliner proxied the application layer and
    modem to crash smartphones with SMS.

http://www.blackhat.com/presentations/bh-usa-09/MILLER/BHUSA09-Miller-
FuzzingPhone-PAPER.pdf

                              © Georgia Weidman 2011                     14
Previous Work: SMS Fuzzing




         © Georgia Weidman 2011   15
Previous Work: SMS Fuzzing




         © Georgia Weidman 2011   16
Previous Work: SMS Fuzzing




         © Georgia Weidman 2011   17
My Work: SMS Botnet C&C




        © Georgia Weidman 2011   18
My Work: SMS Botnet C&C




        © Georgia Weidman 2011   19
SMS-Deliver PDU
07914140540510F1040B916117345476F100000121037140044A0A
E8329BFD4697D9EC37
                       Field                                   Value
                  Length of SMSC                 07
      Type of Address (SMSC)                     91
      Service Center Address (SMSC)              41 40 54 05 10 F1
      SMS Deliver Info                           04
      Length of Sender Number                    0B
      Type of Sender Number                      91
      Sender Number                              51 17 34 45 88 F1
      Protocol Identifier                        00
      Data Coding Scheme                         00
      Time Stamp                                 01 21 03 71 40 04 4A
      User Data Length                           0A
      User Data                                  E8 32 9B FD 46 97 D9 EC 37
                                   © Georgia Weidman 2011                     20
                            http://www.dreamfabric.com/s
SMS-Deliver PDU
07914140540510F1040B916117345476F100000121037140044A0A
E8329BFD4697D9EC37
                       Field                                 Value
      Length of SMSC                           07
      Type of Address (SMSC)                   91
      Service Center Address (SMSC)            41 40 54 05 10 F1
      SMS Deliver Info                         04
      Length of Sender Number                  0B
      Type of Sender Number                    91
      Sender Number                            61 17 34 54 76 F1
      Protocol Identifier                      00
      Data Coding Scheme                       00
      Time Stamp                               01 21 03 71 40 04 4A
      User Data Length                         0A
      User Data                                E8 32 9B FD 46 97 D9 EC 37
                                © Georgia Weidman 2011                      21
How the Botnet Works
1. Bot Receives Message

2. Bot Decodes User Data

3. Bot Checks for Bot Key

4. Bot Performs Payload Functionality
How the Botnet Works
1. Bot Receives Message

2. Bot Decodes User Data

3. Bot Checks for Bot Key

4. Bot Performs Payload Functionality
How the Botnet Works
1. Bot Receives Message

2. Bot Decodes User Data

3. Bot Checks for Bot Key

4. Bot Performs Payload Functionality
How the Botnet Works
1. Bot Receives Message

2. Bot Decodes User Data

3. Bot Checks for Bot Key

4. Bot Performs Payload Functionality
How the Botnet Works
1. Bot Receives Message

2. Bot Decodes User Data

3. Bot Checks for Bot Key

4. Bot Performs Payload Functionality
Botnet Structure




    © Georgia Weidman 2011   27
Master Bot




 © Georgia Weidman 2011   28
Sentinel Bots




  © Georgia Weidman 2011   29
Slave Bots




 © Georgia Weidman 2011   30
Security Concerns
• Impersonation

• Replay

• Cryptographic solutions
Limitations
• Possible detection methods

• User data length
Getting the Bot Installed
• Regular Users

• Rooted/Jailbroken Users

• Remote
Example Payloads
• Spam

• Denial of service

• Load new functionality

• Degrading cell service
What This Really Means


• If attackers can get the bot installed they can
  remotely control a user's phone without
  giving any sign of compromise to the user.
Mitigations
•Integrity checks

•Liability for smartphone applications

•User awareness
Demo



• Android Bot with Spam Payload
Contact
•Georgia Weidman
•Company: Neohapsis Inc.
•Email: Georgia@grmn00bs.com
       Georgia.weidman@neohapsis.com
•Website: http://www.grmn00bs.com
•Twitter: vincentkadmon
Selected Bibliography
•SMS fuzzing:
http://www.blackhat.com/presentations/bh-usa-
09/MILLER/BHUSA09-Miller-FuzzingPhone-PAPER.pdf
•Cell bots attack GSM core:
http://www.patrickmcdaniel.org/pubs/ccs09b.pdf
•Twilight botnet:
http://jon.oberheide.org/files/summercon10-androidhax-
jonoberheide.pdf
•SMS/P2P iPhone bots:
http://mulliner.org/collin/academic/publications/ibots_m
alware10_mulliner_seifert.pdf

More Related Content

Similar to Transparent Botnet C&C for Smartphones over SMS

GSM Optimization and Tems-3.pdf
 GSM Optimization and Tems-3.pdf GSM Optimization and Tems-3.pdf
GSM Optimization and Tems-3.pdfRakhiJadav1
 
Training on SMS App - Anjesh Tuladhar
Training on SMS App - Anjesh TuladharTraining on SMS App - Anjesh Tuladhar
Training on SMS App - Anjesh TuladharMobileNepal
 
Bhusa09 Miller Fuzzing Phone Paper
Bhusa09 Miller Fuzzing Phone PaperBhusa09 Miller Fuzzing Phone Paper
Bhusa09 Miller Fuzzing Phone PaperMousselmal Tarik
 
DefCamp 2013 - 0Class2DOS
DefCamp 2013 - 0Class2DOSDefCamp 2013 - 0Class2DOS
DefCamp 2013 - 0Class2DOSDefCamp
 
Transecq ITA
Transecq ITATransecq ITA
Transecq ITAtransecq
 
Overview of the OpenID Foundation's Mobile Profile of OpenID Connect MODRNA WG
Overview of the OpenID Foundation's Mobile Profile of OpenID Connect MODRNA WGOverview of the OpenID Foundation's Mobile Profile of OpenID Connect MODRNA WG
Overview of the OpenID Foundation's Mobile Profile of OpenID Connect MODRNA WGBjorn Hjelm
 
VoLTE Charging and Clearing Explained
VoLTE Charging and Clearing ExplainedVoLTE Charging and Clearing Explained
VoLTE Charging and Clearing ExplainedSyniverse
 
QUOTATION VNN INTERNET LEASEDLINE VNPT SERVICES
QUOTATION VNN INTERNET LEASEDLINE VNPT SERVICES QUOTATION VNN INTERNET LEASEDLINE VNPT SERVICES
QUOTATION VNN INTERNET LEASEDLINE VNPT SERVICES Tùng Hội Tụ Số
 
Industrial presentation(Summer Training) On GSM at BSNL
Industrial presentation(Summer Training) On GSM at BSNLIndustrial presentation(Summer Training) On GSM at BSNL
Industrial presentation(Summer Training) On GSM at BSNLAnshul Joshi
 
sms and calls_finaal.pptx
sms and calls_finaal.pptxsms and calls_finaal.pptx
sms and calls_finaal.pptxmalekkaka
 
Creating a smarter world with eSIM
Creating a smarter world with eSIMCreating a smarter world with eSIM
Creating a smarter world with eSIMJT IoT
 
What to Expect from a Mobile Banking Solution? (Whitepaper)
What to Expect from a Mobile Banking Solution? (Whitepaper)What to Expect from a Mobile Banking Solution? (Whitepaper)
What to Expect from a Mobile Banking Solution? (Whitepaper)Thinksoft Global
 
e-Sim Sharing (extract)
e-Sim Sharing (extract)e-Sim Sharing (extract)
e-Sim Sharing (extract)BearingPoint
 
VoLTE Service Monitoring - VoLTE Voice Call
VoLTE Service Monitoring - VoLTE Voice CallVoLTE Service Monitoring - VoLTE Voice Call
VoLTE Service Monitoring - VoLTE Voice CallJose Gonzalez
 

Similar to Transparent Botnet C&C for Smartphones over SMS (20)

GSM Optimization and Tems-3.pdf
 GSM Optimization and Tems-3.pdf GSM Optimization and Tems-3.pdf
GSM Optimization and Tems-3.pdf
 
NFC Basic Concepts
NFC Basic ConceptsNFC Basic Concepts
NFC Basic Concepts
 
Training on SMS App - Anjesh Tuladhar
Training on SMS App - Anjesh TuladharTraining on SMS App - Anjesh Tuladhar
Training on SMS App - Anjesh Tuladhar
 
Meid overview
Meid overviewMeid overview
Meid overview
 
Bhusa09 Miller Fuzzing Phone Paper
Bhusa09 Miller Fuzzing Phone PaperBhusa09 Miller Fuzzing Phone Paper
Bhusa09 Miller Fuzzing Phone Paper
 
Switching systems lecture7
Switching  systems lecture7Switching  systems lecture7
Switching systems lecture7
 
DefCamp 2013 - 0Class2DOS
DefCamp 2013 - 0Class2DOSDefCamp 2013 - 0Class2DOS
DefCamp 2013 - 0Class2DOS
 
Transecq ITA
Transecq ITATransecq ITA
Transecq ITA
 
Vo ip overview
Vo ip overviewVo ip overview
Vo ip overview
 
Overview of the OpenID Foundation's Mobile Profile of OpenID Connect MODRNA WG
Overview of the OpenID Foundation's Mobile Profile of OpenID Connect MODRNA WGOverview of the OpenID Foundation's Mobile Profile of OpenID Connect MODRNA WG
Overview of the OpenID Foundation's Mobile Profile of OpenID Connect MODRNA WG
 
VoLTE Charging and Clearing Explained
VoLTE Charging and Clearing ExplainedVoLTE Charging and Clearing Explained
VoLTE Charging and Clearing Explained
 
QUOTATION VNN INTERNET LEASEDLINE VNPT SERVICES
QUOTATION VNN INTERNET LEASEDLINE VNPT SERVICES QUOTATION VNN INTERNET LEASEDLINE VNPT SERVICES
QUOTATION VNN INTERNET LEASEDLINE VNPT SERVICES
 
Lte identifiers
Lte identifiersLte identifiers
Lte identifiers
 
Industrial presentation(Summer Training) On GSM at BSNL
Industrial presentation(Summer Training) On GSM at BSNLIndustrial presentation(Summer Training) On GSM at BSNL
Industrial presentation(Summer Training) On GSM at BSNL
 
sms and calls_finaal.pptx
sms and calls_finaal.pptxsms and calls_finaal.pptx
sms and calls_finaal.pptx
 
Creating a smarter world with eSIM
Creating a smarter world with eSIMCreating a smarter world with eSIM
Creating a smarter world with eSIM
 
What to Expect from a Mobile Banking Solution? (Whitepaper)
What to Expect from a Mobile Banking Solution? (Whitepaper)What to Expect from a Mobile Banking Solution? (Whitepaper)
What to Expect from a Mobile Banking Solution? (Whitepaper)
 
e-Sim Sharing (extract)
e-Sim Sharing (extract)e-Sim Sharing (extract)
e-Sim Sharing (extract)
 
Introduction To SIP
Introduction  To  SIPIntroduction  To  SIP
Introduction To SIP
 
VoLTE Service Monitoring - VoLTE Voice Call
VoLTE Service Monitoring - VoLTE Voice CallVoLTE Service Monitoring - VoLTE Voice Call
VoLTE Service Monitoring - VoLTE Voice Call
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

Transparent Botnet C&C for Smartphones over SMS

Editor's Notes

  1. Nearly 62 million smartphones sold in Q2 2010Development is similar to standard platformsAndroid = LinuxiPhone = OSXWindows Mobile = WindowsTechnical specs not as good as top of the linedesktops. They are capable and improving rapidly.
  2. Battery Management: IP runs down batteryquicklyFault Tolerant: If SMS fails it will queue and retryDifficult for security researchers to monitor
  3. Bot receives all communication from modemIf SMS (code CMT) continue analysisIf not SMS pass up to user space
  4. Moves through PDU to User DataDecode 7 bit GSM to plaintext
  5. Bot checks for secret key in messageIf bot message continue analysis and swallowsmessage (user never sees it)If not bot message passed to user space
  6. Bot reads functionality request in messageIf found perform functionalityIf not found fail silently
  7. Impersonation:Use cryptographic keys to authenticatemaster bot and sentinel botsReplay:SMS timestampsSequence numbers/ one time keysElliptic Curve Algorithm
  8. Possibility of detection from phone billsUser Data is limited to 160 characters(instructions and keys must fit in this space)On some platforms only the modem knows thephone number
  9. Regular Users:App + Local Root Exploit (Sendpage etc.)Example: John Oberheide's TwilightAndroid BotnetDefconSkytalks 2010Root-level/Jailbroken Users:Root level app using proxy function forAWESOME + BotExample: flashlight + tether for iPhoneRemote: Remote root exploit (rooted and nonrooted)Example: iKee-B “Duh” Worm for iPhone
  10. SpamCreating SMS-Send PDUs and passing them to themodemExample: SMS adsDDOSMillions of smartphones vs. a serverLoading New FunctionalitySend URL in payloadDownload the module into known payloadsDegrading GSM serviceOverloading the network with bogus requests