SlideShare a Scribd company logo
1 of 37
Download to read offline
User location tracking attacks for LTE networks using
the Interworking Functionality
Silke Holtmanns2 Siddharth Rao1 Ian Oliver2
1Aalto University, Finland 2Bell Labs - Nokia Networks, Finland
IFIP Networking 2016
17th-19th May 2016
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 1 / 37
Overview
1 SS7 based attacks
SS7 background
SS7 attacks recap
2 LTE/ Diameter based attacks
Motivation
Interworking Functions (IWF)
LTE IMSI disclosure attack
Location disclosure
3 Countermeasures
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 2 / 37
Part 1: SS7 attacks
SS7 background
and
Location tracking attacks
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 3 / 37
Signalling System no. 7 (SS7)
A 4 decade old protocol mainly used in the era of 2G/GSM and
before.
However, 2G is still the most widely used mobile generation.
Built for trusted partner network and use/access to outsiders were
denied.
However now, almost anyone can use the telco backbone (having
money, hacking skills or strong political power).
Protocol foundation to enable roaming.
Short Message and Supplementary services.
Toll free numbers and tele-voting.
Enhanced Message Service (EMS) and Local Number Portability
(LNP).
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 4 / 37
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 5 / 37
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 6 / 37
SS7 Location based attacks
Locating Mobile Phones: First revealed in .2008 by Tobias Engel.
An attacker can locate the victim by just having phone number and
SS7 access.
Exploiting the loopholes of an outdated system i.e Signalling System
protocol.
Lack of cryptographic protection.
Since then, different types of SS7 attacks have been demonstrated by
several security researchers.
Locate-Track-Manipulate: In 2014, Engel presented more concrete
attack which can continuously track besides locating the victim more
accurately than the previous attack.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 7 / 37
Cellular identifiers
MSISDN - Mobile Station International Subscriber Directory
Number, the phone number.
IMSI - International Mobile Subscriber Identity, uniquely identifies a
SIM.
GT - Global Title, uniquely* identify the network elements.
Host name or Global IP address : GT :: Internet : Telecom
IMEI - International Mobile Equipment Identity, uniquely identifies
the cellphone.
Cell ID - uniquely identifies a base station within a location area.
Cell ID + LAC → uniquely identifies a base station within a network.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 8 / 37
Network elements
HLR - Home Location Register, a central database of cellphone
subscribers.
MSC/VLR - Mobile Switching Centre/Visitor Location Register,
keeps track of location and other details of the users in its region.
SMSC - Short Message Service Centre (SMSC, handles SMS service
by storing and forwarding the messages.
gsmSCF - GSM Service control Function, responsible for handling
the subscriber billing.
GMLC - responsible for emergency and commercial location-based
services. Mainly used in the emergency calls (911) location scenarios.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 9 / 37
GSM network architecture
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 10 / 37
Attack using call set up messages
Figure : Location disclosure attack using call set up messages [2]
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 11 / 37
Attack using SMS protocol messages
Figure : Location disclosure attack using SMS protocol messages [2]
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 12 / 37
Accuracy of the tracked location
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 13 / 37
Attack using billing platform related messages (1)
Figure : Location disclosure attack using billing platform related messages [3]
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 14 / 37
Attack using billing platform related messages (2)
Figure : Location disclosure attack using billing platform related messages [3]
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 15 / 37
Attack using emergency service related messages
Figure : Location disclosure attack using emergency service related messages [3]
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 16 / 37
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 17 / 37
Part 2: LTE/Diameter attacks
LTE
and
Diameter attacks
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 18 / 37
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 19 / 37
Motivation
Most MNO upgrade their network gradually to avoid service
interruption and optimize ROI of infrastructure.
Inhomogeneous set-up =⇒ interesting attack vectors.
For interoperability with partners, edge nodes have the ability to
translate between Diameter ⇐⇒ SS7.
Attack translation
We wanted an easy way to port SS7 attacks to Diameter.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 20 / 37
Ideal Diameter Network
Figure : Diameter roaming architecture between two newer networks.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 21 / 37
Inhomogeneous Network
Figure : Different networks with different protocol support.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 22 / 37
Interworking functions
Technical specification TS 29.305 [4] and non-binding report TR
29.805 [5].
Describes how Diameter and SS7-MAP messages should be translated
to each other i.e. Attribute Value Pairs (AVP) mapping.
General idea:
Attacker pretends to be an old type network or node.
It forces IPSec secured LTE Diameter network or nodes into using the
less secured SS7-MAP.
Craft SS7-like attack messages and IWF will take care of the rest.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 23 / 37
Phase 1: Obtaining IMSI (1)
Attacker claims to be an IWF node
Typical multi-domain support scenario for roaming and routing
incoming SMS.
MAP commands have to be translated to Diameter specific commands
by the receiving IWF node.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 24 / 37
Phase 1: Obtaining IMSI(2)
The IWF copies IMSI of the victim from username AVP from SRA to SRI
SM ACK.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 25 / 37
Mapping of parameters from SRI SM to SRR
Attacker’s side
MSISDN of the victim
His own Calling Party Address (cgPA).
The spoofed Service Center Address(SCA).
SM-RP-PRI flag - allows the attacker to get information from the
HSS even if the victim is not being served in that network.
SM-Delivery-Not-Intended flag (optional).
Conversion into SRR
IWF maps the above SS7 MAP parameters into respective AVPs of
Diameter SRR.
Called Party Address (cdPA) AVP is populated before sending to HSS.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 26 / 37
Mapping of parameters from SRA to SRI SM ACK
locationInfoWithLMSI sub-parameter AVP:
networkNode-Number contains MME address.
IMSI of the victim.
IWF also sends MAP Information Service Center message to the
attacker to confirm the completion of the requested information
delivery. But this can be ignored.
Please note:
There exists several other methods of IMSI retrieval as well e.g. 4G IMSI
catchers, WLAN access point and EAP-AKA protocol. But they need the
attacker to be in the same vicinity of the target/victim.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 27 / 37
Phase 2: Location disclosure attack
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 28 / 37
Mapping of ISD to IDR
Attacker’s side
Attacker poses as an IWF across the interconnection and sends ISD
message to the targeted network’s IWF. He uses the previously
retrieved IMSI and serving node (MME) information.
Requested Information parameter includes:
sub-parameters Active Location Retrieval requested and Location
Information in EPS supported.
Allows the attacker to get fine-grained information about the victim
e.g. subscriber state, IMEI, software version.
Conversion into IDR
Target IWF sets the IDR-flag value to 3 → indicates that the location
information is requested.
IDR message is then directed to MME.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 29 / 37
Mapping of IDA to ISD Ack
Depending on the information requested:
EPS Location Information AVP → contains Cell ID.
EPS User State AVP → victim’s state.
Attack using MAP Provide Subscriber Information (PSI) works in
similar fashion.
The IMEI number and Software version retrieved are hardware specific
information of the victim, which can be used for further targeted
attacks.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 30 / 37
LTE Location disclosure attacks summary
SS7 attack vector IWF Attack? Reason
MAP SRI No Very few operators connect
HSS directly to DEA or inter-
connection.
MAP SRI SM Yes Location upto granularity of
MME.
MAP ATI No IWF cannot directly map ATI
commands.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 31 / 37
LTE Location disclosure attacks summary (2)
MAP PSI Yes EPS Location Info i.e. cell
ID, subscriber state, IMEI,
software version and encryp-
tion keys.
Emergency calls (PSL) No IWF cannot directly map PSL
commands.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 32 / 37
Countermeasures
Effective SS7 filter/firewall to verify whether a message is:
Operator network internal or from the interconnection
Communicated within the global title range of the partner.
Sent to/from the MS of an outbound roaming subscriber.
Whitelist the partners and the protocols used by them.
Implement NDS/IP security over the Diameter Edge Agents.
AVP specific filtering.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 33 / 37
Conclusion
Even if LTE offers very good security on air interface, the Diameter is
as less secure as SS7 when it comes to location disclosure attacks.
LTE attacks =⇒ It is possible to port SS7 attacks to Diameter
network using Interworking functions.
IMSI disclosure; location tracking upto MME as well as cellID level;
IMEI and OS software version disclosure.
Countermeasures include adhering to security standards (NDS/IP)
and adopting efficient filtering mechanisms.
Review of Diameter protocol
“Privacy in LTE networks” to appear in The 9th EAI International
Conference on Mobile Multimedia Communications, (IW5GS 2016).
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 34 / 37
References I
S. P. Rao, S. Holtmanns, I. Oliver, and T. Aura. (To appear)
We know where you are! Utilising the telecoms core network for user tracking.1
The 8th International Conference on Cyber Conflict (CyCon 2016).
Tobias Engel (2008)
Locating mobile phones using signalling system 7
25th Chaos communication congress, 2008.
Tobias Engel (2014)
SS7: Locate. track. manipulate
31st Chaos communication congress, 2014.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 35 / 37
References II
TS 29.305
InterWorking Function (IWF) between MAP based and Diameter based interfaces
3rd Generation Partnership Project (3GPP)
TR 29.805
InterWorking Function (IWF) between MAP based and Diameter based interfaces,
3rd Generation Partnership Project (3GPP)
1
A survey article combining all SS7 location attacks
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 36 / 37
Thank you!
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 37 / 37

More Related Content

What's hot

Packet core network basics
Packet core network basicsPacket core network basics
Packet core network basicsMustafa Golam
 
Lte attach-messaging
Lte attach-messagingLte attach-messaging
Lte attach-messagingPraveen Kumar
 
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...Vikas Shokeen
 
Vsat basics - an ExploreGate tutorial
Vsat basics - an ExploreGate tutorialVsat basics - an ExploreGate tutorial
Vsat basics - an ExploreGate tutorialOrit Fredkof
 
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]APNIC
 
SS7: the bad neighbor you're stuck with during the 5G migration and far beyond
SS7: the bad neighbor you're stuck with during the 5G migration and far beyondSS7: the bad neighbor you're stuck with during the 5G migration and far beyond
SS7: the bad neighbor you're stuck with during the 5G migration and far beyondPositiveTechnologies
 
IMS ENUM and DNS Mechanism
IMS ENUM and DNS MechanismIMS ENUM and DNS Mechanism
IMS ENUM and DNS MechanismKent Loh
 
VoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack ExplainedVoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack ExplainedVikas Shokeen
 
Worldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN networkWorldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN networkP1Security
 
Call flow oma000003 gsm communication flow
Call flow oma000003 gsm communication flowCall flow oma000003 gsm communication flow
Call flow oma000003 gsm communication flowEricsson Saudi
 
Signaling security essentials. Ready, steady, 5G!
 Signaling security essentials. Ready, steady, 5G! Signaling security essentials. Ready, steady, 5G!
Signaling security essentials. Ready, steady, 5G!PositiveTechnologies
 
IMS Core Elements
IMS Core ElementsIMS Core Elements
IMS Core ElementsKent Loh
 
Ims call flow
Ims call flowIms call flow
Ims call flowMorg
 
Mobile signaling threats and vulnerabilities - real cases and statistics from...
Mobile signaling threats and vulnerabilities - real cases and statistics from...Mobile signaling threats and vulnerabilities - real cases and statistics from...
Mobile signaling threats and vulnerabilities - real cases and statistics from...DefCamp
 
VoLTE Interfaces , Protocols & IMS Stack
VoLTE Interfaces , Protocols & IMS StackVoLTE Interfaces , Protocols & IMS Stack
VoLTE Interfaces , Protocols & IMS StackVikas Shokeen
 

What's hot (20)

Packet core network basics
Packet core network basicsPacket core network basics
Packet core network basics
 
UMTS/LTE/EPC Call Flows for CSFB
UMTS/LTE/EPC Call Flows for CSFBUMTS/LTE/EPC Call Flows for CSFB
UMTS/LTE/EPC Call Flows for CSFB
 
Lte attach-messaging
Lte attach-messagingLte attach-messaging
Lte attach-messaging
 
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
volte call flow - SIP IMS Call Flow - MO and MT Call - Volte Mobile originati...
 
Vsat basics - an ExploreGate tutorial
Vsat basics - an ExploreGate tutorialVsat basics - an ExploreGate tutorial
Vsat basics - an ExploreGate tutorial
 
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
 
Introduction to Diameter Protocol - Part1
Introduction to Diameter Protocol - Part1Introduction to Diameter Protocol - Part1
Introduction to Diameter Protocol - Part1
 
SS7: the bad neighbor you're stuck with during the 5G migration and far beyond
SS7: the bad neighbor you're stuck with during the 5G migration and far beyondSS7: the bad neighbor you're stuck with during the 5G migration and far beyond
SS7: the bad neighbor you're stuck with during the 5G migration and far beyond
 
3GPP IMS
3GPP IMS3GPP IMS
3GPP IMS
 
IMS ENUM and DNS Mechanism
IMS ENUM and DNS MechanismIMS ENUM and DNS Mechanism
IMS ENUM and DNS Mechanism
 
SS7 & SIGTRAN
SS7 & SIGTRANSS7 & SIGTRAN
SS7 & SIGTRAN
 
VoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack ExplainedVoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack Explained
 
Worldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN networkWorldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN network
 
Call flow oma000003 gsm communication flow
Call flow oma000003 gsm communication flowCall flow oma000003 gsm communication flow
Call flow oma000003 gsm communication flow
 
Signaling security essentials. Ready, steady, 5G!
 Signaling security essentials. Ready, steady, 5G! Signaling security essentials. Ready, steady, 5G!
Signaling security essentials. Ready, steady, 5G!
 
Security In LTE Access Network
Security In LTE Access NetworkSecurity In LTE Access Network
Security In LTE Access Network
 
IMS Core Elements
IMS Core ElementsIMS Core Elements
IMS Core Elements
 
Ims call flow
Ims call flowIms call flow
Ims call flow
 
Mobile signaling threats and vulnerabilities - real cases and statistics from...
Mobile signaling threats and vulnerabilities - real cases and statistics from...Mobile signaling threats and vulnerabilities - real cases and statistics from...
Mobile signaling threats and vulnerabilities - real cases and statistics from...
 
VoLTE Interfaces , Protocols & IMS Stack
VoLTE Interfaces , Protocols & IMS StackVoLTE Interfaces , Protocols & IMS Stack
VoLTE Interfaces , Protocols & IMS Stack
 

Viewers also liked

Lte rrc-connection-setup-messaging
Lte rrc-connection-setup-messagingLte rrc-connection-setup-messaging
Lte rrc-connection-setup-messagingPrashant Sengar
 
AIRCOM LTE Webinar 1 - Network Architecture
AIRCOM LTE Webinar 1 - Network ArchitectureAIRCOM LTE Webinar 1 - Network Architecture
AIRCOM LTE Webinar 1 - Network ArchitectureAIRCOM International
 
20121129 lte basic procedures (2)
20121129 lte basic procedures (2)20121129 lte basic procedures (2)
20121129 lte basic procedures (2)Debasish Sahoo
 
LTE Redirection attacks: Zhang Shan
LTE Redirection attacks: Zhang ShanLTE Redirection attacks: Zhang Shan
LTE Redirection attacks: Zhang ShanDarren Pauli
 
LTE EPC Technology Essentials
LTE EPC Technology EssentialsLTE EPC Technology Essentials
LTE EPC Technology EssentialsHussien Mahmoud
 
TRACK C: PDN (Power Delivery Network)/ Ronen Stilkol
TRACK C: PDN (Power Delivery Network)/ Ronen StilkolTRACK C: PDN (Power Delivery Network)/ Ronen Stilkol
TRACK C: PDN (Power Delivery Network)/ Ronen Stilkolchiportal
 
LTE Architecture and LTE Attach
LTE Architecture and LTE AttachLTE Architecture and LTE Attach
LTE Architecture and LTE Attachaliirfan04
 
Quick attach summaryl
Quick attach summarylQuick attach summaryl
Quick attach summarylLarry Cragun
 
S1ap lte-attach-eps-bearer-setup
S1ap lte-attach-eps-bearer-setupS1ap lte-attach-eps-bearer-setup
S1ap lte-attach-eps-bearer-setupPrashant Sengar
 
Netmanias.2012.09.03 [en] emm_procedure_1._initial_attach_(part_1)
Netmanias.2012.09.03 [en] emm_procedure_1._initial_attach_(part_1)Netmanias.2012.09.03 [en] emm_procedure_1._initial_attach_(part_1)
Netmanias.2012.09.03 [en] emm_procedure_1._initial_attach_(part_1)son6971
 
ANSYS RedHawk-CPA: New Paradigm for Faster Chip-Package Convergence
ANSYS RedHawk-CPA: New Paradigm for Faster Chip-Package ConvergenceANSYS RedHawk-CPA: New Paradigm for Faster Chip-Package Convergence
ANSYS RedHawk-CPA: New Paradigm for Faster Chip-Package ConvergenceAnsys
 
Simplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach ProcedureSimplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach Procedure3G4G
 

Viewers also liked (20)

PDN Overview
PDN OverviewPDN Overview
PDN Overview
 
LTE Key Technologies
LTE Key TechnologiesLTE Key Technologies
LTE Key Technologies
 
Lte rrc-connection-setup-messaging
Lte rrc-connection-setup-messagingLte rrc-connection-setup-messaging
Lte rrc-connection-setup-messaging
 
3 gpp lte-rlc
3 gpp lte-rlc3 gpp lte-rlc
3 gpp lte-rlc
 
AIRCOM LTE Webinar 1 - Network Architecture
AIRCOM LTE Webinar 1 - Network ArchitectureAIRCOM LTE Webinar 1 - Network Architecture
AIRCOM LTE Webinar 1 - Network Architecture
 
20121129 lte basic procedures (2)
20121129 lte basic procedures (2)20121129 lte basic procedures (2)
20121129 lte basic procedures (2)
 
LTE Redirection attacks: Zhang Shan
LTE Redirection attacks: Zhang ShanLTE Redirection attacks: Zhang Shan
LTE Redirection attacks: Zhang Shan
 
LTE EPC Technology Essentials
LTE EPC Technology EssentialsLTE EPC Technology Essentials
LTE EPC Technology Essentials
 
TRACK C: PDN (Power Delivery Network)/ Ronen Stilkol
TRACK C: PDN (Power Delivery Network)/ Ronen StilkolTRACK C: PDN (Power Delivery Network)/ Ronen Stilkol
TRACK C: PDN (Power Delivery Network)/ Ronen Stilkol
 
LTE Architecture and LTE Attach
LTE Architecture and LTE AttachLTE Architecture and LTE Attach
LTE Architecture and LTE Attach
 
EPS presentation
EPS presentationEPS presentation
EPS presentation
 
LTE Procedures
LTE ProceduresLTE Procedures
LTE Procedures
 
Quick attach summaryl
Quick attach summarylQuick attach summaryl
Quick attach summaryl
 
S1ap lte-attach-eps-bearer-setup
S1ap lte-attach-eps-bearer-setupS1ap lte-attach-eps-bearer-setup
S1ap lte-attach-eps-bearer-setup
 
Netmanias.2012.09.03 [en] emm_procedure_1._initial_attach_(part_1)
Netmanias.2012.09.03 [en] emm_procedure_1._initial_attach_(part_1)Netmanias.2012.09.03 [en] emm_procedure_1._initial_attach_(part_1)
Netmanias.2012.09.03 [en] emm_procedure_1._initial_attach_(part_1)
 
ANSYS RedHawk-CPA: New Paradigm for Faster Chip-Package Convergence
ANSYS RedHawk-CPA: New Paradigm for Faster Chip-Package ConvergenceANSYS RedHawk-CPA: New Paradigm for Faster Chip-Package Convergence
ANSYS RedHawk-CPA: New Paradigm for Faster Chip-Package Convergence
 
c1 & c2 values
c1 & c2 values c1 & c2 values
c1 & c2 values
 
Simplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach ProcedureSimplified Call Flow Signaling: Registration - The Attach Procedure
Simplified Call Flow Signaling: Registration - The Attach Procedure
 
Anirudh resume 2_19
Anirudh resume 2_19Anirudh resume 2_19
Anirudh resume 2_19
 
LTE Air Interface
LTE Air InterfaceLTE Air Interface
LTE Air Interface
 

Similar to LTE Location Tracking Attacks Using Interworking Functions

Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...CSCJournals
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxronak56
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxdaniahendric
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxmakdul
 
Telecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoTTelecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoTPositiveTechnologies
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksIOSR Journals
 
Wireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxWireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxadolphoyonker
 
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKSPROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKSIJNSA Journal
 
Providing end to-end secure
Providing end to-end secureProviding end to-end secure
Providing end to-end secureIJNSA Journal
 
Telecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenesTelecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenesPositiveTechnologies
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin RodillasTI Safe
 
Exploring LTE security and protocol exploits with open source software and lo...
Exploring LTE security and protocol exploits with open source software and lo...Exploring LTE security and protocol exploits with open source software and lo...
Exploring LTE security and protocol exploits with open source software and lo...EC-Council
 
Ruckus wp wifi-into-core
Ruckus wp wifi-into-coreRuckus wp wifi-into-core
Ruckus wp wifi-into-corewarchitect
 
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner MaiaIpv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner MaiaWardner Maia
 
Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...IJECEIAES
 
Dmg tem2011-0718-05 madina--cto ns mobility pp
Dmg tem2011-0718-05 madina--cto ns mobility ppDmg tem2011-0718-05 madina--cto ns mobility pp
Dmg tem2011-0718-05 madina--cto ns mobility ppjakreile
 
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...EC-Council
 

Similar to LTE Location Tracking Attacks Using Interworking Functions (20)

Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
 
SS7 Vulnerabilities
SS7 VulnerabilitiesSS7 Vulnerabilities
SS7 Vulnerabilities
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
Telecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoTTelecom Security in the Era of 5G and IoT
Telecom Security in the Era of 5G and IoT
 
D017131318
D017131318D017131318
D017131318
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration Networks
 
Wireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxWireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docx
 
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKSPROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
 
Providing end to-end secure
Providing end to-end secureProviding end to-end secure
Providing end to-end secure
 
Telecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenesTelecom incidents investigation: daily work behind the scenes
Telecom incidents investigation: daily work behind the scenes
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas
 
Exploring LTE security and protocol exploits with open source software and lo...
Exploring LTE security and protocol exploits with open source software and lo...Exploring LTE security and protocol exploits with open source software and lo...
Exploring LTE security and protocol exploits with open source software and lo...
 
Ruckus wp wifi-into-core
Ruckus wp wifi-into-coreRuckus wp wifi-into-core
Ruckus wp wifi-into-core
 
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner MaiaIpv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
 
Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...
 
Dmg tem2011-0718-05 madina--cto ns mobility pp
Dmg tem2011-0718-05 madina--cto ns mobility ppDmg tem2011-0718-05 madina--cto ns mobility pp
Dmg tem2011-0718-05 madina--cto ns mobility pp
 
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
 
4G Mobile Interception (Edecision)
4G Mobile Interception (Edecision)4G Mobile Interception (Edecision)
4G Mobile Interception (Edecision)
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

LTE Location Tracking Attacks Using Interworking Functions

  • 1. User location tracking attacks for LTE networks using the Interworking Functionality Silke Holtmanns2 Siddharth Rao1 Ian Oliver2 1Aalto University, Finland 2Bell Labs - Nokia Networks, Finland IFIP Networking 2016 17th-19th May 2016 Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 1 / 37
  • 2. Overview 1 SS7 based attacks SS7 background SS7 attacks recap 2 LTE/ Diameter based attacks Motivation Interworking Functions (IWF) LTE IMSI disclosure attack Location disclosure 3 Countermeasures Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 2 / 37
  • 3. Part 1: SS7 attacks SS7 background and Location tracking attacks Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 3 / 37
  • 4. Signalling System no. 7 (SS7) A 4 decade old protocol mainly used in the era of 2G/GSM and before. However, 2G is still the most widely used mobile generation. Built for trusted partner network and use/access to outsiders were denied. However now, almost anyone can use the telco backbone (having money, hacking skills or strong political power). Protocol foundation to enable roaming. Short Message and Supplementary services. Toll free numbers and tele-voting. Enhanced Message Service (EMS) and Local Number Portability (LNP). Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 4 / 37
  • 5. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 5 / 37
  • 6. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 6 / 37
  • 7. SS7 Location based attacks Locating Mobile Phones: First revealed in .2008 by Tobias Engel. An attacker can locate the victim by just having phone number and SS7 access. Exploiting the loopholes of an outdated system i.e Signalling System protocol. Lack of cryptographic protection. Since then, different types of SS7 attacks have been demonstrated by several security researchers. Locate-Track-Manipulate: In 2014, Engel presented more concrete attack which can continuously track besides locating the victim more accurately than the previous attack. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 7 / 37
  • 8. Cellular identifiers MSISDN - Mobile Station International Subscriber Directory Number, the phone number. IMSI - International Mobile Subscriber Identity, uniquely identifies a SIM. GT - Global Title, uniquely* identify the network elements. Host name or Global IP address : GT :: Internet : Telecom IMEI - International Mobile Equipment Identity, uniquely identifies the cellphone. Cell ID - uniquely identifies a base station within a location area. Cell ID + LAC → uniquely identifies a base station within a network. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 8 / 37
  • 9. Network elements HLR - Home Location Register, a central database of cellphone subscribers. MSC/VLR - Mobile Switching Centre/Visitor Location Register, keeps track of location and other details of the users in its region. SMSC - Short Message Service Centre (SMSC, handles SMS service by storing and forwarding the messages. gsmSCF - GSM Service control Function, responsible for handling the subscriber billing. GMLC - responsible for emergency and commercial location-based services. Mainly used in the emergency calls (911) location scenarios. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 9 / 37
  • 10. GSM network architecture Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 10 / 37
  • 11. Attack using call set up messages Figure : Location disclosure attack using call set up messages [2] Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 11 / 37
  • 12. Attack using SMS protocol messages Figure : Location disclosure attack using SMS protocol messages [2] Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 12 / 37
  • 13. Accuracy of the tracked location Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 13 / 37
  • 14. Attack using billing platform related messages (1) Figure : Location disclosure attack using billing platform related messages [3] Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 14 / 37
  • 15. Attack using billing platform related messages (2) Figure : Location disclosure attack using billing platform related messages [3] Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 15 / 37
  • 16. Attack using emergency service related messages Figure : Location disclosure attack using emergency service related messages [3] Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 16 / 37
  • 17. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 17 / 37
  • 18. Part 2: LTE/Diameter attacks LTE and Diameter attacks Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 18 / 37
  • 19. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 19 / 37
  • 20. Motivation Most MNO upgrade their network gradually to avoid service interruption and optimize ROI of infrastructure. Inhomogeneous set-up =⇒ interesting attack vectors. For interoperability with partners, edge nodes have the ability to translate between Diameter ⇐⇒ SS7. Attack translation We wanted an easy way to port SS7 attacks to Diameter. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 20 / 37
  • 21. Ideal Diameter Network Figure : Diameter roaming architecture between two newer networks. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 21 / 37
  • 22. Inhomogeneous Network Figure : Different networks with different protocol support. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 22 / 37
  • 23. Interworking functions Technical specification TS 29.305 [4] and non-binding report TR 29.805 [5]. Describes how Diameter and SS7-MAP messages should be translated to each other i.e. Attribute Value Pairs (AVP) mapping. General idea: Attacker pretends to be an old type network or node. It forces IPSec secured LTE Diameter network or nodes into using the less secured SS7-MAP. Craft SS7-like attack messages and IWF will take care of the rest. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 23 / 37
  • 24. Phase 1: Obtaining IMSI (1) Attacker claims to be an IWF node Typical multi-domain support scenario for roaming and routing incoming SMS. MAP commands have to be translated to Diameter specific commands by the receiving IWF node. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 24 / 37
  • 25. Phase 1: Obtaining IMSI(2) The IWF copies IMSI of the victim from username AVP from SRA to SRI SM ACK. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 25 / 37
  • 26. Mapping of parameters from SRI SM to SRR Attacker’s side MSISDN of the victim His own Calling Party Address (cgPA). The spoofed Service Center Address(SCA). SM-RP-PRI flag - allows the attacker to get information from the HSS even if the victim is not being served in that network. SM-Delivery-Not-Intended flag (optional). Conversion into SRR IWF maps the above SS7 MAP parameters into respective AVPs of Diameter SRR. Called Party Address (cdPA) AVP is populated before sending to HSS. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 26 / 37
  • 27. Mapping of parameters from SRA to SRI SM ACK locationInfoWithLMSI sub-parameter AVP: networkNode-Number contains MME address. IMSI of the victim. IWF also sends MAP Information Service Center message to the attacker to confirm the completion of the requested information delivery. But this can be ignored. Please note: There exists several other methods of IMSI retrieval as well e.g. 4G IMSI catchers, WLAN access point and EAP-AKA protocol. But they need the attacker to be in the same vicinity of the target/victim. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 27 / 37
  • 28. Phase 2: Location disclosure attack Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 28 / 37
  • 29. Mapping of ISD to IDR Attacker’s side Attacker poses as an IWF across the interconnection and sends ISD message to the targeted network’s IWF. He uses the previously retrieved IMSI and serving node (MME) information. Requested Information parameter includes: sub-parameters Active Location Retrieval requested and Location Information in EPS supported. Allows the attacker to get fine-grained information about the victim e.g. subscriber state, IMEI, software version. Conversion into IDR Target IWF sets the IDR-flag value to 3 → indicates that the location information is requested. IDR message is then directed to MME. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 29 / 37
  • 30. Mapping of IDA to ISD Ack Depending on the information requested: EPS Location Information AVP → contains Cell ID. EPS User State AVP → victim’s state. Attack using MAP Provide Subscriber Information (PSI) works in similar fashion. The IMEI number and Software version retrieved are hardware specific information of the victim, which can be used for further targeted attacks. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 30 / 37
  • 31. LTE Location disclosure attacks summary SS7 attack vector IWF Attack? Reason MAP SRI No Very few operators connect HSS directly to DEA or inter- connection. MAP SRI SM Yes Location upto granularity of MME. MAP ATI No IWF cannot directly map ATI commands. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 31 / 37
  • 32. LTE Location disclosure attacks summary (2) MAP PSI Yes EPS Location Info i.e. cell ID, subscriber state, IMEI, software version and encryp- tion keys. Emergency calls (PSL) No IWF cannot directly map PSL commands. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 32 / 37
  • 33. Countermeasures Effective SS7 filter/firewall to verify whether a message is: Operator network internal or from the interconnection Communicated within the global title range of the partner. Sent to/from the MS of an outbound roaming subscriber. Whitelist the partners and the protocols used by them. Implement NDS/IP security over the Diameter Edge Agents. AVP specific filtering. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 33 / 37
  • 34. Conclusion Even if LTE offers very good security on air interface, the Diameter is as less secure as SS7 when it comes to location disclosure attacks. LTE attacks =⇒ It is possible to port SS7 attacks to Diameter network using Interworking functions. IMSI disclosure; location tracking upto MME as well as cellID level; IMEI and OS software version disclosure. Countermeasures include adhering to security standards (NDS/IP) and adopting efficient filtering mechanisms. Review of Diameter protocol “Privacy in LTE networks” to appear in The 9th EAI International Conference on Mobile Multimedia Communications, (IW5GS 2016). Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 34 / 37
  • 35. References I S. P. Rao, S. Holtmanns, I. Oliver, and T. Aura. (To appear) We know where you are! Utilising the telecoms core network for user tracking.1 The 8th International Conference on Cyber Conflict (CyCon 2016). Tobias Engel (2008) Locating mobile phones using signalling system 7 25th Chaos communication congress, 2008. Tobias Engel (2014) SS7: Locate. track. manipulate 31st Chaos communication congress, 2014. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 35 / 37
  • 36. References II TS 29.305 InterWorking Function (IWF) between MAP based and Diameter based interfaces 3rd Generation Partnership Project (3GPP) TR 29.805 InterWorking Function (IWF) between MAP based and Diameter based interfaces, 3rd Generation Partnership Project (3GPP) 1 A survey article combining all SS7 location attacks Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 36 / 37
  • 37. Thank you! Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 37 / 37