PRIMARY SECURITY THREATS FOR SS7 CELLULAR NETWORKS
|
|
|
- Kory Lynch
- 9 years ago
- Views:
Transcription
1 PRIMARY SECURITY THREATS FOR SS7 CELLULAR NETWORKS
2 PRIMARY SECURITY THREATS FOR SS7 CELLULAR NETWORKS Contents Introduction Research Methodology Summary Participant Profile Threat Success Rate Most Common Threats Information Leakage Fraud Operation Disruption Common Threats for EMEA and APAC Threats for Operators by Subscriber Database Recommendations Sources
3 Introduction SS7 exploits can turn a cell phone into an open book, allowing an attacker to read messages, track a subscriber s location, and eavesdrop on and redirect calls. This technique is now available not only to intelligence services, but to an average hacker as well. In 2014, we described in detail security issues in signaling networks[1]. This report contains a security analysis of SS7 networks for various operators with a subscriber base of 10 to 70 million. Technology from the 1970s The SS7 signaling system is often called the nervous system of a phone network. Before the invention of SS7, service commands for subscriber connection and data packet delivery were transferred via a speaking channel. This approach was upgraded and replaced with the global signaling system (SS7) over 30 years ago. Today the SS7 standard determines the procedures and data exchange protocols across network devices of telecom companies. SS7 serves as a base for a signaling infrastructure in local, national, international, and wireless networks. The SS7 system CCS-7, which dates to the 1970 s, is riddled with security vulnerabilities like the absence of encryption or service message validation. For a long time, it didn t pose any risk to subscribers or operators, as the SS7 network was a closed system available only to landline operators. The network evolved to meet new standards of mobile connection and service support and in the early 21st century, a set of signaling transport protocols called SIGTRAN was developed. SIGTRAN is an extension to SS7 that allows the use of IP networks to transfer messages, and with this innovation the signaling network stopped being isolated. SS7 vulnerabilities were exposed in 2008, when German researcher Tobias Engel demonstrated a technique that allows mobile subscribers to be spied on[9]. In 2015, Berlin hackers from SR Lab were able to intercept SMS correspondence between Australian senator Nick Xenophon and a British journalist during a live TV broadcast of the Australian program 60 Minutes. They also managed to geo-track the politician during his business trip to Tokyo[6]. Experts discovered these flaws a number of years ago Lennart Ostman reported SS7 issues in 2001[3], and the US government expressed their concern about the problem in 2000[4]. In 2013, Edward Snowden identified SS7 exploitation as one of the techniques used by the National Security Agency[8]. According to Bloomberg[5], several agencies like Defentek and Verint Systems offer spying services via SS7. The Italian spyware maker Hacking Team received similar offers from the Israeli startup CleverSig and the Bulgarian company Circles. Interestingly this only came to light after the cybergroup was hacked and 415GB of data from their servers leaked online[10]. The British company Cobham provides location discovery service with up to a meter precision to more than a dozen countries, says Bruce Schneier[7], indicating that the SS7-based spying market is rapidly growing. What an Attacker Can Do With access to SS7 and a victim s phone number, an attacker can listen to a conversation, pinpoint a person s location, intercept messages to gain access to mobile banking service, send a USSD command to a billable number, and conduct other attacks[1]. It s important to note that it is still impossible to penetrate the network directly it must be accessed via an SS7 gateway. But getting access to an SS7 gateway is relatively easy. An attacker can obtain the operator s license in countries with lax laws or purchase access through the black market from a legal operator for several thousand dollars. If there is an engineer in a hacker group, they will be able to conduct a chain of attacks using legitimate commands or connect their equipment to SS7. There are several ways to get into a network using hacked carrier equipment, GGSN[2] or a femtoсell. 3
4 PRIMARY SECURITY THREATS FOR SS7 CELLULAR NETWORKS SS7 attacks may be performed from anywhere and an attacker doesn t have to be in physical proximity to a subscriber, so it s almost impossible to pinpoint the attacker. Additionally the hacker does not need to be a highly skilled professional either. There are many applications for SS7 on the internet, and cellular carriers are not able to block commands from separate hosts due to the negative impact this would have on service and the violation of roaming principles. Signaling network vulnerabilities open up multiple opportunities for various attacks. For example, SS7 MAP commands allow cell phones to be blocked from a distance[11]. Issues with SS7 security threaten not only mobile subscribers but also a growing ecosystem of industrial and IoT devices from ATMs to GSM gas pressure control systems, that are also considered mobile network subscribers. Therefore SS7 security is one of the priorities when building a global cellular defense. The research contains statistics collected by Positive Technologies specialists during their SS7 security analysis in We have examined existing threats and the current level of signaling network protection against outsider attacks. 1. Research Methodology In 2015, Positive Technologies experts conducted 16 sets of testing involving SS7 security analysis for leading mobile EMEA and APAC operators. The results of the top 8 projects are included in the statistics below. We imitated outsider s actions both on a national and international level of a signaling network, and conducted tool scan of SS7 networks using special software in order to: + + Check signal messages filtering and analyze vulnerabilities related to them + + Investigate ways to attack signaling network nodes and mobile operator subscribers The experts examined a scenario where an attacker acts from an external signaling network and conducts attacks based on application level messages (MAP, CAP). MSC External SS7 network HLR GwSTP VLR Auditor Figure 1. SS7 Security analysis procedure The resulting information helps to improve the robustness of network security standards of mobile services and mitigate risks related to network integrity and fraudulent activity. 4
5 2. Summary Key findings: No SS7 network is safe All SS7 networks examined could be exploited from the outside. For example, DoS attacks targeting an individual subscriber were successful in 80% of cases. Threats related to fraud, including theft of funds from user accounts, could be accomplished in 67% of cases. Subscriber data is at risk All SS7 networks had vulnerabilities that allowed data leaks and SMS interception. All attempts to discover subscriber location were successful except in one network. EMEA networks are less secure The majority of vulnerabilities were detected in cellular operator networks from EMEA. They allowed an attacker to cause service disruption, commit fraud, and steal sensitive data. Nevertheless, the selection was not representative enough to make general statements regarding the level of security of SS7 networks for specific geographic areas. Large operators cannot guarantee security As expected, small mobile operators are less protected against outsider threats. However, even the leading cellular carriers are not able to provide a sufficient level of security and the percentage of successful attacks was significant in all cases. 3. Participant Profile 25% of the investigated SS7 networks belong to large-scale mobile operators with a client base of 40 to 70 million subscribers. Relatively small companies are also included in the report (up to 10M subscribers) and constitute another quarter of all the cellular carriers. 25% 25% Less than 10 million million million million Over 70 million 25% 12,5% 12,5% Figure 2. Operators distribution by subscriber database 5
6 PRIMARY SECURITY THREATS FOR SS7 CELLULAR NETWORKS The majority of SS7 networks belong to APAC (Asia, Pacific, Americas and the Caribbean), and only a quarter of them to EMEA (Europe, Russia, the Middle East, and Africa). 75% 25% EMEA APAC Figure 3. Systems distribution by region Due to confidentiality agreements, we cannot disclose the names of companies that took part in the research. 4. Threat Success Rate We divided threats against SS7 and mobile operator subscribers into three groups: + + Sensitive data leakage + + Fraud + + Operation disruption All types of threats may cause reputational and financial loss to a mobile operator. Data leakage implies disclosure, interception or theft of subscriber information or SS7 configuration details, including subscriber location, texts, and conversations. We defined any unauthorized activity in the network as fraudulent, such as illegal money transfer from user accounts, calls redirection or modification of a subscriber s profile. Operation disruption in the SS7 network or its services is caused by DoS attacks Most Common Threats All the researched networks were exploitable. During the security analysis, experts managed to execute 80% of DoS attacks, 77% of leakage attacks, and 67% of fraudulent actions. Multiple vulnerabilities and equipment configuration errors leave a wide surface for a potential attack. 6
7 Operation disruption 80% Data leakage 77% Fraud 67% Figure 4. Percentage of successful attacks There are four types of flaws: + + Lack of location verification + + No way to check whether a subscriber belongs to a network + + No filtering of unused signaling messages + + Configuration flaws in SMS Home Routing. SMS Home Routing is а hardware and software solution that supports proxy functions of confidential subscriber identifiers and equipment addresses when receiving texts from external connections. Vulnerability exploitation may lead to the realization of various attack scenarios. For example, if a bad actor conducts attacks related to lack of verification mechanisms, it is then possible for him to determine a current subscriber s location (data leakage) or to forward originating calls to a billable number (fraud). Each SS7 network was susceptible to multiple attacks (nine on average) based on the lack of a location verification mechanism. More than three vulnerability exploitation attempts were possible due to inability to check whether a subscriber belongs to a network. In most cases such flaws are the critical to the system. Risk levels are color-coded: red high, orange average. The Positive Technologies experts evaluated risks based on the impact and exploitation difficulty. There is no need for complex equipment to conduct an attack. We used a Linux-based host and a publicly available SDK for SS7 packets generation. Lack of location verification No way to check whether a subscriber belongs to a network No filtering of unused signaling messages Configuration flaws in SMS Home Routing Figure 5. Average number of successful attacks per SS7 network by exploit type The above vulnerabilities include configuration flaws (lack of filtering mechanism for signaling messages and Home Routing configuration errors), architecture issues of protocols and 7
8 PRIMARY SECURITY THREATS FOR SS7 CELLULAR NETWORKS systems (no way to check if a subscriber belongs to a network and lack of location validation), and software flaws (error that causes software to produce an incorrect or unexpected result). As shown on the graph below, the majority of successful attacks (61%) exploit architecture flaws and only 1% software vulnerabilities. 1% Configuration errors Problems in protocol and system architecture Software errors 61% 38% Figure 6. Percentage of successful attacks by type In order to fix vulnerabilities, a system designer needs to employ an appropriate approach. This could be the use of additional technical and software security tools or changes in system settings. For more details, see Section Information Leakage As mentioned above, data leakage implies subscriber information exposure. In general, realization of such threats doesn t cause any direct loss to operators. However, public disclosure of a data leak may lead to reputational loss, and ensuing economic loss as subscribers choose alternative carriers. Key threats: + + Listening in to calls + + Getting subscriber balance information + + SMS interception + + Location disclosure + + Stealing of subscriber information. According to the research, all SS7 networks are vulnerable to attacks aimed at subscriber data leakage and SMS interception. Only once did we fail to discover a subscriber s location. Not all tested hacking methods prove to be effective. For example, 90% of attempts to get subscriber balance or data were to be successful, while only 50% of call tapping attempts succeeded. 8
9 Obtaining balance data 92% Stealing subscriber data 90% Highjacking incoming SMS 89% Tracking locations 58% Eavesdropping on conversation 50% Figure 7. Percentage of successful attacks for sensitive data extraction In particular, in order to obtain subscriber data from cellular carriers, we used specially crafted messages of the following types: + + SendRoutingInfo; + + SendRoutingInfoForSM; + + SendRoutingInfoForLCS; + + SendIMSI. As shown in the diagram below, attacks were successful in 76% of cases when using the SendRoutingInfo method. It exploits the lack of filtering for unused signaling messages. SendRoutingInfo is a MAP message for terminating calls and inquiring routing information and normally, this message should pass only between network elements of a home network. The Positive Technologies experts classify this threat as medium because by using this method, an attacker may obtain subscriber data, and determine the user s current location. 76% SendRoutingInfo 70% SendRoutingInfoForSM 25% SendIMSI 0% SendRoutingInfoForLCS Figure 8. Percentage of successful attacks for sensitive data extraction by method SendRoutingInfoForSM is a MAP message for incoming SMS used for inquiring routing information to determine a subscriber s location. This message should be routed to the SMS Home Routing equipment, if it s deployed in the operator s network. This method is effective in 70% of cases. SendIMSI is a MAP message that is employed to determine a subscriber s IMSI by his phone number. It is used infrequently, however the equipment often processes it according to 3GPP specification and one in four attempts were successful. 9
10 PRIMARY SECURITY THREATS FOR SS7 CELLULAR NETWORKS SendRoutingInfoForLCS is a MAP message that is used to inquire routing information for location services. Normally, this message would be employed only among home network elements. According to the research, no SendRoutingInfoForLCS-based attack succeeded. An adversary may use other methods to obtain a subscriber s location as shown on the diagram below. 53% ProvideSubscriberInfo 25% SendRoutingInfo 0% AnyTimeInterrogation Figure 9. Percentage of successful attacks aimed to discover a subscriber s location by method AnyTimeInterrogation is a MAP message used by nodes to determine a subscriber s location. This message is applied exclusively within the home network. ProvideSubscriberInfo is a MAP message that is used by various services to derive location data. No external connections to home network subscribers are allowed. All AnyTimeInterrogation attacks failed for all the projects in 2015, however 53% of attacks using ProvideSubscriberInfo resulted in discovery of a subscriber s location. We were able to accomplish the objective in all networks except for two. As stated above, we succeeded in about half of the attacks designed to intercept originating and terminating calls. For terminating calls, we accomplished an attack based on roaming spoofing and traffic transferring to another switch. Listening in to originating calls was conducted using the InsertSubscriberData method with traffic transferring to another switch. InsertSubscriberData is a MAP message that is used to change a subscriber s profile in the VLR database. Attackers can modify the platform value in the profile so that call billing would go through their equipment. A mobile switch would send a request to proceed with an originating call to the indicated address. An adversary needs to send a command to forward a call to a controlled PBX, and then transfer traffic to a destination user. Thus, a conversation between subscribers will be openly held via PBX under the complete control of the attacker. We used the UpdateLocation method to intercept incoming SMS messages and 89% of the attacks were successful. UpdateLocation is a message that is used to request registration in the area of coverage of a new mobile switch. This message comes from the roaming partner network at a subscriber s registration attempt. An attacker may complete subscriber s registration in a false network, which means that all incoming texts will be transferred to the indicated address Fraud According to the research results, each system had its own handicaps that allow an outsider to conduct fraudulent actions, such as: + + Call redirection + + Funds transfer from a subscriber s account + + Changing a subscriber s profile. 10
11 Redirecting terminating calls 94% Transferring money via USSD 64% Modifying a subscriber s profile 54% Forwarding originating calls 45% Figure 10. Percentage of successful attacks depending on a threat (fraud) 94% of the attacks aimed at terminating call forwarding were successful but the same was true only for 45% of originating calls. These numbers show that there are some serious issues in the system and protocol architecture of SS7 networks. In order to redirect originating calls, we employed the InsertSubscriberData method. We based the attacks for terminating calls forwarding on the following two methods: + + Roaming number spoofing + + Redirection manipulations Roaming number spoofing is conducted during a terminating call to a target subscriber. Beforehand, a victim must be registered in a false network. As a response to a roaming number inquiry, an attacker should send a number for call redirection. All the connections will be at the operator s expense. Redirection manipulation includes unauthorized setting of unconditional forwarding. All terminating calls will be redirected to a given number and the subscriber will be the one to pay for all connections. Redirection manipulation 92% Roaming number spoofing 69% Figure 11. Percentage of successful attacks in order to redirect a terminating call by method Each employed method was effective, and 92% of redirection manipulation attacks were successful. Threat realization is possible due to vulnerabilities related to the lack of location validation in a victim network. The Positive Technologies experts determined that this flaw is critical in the case of roaming number spoofing and medium in the case of redirection manipulation. We were able to modify a subscriber s profile in half of the cases (54%) using the InsertSubscriberData message. 11
12 PRIMARY SECURITY THREATS FOR SS7 CELLULAR NETWORKS Operation Disruption The research showed that the majority of the examined SS7 networks suffered from exploitable flaws that may lead to DoS. We attempted the UpdateLocation method in all of the testing and achieved an 80% success rate. As a result, an attacker may cause disruption in network services for separate cell phone users without any impact quality or access wise for other subscribers. Thus, an adversary may conduct targeted attacks Common Threats for EMEA and APAC We will not provide detailed statistics for both regions as this data may lead to reputational losses for some carriers and the sample is not large enough to make overall statements regarding the level of security of SS7 networks for specific areas. In this section, there are general results that demonstrate what attack types may be used against networks in both areas. For example, DoS attacks had success rate in EMEA and 71% in APAC countries. Operation disruption Fraud Data leakage 90% 10% 41% 59% Success Failure Figure 12. Percentage of successful attacks in EMEA Operation disruption Fraud Data leakage 71% 29% 63% 37% 49% 51% Success Failure Figure 13. Percentage of successful attacks in APAC This threat is critical for both regions, and may be exacerbated by the fact that carriers focus on building security against DoS targeting their SS7 networks and equipment, rather than the protection of individual subscribers. 12
13 The most critical threat here is fraud. Successful attack development may lead to reputational and financial losses, if, say, an attacker transfers money from a user s account. EMEA is especially vulnerable to almost every type of attack (90%). Figure 14 demonstrates a percentage of successful attacks. An attack is considered successful if at least one attempt the succeeded. Operation disruption Fraud Data leakage 75% 72% 62% EMEA APAC Figure 14. Percentage of successful attacks for each region For example, data leakage attacks were successful in all EMEA networks for all subscribers, and for APAC, the rate is 75%. This high rate might be biased by the smaller sample pool of EMEA networks. It is impossible to draw any general conclusions about all cellular carriers, however the research results confirm that a solution to SS7 security issues should be global to mitigate the existing risks. If an operator attempts to cover individual flaws, an attacker may use the combination of other methods to penetrate the network Threats for Operators by Subscriber Database SS7 threat conclusions: + + Large operators pay more attention to network protection against all reviewed threat types. + + The larger subscriber database is, the less users are secured against fraud. + + The level of subscriber protection is insufficient in all the networks. The results below might be driven by the ability of larger cellular carriers to fund and implement various mechanisms and systems that are dedicated to SS7 protection. The costs of such security measures are not always feasible for small operators. However, the percentage of successful attacks is so high that even market leaders cannot be considered safe. 13
14 PRIMARY SECURITY THREATS FOR SS7 CELLULAR NETWORKS Over 70 million million million million Less than 10 million 63% 63% 79% 75% 75% 40% 70% 50% 92% Data leakage Operation disruption Fraud Figure 15. Percentage of successful attacks by carriers 4.4. Recommendations Main protection mechanisms: + + Configuration settings + + Implementation of additional security means + + Combination of the two The majority of flaws that allow an attacker to track a subscriber s location and steal data could be eliminated if we change network equipment configuration, and prohibit the processing of AnyTimeInterrogation and SendIMSI messages via HLR. The way to fix architecture flaws in protocols and systems is to block undesired messages. A system must consider the filtering of SendRoutingInfoForSM, SendIMSI, SendRoutungInfoForLCS, and SendRoutingInfo. Filtering will help to avoid the risks of DoS, SMS interception, calls forwarding, subscriber s profile modification. Not all indicated SS7 messages are dangerous. Systems need to configure filtering to cut off only undesired messages used in attacks, and implement additional security tools, for example, intrusion detection systems. These systems do not interfere with network traffic and are capable of detecting malicious activity and its source as well as determining necessary configuration for message filtering. The most effective way to counteract all of the identified types of attacks (including the ones that exploit software errors) is a combination of these methods. The described options are most effective in cases where the mobile operator company has a regular and reliable set of procedures for the inner SS7 security audit. However most cellular carriers, especially small ones, struggle to support regular audit procedures. In such cases operators should use outsourcing options as this will help to determine the current level of their protection, uncover existing security threats, and minimize risks at hand by taking necessary actions to fix detected vulnerabilities. 14
15 Conclusion The overall security level of the SS7 networks examined was below average. Every single network fell victim to attacks aimed at data leakage, network disruption, and fraudulent actions. The research demonstrated that telecom companies employ various measures of protection but these are not enough to counteract all possible ways for attackers to penetrate the network. Even large operators are not protected against conversation tapping, messages monitoring, and fraudulent activity such as calls redirection and stealing. Additionally, hackers can pinpoint a subscriber s location at any given moment. In order to reduce risks, operators should employ a global approach to SS7 protection. They should conduct regular security audits of the signaling network and develop appropriate measures to mitigate risk based on vulnerabilities as they evolve. Clearly all operators need to employ additional security measures to better address threats. Abbreviations GwSTP (Gateway Signaling Transfer Point) is a gateway host that routes signal messages. HLR (Home Location Register) is a database storing all information about home subscribers. MSC (Mobile Switching Center) is a specialized automatic telephone exchange. SS7 (Signaling System 7) is a common channel signaling system used in the international and local telephone networks around the world. SDK (Software Development Kit) a set of software development tools that allows the creation of applications. VLR (Visitor Location Register) is a database that contains information about visiting subscribers. 15
16 PRIMARY SECURITY THREATS FOR SS7 CELLULAR NETWORKS Sources 1. Kurbatov, D., and S. Puzankov Vulnerabilities of Mobile Networks Based on SS7 Protocols Kurbatov, D., S. Puzankov, and P. Novikov Mobile Internet Vulnerabilities (GPRS) Ostman, L. CellPoint Systems A Study of Location-Based Services Porter, T., and M. Gough How to Cheat at VoIP Security Kolker, R. Bloomberg Businessweek.. What Happens When the Surveillance State Becomes an Affordable Gadget? 6. Coulthart, R Special Investigation: Bugged, Tracked, Hacked Schneier, B. Schneier on Security SS7 Phone-Switch Flaw Enabled Surveillance Soltani, A., and B. Gellman. The Washington Post New Documents Show How the NSA Infers Relationships Based on Mobile Location Data Engel, T. Locating Mobile Phones Using Signalling System # McDaid, C Can They Hear You Now? Hacking Team & SS Unblocking Stolen Mobile Devices Using SS7-MAP Vulnerabilities. About Positive Technologies Positive Technologies is a leading global provider of enterprise security solutions that include vulnerability and compliance management, incident and threat analysis, and application protection solutions. Our commitment to clients and research has earned Positive Technologies a reputation as one of the foremost authorities on Industrial Control Systems (ICS), Banking, Telecom, Web Application, and ERP security. Recognition from the analyst community, including Gartner, IDC, and Forrester have seen us described as #1 fastest growing* company in vulnerability management and most visionary in web application protection**. To learn more about Positive Technologies please visit ptsecurity.com. *Source: IDC Worldwide Security and Vulnerability Management Forecast and 2012 Vendor Shares, doc #242465, August Based on year-over-year revenue growth in 2012 for vendors with revenues of $20M+. **Source: Gartner Magic Quadrant for Web Application Firewalls 15 July Positive Technologies. Positive Technologies and the Positive Technologies logo are trademarks or registered trademarks of Positive Technologies. All other trademarks mentioned herein are the property of their respective owners. [email protected] ptsecurity.com SS7_VULNERABILITY A4.ENG
SIGNALING SYSTEM 7 (SS7) SECURITY REPORT
SIGNALING SYSTEM 7 () SECURITY REPORT Page CONTENTS. Introduction. Summary 4. Research methodology 5 Preconditions for attacks 5 An attacker s profile 5 Resources required 5 4. Research overview 6 4..
29.09.2015. Digital Communications Exploring SS7 signaling fraud that threatens mobile network security and subscriber privacy
29.09.2015 Digital Communications Exploring SS7 signaling fraud that threatens mobile Mobile communications is a prime target for hackers who desire to penetrate critical infrastructures and businesses
Protecting Mobile Networks from SS7 Attacks. Telesoft White Papers
Protecting Mobile Networks from SS7 Attacks Telesoft White Papers Christian Feest 23rd June 2015 SS7 Networks The Challenge The problem with the current SS7 system is that messages can be altered, injected
Worldwide attacks on SS7 network
Worldwide attacks on SS7 network P1 Security Hackito Ergo Sum 26 th April 2014 Pierre-Olivier Vauboin ([email protected]) Alexandre De Oliveira ([email protected]) Agenda Overall telecom architecture Architecture
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and Control (NFCC) - Stage 1 Requirements
TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and Control (NFCC) - Stage 1 Requirements Mar 3,2005 THE TELECOMMUNICATION TECHNOLOGY COMMITTEE TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and
SS7: Locate. Track. Manipulate.
You have a remote-controlled tracking device in your pocket Tobias Engel @2b_as 2 Signalling System #7 Protocol suite used by most telecommunications network operators throughout the world
Fiber-Optic Networks: Is Safety Just an Optical Illusion?
TECHNOLOGY ASSESSMENT Fiber-Optic Networks: Is Safety Just an Optical Illusion? Romain Fouchereau IDC OPINION Fiber-optic cable networks have been deemed the fastest, most reliable, and most secure way
Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.
Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks
WEB APPLICATION VULNERABILITY STATISTICS (2013)
WEB APPLICATION VULNERABILITY STATISTICS (2013) Page 1 CONTENTS Contents 2 1. Introduction 3 2. Research Methodology 4 3. Summary 5 4. Participant Portrait 6 5. Vulnerability Statistics 7 5.1. The most
UNDERSTANDING CORE TELECOM SECURITY
SOLUTION BRIEF -TELECOM UNDERSTANDING CORE TELECOM SECURITY If you think you re not affected, consider that a 2013 Congressional survey of more than 150 utility companies revealed more than a dozen utilities
Enterprise Computing Solutions
Business Intelligence Data Center Cloud Mobility Enterprise Computing Solutions Security Solutions arrow.com Security Solutions Secure the integrity of your systems and data today with the one company
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
Mobile Wireless Overview
Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Multi-layered Security Solutions for VoIP Protection
Multi-layered Security Solutions for VoIP Protection Copyright 2005 internet Security Systems, Inc. All rights reserved worldwide Multi-layered Security Solutions for VoIP Protection An ISS Whitepaper
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
INFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE IAD Best Practices for Securing Wireless Devices and Networks in National Security Systems IAG U/OO/814639-15 13 October
PBX Fraud Educational Information for PBX Customers
PBX Fraud Educational Information for PBX Customers Telephone Hackers Hit Where It Hurts: Your Wallet Telephone hacking is unauthorized or fraudulent activities that can affect your telephone system, and
Security in the smart grid
Security in the smart grid Security in the smart grid It s hard to avoid news reports about the smart grid, and one of the media s favorite topics is security, cyber security in particular. It s understandable
Identifying Broken Business Processes
Identifying Broken Business Processes A data-centric approach to defining, identifying, and enforcing protection of sensitive documents at rest, in motion, and in use 6/07 I www.vericept.com Abstract The
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
Data Loss Prevention Program
Data Loss Prevention Program Safeguarding Intellectual Property Author: Powell Hamilton Senior Managing Consultant Foundstone Professional Services One of the major challenges for today s IT security professional
Security and Risk Analysis of VoIP Networks
Security and Risk Analysis of VoIP Networks S.Feroz and P.S.Dowland Network Research Group, University of Plymouth, United Kingdom e-mail: [email protected] Abstract This paper address all
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
SECURITY TRENDS & VULNERABILITIES REVIEW 2015
SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall
An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks
An Oracle White Paper December 2013 The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks Introduction Today s mobile networks are no longer limited to voice calls. With
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks
WHITE PAPER The Need for Wireless Intrusion Prevention in Retail Networks The Need for Wireless Intrusion Prevention in Retail Networks Firewalls and VPNs are well-established perimeter security solutions.
VoIP: The Evolving Solution and the Evolving Threat. Copyright 2004 Internet Security Systems, Inc. All rights reserved worldwide
VoIP: The Evolving Solution and the Evolving Threat Copyright 2004 Internet Security Systems, Inc. All rights reserved worldwide VoIP: The Evolving Solution and the Evolving Threat An ISS Whitepaper 2
Table of Contents. Application Vulnerability Trends Report 2013. Introduction. 99% of Tested Applications Have Vulnerabilities
Application Vulnerability Trends Report : 2013 Table of Contents 3 4 5 6 7 8 8 9 10 10 Introduction 99% of Tested Applications Have Vulnerabilities Cross Site Scripting Tops a Long List of Vulnerabilities
Continuous, proactive cybersecurity.
Continuous, proactive cybersecurity. Your own RoboHacker, that Continuously generates Simulated Penetration Attacks, 24/7, by imitating the Behavior of a Human Hacker, thus preventing the attacks before
1.1.1 Introduction to Cloud Computing
1 CHAPTER 1 INTRODUCTION 1.1 CLOUD COMPUTING 1.1.1 Introduction to Cloud Computing Computing as a service has seen a phenomenal growth in recent years. The primary motivation for this growth has been the
Achieving Truly Secure Cloud Communications. How to navigate evolving security threats
Achieving Truly Secure Cloud Communications How to navigate evolving security threats Security is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
SS7 & LTE Stack Attack
SS7 & LTE Stack Attack Ankit Gupta Black Hat USA 2013 [email protected] Introduction With the evolution of IP network, Telecom Industries are using it as their core mode of communication for their network
1 Introduction. 2 Assumptions. Implementing roaming for OpenBTS
Implementing roaming for OpenBTS 1 Introduction One of the main advantages of OpenBTS TM system architecture is absence of a legacy GSM core network. SIP is used for registering, call control and messaging.
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected]
TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY
IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...
Mobile network security report: Greece
Mobile network security report: Greece GSM Map Project [email protected] Security Research Labs, Berlin October 2012 Abstract. Mobile networks differ widely in their protection capabilities against common
VOIP Attacks On The Rise
VOIP Attacks On The Rise Voice over IP (VoIP) infrastructure has become more susceptible to cyber-attack due to the proliferation of both its use and the tools that can be used for malicious purposes.
Mobile network security report: Norway
Mobile network security report: Norway GSM Map Project [email protected] Security Research Labs, Berlin August 2014 Abstract. Mobile networks differ widely in their protection capabilities against common
Security Best Practices for Mobile Devices
Security Best Practices for Mobile Devices Background & Introduction The following document is intended to assist your business in taking the necessary steps needed to utilize the best security practices
case study Core Security Technologies Summary Introductory Overview ORGANIZATION: PROJECT NAME:
The Computerworld Honors Program Summary developed the first comprehensive penetration testing product for accurately identifying and exploiting specific network vulnerabilities. Until recently, organizations
Enterprise Apps: Bypassing the Gatekeeper
Enterprise Apps: Bypassing the Gatekeeper By Avi Bashan and Ohad Bobrov Executive Summary The Apple App Store is a major part of the ios security paradigm, offering a central distribution process that
Teradata and Protegrity High-Value Protection for High-Value Data
Teradata and Protegrity High-Value Protection for High-Value Data 03.16 EB7178 DATA SECURITY Table of Contents 2 Data-Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
SIP and VoIP 1 / 44. SIP and VoIP
What is SIP? What s a Control Channel? History of Signaling Channels Signaling and VoIP Complexity Basic SIP Architecture Simple SIP Calling Alice Calls Bob Firewalls and NATs SIP URIs Multiple Proxies
Reducing Application Vulnerabilities by Security Engineering
Reducing Application Vulnerabilities by Security Engineering - Subash Newton Manager Projects (Non Functional Testing, PT CoE Group) 2008, Cognizant Technology Solutions. All Rights Reserved. The information
Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:
Security.01 Penetration Testing.02 Compliance Review.03 Application Security Audit.04 Social Engineering.05 Security Outsourcing.06 Security Consulting.07 Security Policy and Program.08 Training Services
Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2
Report No. 13-35 September 27, 2013 Appalachian Regional Commission Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning
Taxonomic Modeling of Security Threats in Software Defined Networking
Taxonomic Modeling of Security Threats in Software Defined Networking Recent advances in software defined networking (SDN) provide an opportunity to create flexible and secure next-generation networks.
GET MORE FROM MOBILE MESSAGING
WHITEPAPER MOBILE SERVICES: MOBILE MESSAGING EXCHANGE GET MORE FROM MOBILE MESSAGING DELIVER A HIGH-QUALITY USER EXPERIENCE, EASILY AND ECONOMICALLY WITH TEXT MESSAGE EXECUTIVE SUMMARY: USE SMS TO GET
Global Network and Application Security Testing Market An Overview of Emerging Trends and Growth Opportunities For Test Solution Vendors
Global Network and Application Security Testing Market An Overview of Emerging Trends and Growth Opportunities For Test Solution Vendors May 2013 Contents Section Slide Numbers Executive Summary 4 Market
Closing Wireless Loopholes for PCI Compliance and Security
Closing Wireless Loopholes for PCI Compliance and Security Personal information is under attack by hackers, and credit card information is among the most valuable. While enterprises have had years to develop
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
IT Security Risks & Trends
IT Security Risks & Trends Key Threats to All Businesses 1 1 What do the following have in common? Catholic church parish Hospice Collection agency Main Street newspaper stand Electrical contractor Health
Mitigating the Security Risks of Unified Communications
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Mitigating the Security Risks of Unified Communications Fernando Almeida 1 +, Jose
Audit Capabilities: Beyond the Checklist. Niall Haddow, Business Leader Philip Young, Sr. IT Auditor Professional Strategies - Session S32
Audit Capabilities: Beyond the Checklist Niall Haddow, Business Leader Philip Young, Sr. IT Auditor Professional Strategies - Session S32 Agenda Beyond the Checklist Visa Overview Visa Internal Audit Overview
How To Protect Your Credit Card Information From Being Stolen
Visa Account Information Security Tool Kit Welcome to the Visa Account Information Security Program 2 Contents 1. Securing cardholder data is everyone s concern 4 2. Visa Account Information Security (AIS)
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
A Guide to Common Cloud Security Concerns. Why You Can Stop Worrying and Start Benefiting from SaaS
A Guide to Common Cloud Security Concerns Why You Can Stop Worrying and Start Benefiting from SaaS T he headlines read like a spy novel: Russian hackers access the President s email. A cyber attack on
Presented by Evan Sylvester, CISSP
Presented by Evan Sylvester, CISSP Who Am I? Evan Sylvester FAST Information Security Officer MBA, Texas State University BBA in Management Information Systems at the University of Texas Certified Information
Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.
Seamless Mobile Security for Network Operators Build a secure foundation for winning new wireless services revenue. New wireless services drive revenues. Faced with the dual challenges of increasing revenues
GeoMatrix. Positioning of Mobile Phones System
GeoMatrix Positioning of Mobile Phones System Geographic intelligence is one of the oldest forms of military intelligence, and one of the most important. From earliest times, an accurate knowledge and
IPLocks Vulnerability Assessment: A Database Assessment Solution
IPLOCKS WHITE PAPER February 2006 IPLocks Vulnerability Assessment: A Database Assessment Solution 2665 North First Street, Suite 110 San Jose, CA 95134 Telephone: 408.383.7500 www.iplocks.com TABLE OF
PCI Compliance for Healthcare
PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
WEBSENSE TRITON SOLUTIONS
WEBSENSE TRITON SOLUTIONS INNOVATIVE SECURITY FOR WEB, EMAIL, DATA AND MOBILE TRITON STOPS MORE THREATS. WE CAN PROVE IT. PROTECTION AS ADVANCED AND DYNAMIC AS THE THREATS THEMSELVES The security threats
FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES
FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES Kaspersky Lab 2 Corporate IT Security Risks Survey details: More than 5,500 companies in 26 countries around the world
Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares
EXCERPT Worldwide Security and Vulnerability Management 2009 2013 Forecast and 2008 Vendor Shares IN THIS EXCERPT Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015
Why a Network-based Security Solution is Better than Using Point Solutions Architectures
Why a Network-based Security Solution is Better than Using Point Solutions Architectures In This Paper Many threats today rely on newly discovered vulnerabilities or exploits CPE-based solutions alone
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
SUPPLIER SECURITY STANDARD
SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard
PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ
PAVING THE PATH TO THE ELIMINATION A RSACCESS WHITE PAPER 1 The Traditional Role of DMZ 2 The Challenges of today s DMZ deployments 2.1 Ensuring the Security of Application and Data Located in the DMZ
POLIWALL: AHEAD OF THE FIREWALL
POLIWALL: AHEAD OF THE FIREWALL FIREWALL HISTORY Since the earliest days of the Internet, when hackers sat in their darkened basements dialing into networks with dial-up modems, both network threats and
International Dialing and Roaming: Preventing Fraud and Revenue Leakage
page 1 of 7 International Dialing and Roaming: Preventing Fraud and Revenue Leakage Abstract By enhancing global dialing code information management, mobile and fixed operators can reduce unforeseen fraud-related
Bootstrapping Secure Channels of Communication Over Public Networks
Bootstrapping Secure Channels of Communication Over Public Networks Human Interaction Security Protocols (HISPs) offer an entirely new way of authenticating teams to create robust security where none exists.
Devising a Server Protection Strategy with Trend Micro
Devising a Server Protection Strategy with Trend Micro A Trend Micro White Paper Trend Micro, Incorporated» A detailed account of why Gartner recognizes Trend Micro as a leader in Virtualization and Cloud
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
Penetration Testing Service. By Comsec Information Security Consulting
Penetration Testing Service By Consulting February, 2007 Background The number of hacking and intrusion incidents is increasing year by year as technology rolls out. Equally, there is no hiding place your
Security and Protection in Real-Time
Security and Protection in Real-Time Product White Paper Aug 29, 2006 ParetoLogic Anti-Spyware offers an advanced set of tools designed to protect your computer from spyware threats. There are two lines
Symantec Advanced Threat Protection: Network
Symantec Advanced Threat Protection: Network DR150218C April 2015 Miercom www.miercom.com Contents 1.0 Executive Summary... 3 2.0 Overview... 4 2.1 Products Tested... 4 2.2. Malware Samples... 5 3.0 How
ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
Automated Firewall Change Management. Ensure continuous compliance and reduce risk with secure change management workflows
Automated Firewall Change Management Ensure continuous compliance and reduce risk with secure change management workflows JANUARY 2015 Executive Summary Firewall management has become a hot topic among
Penetration Testing //Vulnerability Assessment //Remedy
A Division Penetration Testing //Vulnerability Assessment //Remedy In Penetration Testing, part of a security assessment practice attempts to simulate the techniques adopted by an attacker in compromising
ENABLING FAST RESPONSES THREAT MONITORING
ENABLING FAST RESPONSES TO Security INCIDENTS WITH THREAT MONITORING Executive Summary As threats evolve and the effectiveness of signaturebased web security declines, IT departments need to play a bigger,
Functional vs. Load Testing
Best Practices in Performance & Security Testing March 26, 2009 CVN www.sonata-software.com Functional vs. Load Testing Functional test Objective Functionality Example Do business processes function properly
Threat Mitigation for VoIP
Threat Mitigation for VoIP Bogdan Materna, VP Engineering and CTO VoIPshield Systems Third Annual VoIP Security Workshop June 2, 2006 Overview Basics VoIP Security Impact Examples of real vulnerabilities
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
