LTE and IMSI catcher myths



Similar documents
Security in cellular-radio access networks

Mobile Security. Practical attacks using cheap equipment. Business France. Presented the 07/06/2016. For. By Sébastien Dudek

LTE security and protocol exploits

LTE Security How Good Is It?

Network Access Security in Mobile 4G LTE. Huang Zheng Xiong Jiaxi An Sihua

Protocol Signaling Procedures in LTE

House intercoms attacks

LTE X2 Handover Messaging

Long Term Evolution - LTE. A short overview

Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils

Long-Term Evolution. Mobile Telecommunications Networks WMNet Lab

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

Dirty use of USSD codes in cellular networks

Mobility Management. Sara Modarres Razavi

How to secure an LTE-network: Just applying the 3GPP security standards and that's it?

3GPP Femtocells: Architecture and Protocols. by Gavin Horn

Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils

Mobile network security report: Poland

LTE Mobility Enhancements

On LTE Security: Closing the Gap Between Standards and Implementation

Optimization Handoff in Mobility Management for the Integrated Macrocell - Femtocell LTE Network

Security Analysis of LTE Access Network

NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications

LTE Security. EventHelix.com. Encryption and Integrity Protection in LTE. telecommunication design systems engineering real-time and embedded systems

Single Radio Voice Call Continuity (SRVCC) Testing Using Spirent CS8 Interactive Tester

Defending mobile phones. Karsten Nohl, Luca Melette,

GSM and UMTS security

Single Radio Voice Call Continuity. (SRVCC) with LTE. White Paper. Overview. By: Shwetha Vittal, Lead Engineer CONTENTS

Mobile network security report: Netherlands

GSM Research. Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010

Mobile Phone Network Security

GSM security country report: Germany

Voice and SMS in LTE White Paper

Performance validation for the mobile core

CS Fallback Function for Combined LTE and 3G Circuit Switched Services

Mobile network security report: Germany

LTE Attach and Default Bearer Setup Messaging

How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph

LTE and the Evolution to 4G Wireless

What is going on in Mobile Broadband Networks?

Cellular Analysis for Legal Professionals Larry E. Daniel Digital Forensic Examiner and Cellular Analyst EnCE, DFCP, BCE, ACE, CTNS, AME

Circuit-switched fallback. White Paper

Mobile network security report: Belgium

Delivery of Voice and Text Messages over LTE

Business Opportunities beyond Ultrabroadband: Proximity Services and LTE direct

Architecture Overview NCHU CSE LTE - 1

ETSI TS V ( )

GSM security country report: USA

LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks

Service Continuity for embms in LTE/LTE-Advanced Network: Standard Analysis and Supplement

Wireless Phone GSM tracking. Denis Foo Kune, John Koelndorfer, Nick Hopper, Yongdae Kim

Mobile network security report: Poland

LTE service area. 3G service area. EPS : Evolved Packet System. Currently Planning & Coordination Office 1 C *

Mobile network security report: Greece

LTE Overview October 6, 2011

LTE Control Plane on Intel Architecture

LTE protocol tests for IO(D)T and R&D using the R&S CMW500

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

SS7: Locate. Track. Manipulate.

(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation

SERVICE CONTINUITY. Ensuring voice service

Worldwide attacks on SS7 network

Technical vulnerability of the E-UTRAN paging mechanism

Protocol log analysis with constraint programming. Kenneth Balck Mats Carlsson Olga Grinchtein Justin Pearson

SIMalliance LTE UICC profile. This document is a collection of requirements for optimal support of LTE/EPS networks by UICC

Security in the Evolved Packet System

Public Safety Communications Research. LTE Demonstration Network Test Plan. Phase 3 Part 1: Network Interoperability & Drive Test. Version 2.

Minimization of Drive Tests (MDT) in Mobile Communication Networks

Telesystem Innovations. LTE in a Nutshell: Protocol Architecture WHITE PAPER

ETSI TS V8.1.0 ( ) Technical Specification

Mobile network security report: Norway

A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols

introduction to femtocells

Design and Implementation of a Distributed Mobility Management Entity (MME) on OpenStack

EETS 8316 Wireless Networks Fall 2013

HRPD/1XRTT and 3GPP E-UTRAN (LTE) Interworking and Inter-Technology Handoff

LTE-Advanced Carrier Aggregation Optimization

TEPZZ 68575_A_T EP A1 (19) (11) EP A1. (12) EUROPEAN PATENT APPLICATION published in accordance with Art.

ETSI TS V8.5.0 ( ) Technical Specification

Study of Long Term Evolution Network, its Architecture along with its Interfaces

Nokia Networks. Voice over LTE (VoLTE) Optimization

3GPP LTE Channels and MAC Layer

Chapter 2 Network Architecture and Protocols

3GPP Long Term Evolution: Architecture, Protocols and Interfaces

Diameter in the Evolved Packet Core

A constraint optimization model for analysis of telecommunication protocol logs

SS7 & LTE Stack Attack

Get the best performance from your LTE Network with MOBIPASS

S-CORE S-CORE. Accelerate your LTE development.

Product Description. HUAWEI E3372s-153 LTE USB Stick (Cat.4) HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date

Trends in Mobile Network Architectures 3GPP LTE Mobile WiMAX Next Generation Mobile Networks Dr.-Ing. Michael Schopp, Siemens Networks

UMTS security. Helsinki University of Technology S Security of Communication Protocols

Voice Quality with VoLTE

LTE450 Julian Bright, Senior Analyst LTE450 Global Seminar 2014 Copyright Ovum All rights reserved.

Update from SIMalliance on LTE. Jean-Claude Perrin SIMalliance LTE Work Group Chairman

Security testing the Internet-of-things

An Example of Mobile Forensics

ASR 5x00 Series SGSN Authentication and PTMSI Reallocation Best Practices

Transcription:

LTE and IMSI catcher myths Ravishankar Borgaonkar, Altaf Shaik, N. Asokan, ValAeri Niemi, Jean- Pierre Seifert Blackhat EU, Amsterdam, Netherlands 13 November 2015

Outline Fake base stamons in GSM/3G LTE/4G Security Types of vulnerabilimes in pracmce Building LTE/4G base stamon AAacking methods/demos Impact & Analysis 2

Mo+va+on Baseband story PlaTorm for pracmcal security research in LTE/4G AAacking cost VS security measures (defined in 15 years back) 3

Fake base- sta+ons..1 Used for: IMSI/IMEI/locaMon tracking, call & data intercepmon Exploit weaknesses in GSM & 3G networks (parmally) Knows as IMSI Catchers Difficult to detect on normal phones (Darshak, Cryptophone or Snoopsnitch) 4

Fake base- sta+ons..2 5

Why in GSM & 3G GSM - lack of mutual authenmcamon between base stamon and mobiles 3G no integrity protecmon like in LTE, downgrade aaacks GSM/3G power is to base stamon, decides when and how to authenmcate/encrypt IMSI/IMEI can be requested any Mme 6

LTE/4G networks Widely deployed, 1.37 billion users at the end of 2015 Support for VoLTE High speed data connecmon and quality of service More secure than previous generamons Best effort to avoid previous mistakes 7

LTE Architecture E-UTRAN Cell UE AS enodeb S1 MME I n t e r n e t Tracking Area NAS AS : Access Stratum UE: User Equipment NAS : Non- Access Stratum S1 : Interface E- UTRAN: Evolved Universal Terrestrial Access Network MME : Mobility Management EnMty 8

Enhanced security in LTE Mutual authenmcamon between base stamon & mobiles Mandatory integrity protecmon for signaling messages Extended AKA & key hierarchy Security algorithms Other features (not relevant for this talk) 9

Paging in LTE 10

Paging in LTE IMSI = 404220522xxxxxx" Paging Request Type 2" {404220522xxxxxx : A000FFFF }" TMSI = A000FFFF" enodeb" 11

LTE Smart Paging Cell 5 Cell 4 Cell 1 Cell 3 Cell 2 Tracking Area 12

Enhanced security w.r.t fake base sta+on Mutual authenmcamon between base stamon & mobiles Mandatory integrity protecmon for signaling messages IMEI is not given in non- integrity messages Complexity in building LTE fake base stamon* But in pracmce: ü implementamons flaws, specificamon/protocol deficiencies? * haps://insidersurveillance.com/rayzone- piranha- lte- imsi- catcher/ 13

Specifica+on Vulnerabili+es 14

LTE RRC protocol* : specifica+on vulnerability RRC protocol setup & manage over- the- air connec+vity! Broadcast informamon ü UE idenmmes ü Network informamon (SIB) messages ü Neither authenmcated nor encrypted UE measurement reports ü Necessary for smooth handovers ü UE sends Measurement Report messages ü Requests not authenmcated: reports are not encrypted *3GPP TS 36.331 : E- UTRA; RRC protocol Fig. source: hap://lteuniversity.com/ 15

LTE RRC protocol* : specifica+on vulnerability RRC protocol setup & manage over- the- air connec+vity! Broadcast informamon UE IdenMMes IMSI, TMSI Network informamon messages (SIB) Neither authenmcated nor encrypted enodeb *3GPP TS 36.331 : E- UTRA; RRC protocol SIB : System InformaMon Blocks 16

EMM protocol* : specifica+on vulnerability EMM protocol - Controlling UE mobility in LTE network! Tracking Area Update(TAU) procedure ü UE sends TAU Request to nomfy TA ü During TAU, MME & UE agree on network mode ü TAU Reject used to reject some services services (e.g., LTE services) to UE ü However, reject messages are not integrity protected LTE AAach procedure ü UE sends its network capabilimes ü Unlike security algorithms, no protecmon ü Network capabilimes are not protected against bidding down aaacks 17

Vulnerabili+es in baseband chipset 18

IMEI leak : implementa+on vulnerability TAU reject special cause number! IMEI is leaked by popular phones Triggered by a special message Fixed now but smll your device leak ;) IMEI request not authenmcated correctly 19

LTE RRC* : implementa+on vulnerability RLF reports network troubleshoo+ng! When Radio Link Failure happens Informs base stamon of RLF UE sends RLF report message Privacy sensimve informamon in RLF report Request not authenmcated: reports are not encrypted Fig. source: hap://lteuniversity.com/ 20

LTE RRC* : implementa+on vulnerability Measurement reports GPS co- ordinates! For handover Privacy sensimve informamon in the report Request not authenmcated reports are not encrypted 21

Network Configura+on Issues 22

Configura+on issues Deployments all over the world! Smart Paging ü Directed onto a small cell rather than a tracking area ü Allows aaacker to locate LTE subscriber in a cell GUTI persistence ü GUTI change handover/aaach/reallocamon procedure ü MNOs tend not to change GUTI sufficiently frequently MME issues 23

Building 4G fake base sta+on and azack demos Ethical Considera+on 24

Experiment Set- up Set- up cost - lizle over 1000 Euro! Hardware USRP, LTE dongle, LTE phones Sooware - OpenLTE & srslte ImplementaMon passive, semi- passive, acmve Thanks to OpenLTE and srslte folks! 25

Loca+on Leak AZacks Exploit specifica+on/implementa+on flaws in RRC protocol! Passive : link locamons over Mme ü Sniff IMSI/GUTIs at a locamon (e.g., Airport/home/office) ü Track subscriber movements (same GUTI for several days) Demo 26

Semi- Passive : determine tracking area & cell ID VoLTE calls: Mapping GUTIs to phone number ü 10 silent calls to vicmm s number ü High priority à paging to enmre tracking area(ta) ü Passive sniffer in a TA Social idenmmes: Mapping GUTIs to Social Network IDs ü E.g., 10 Facebook messages, whatsapp/viber ü Low priority à Smart paging to a last seen cell ü Passive sniffer in a cell Demo 27

Ac+ve : leak fine- grained loca+on Precise loca+on using trilatera+on or GPS! Measurement/RLF report ü Two rogue enodebs for RLF ü enodeb1 triggers RL failure: disconnects mobile ü enodeb2 then requests RLF report from mobile Demo 28

DoS AZacks Exploi+ng specifica+on vulnerability in EMM protocol! Downgrade to non- LTE network services (GSM/3G) Deny all services (GSM/3G/LTE) Deny selected services (block incoming calls) Persistent DoS Requires reboot/sim re- insermon Demo 29

Summary New vulnerabilimes in LTE standards/chipsets Social applicamons used for silent tracking LocaMng 4G devices using trialternamon, GPS co- ordinates! DoS aaacks are persistent & silent to users ConfiguraMon issues in deployed LTE networks 30

Solu+on! Use any old Nokia phone without bazery and SIM card! 31

Impact Specifica+on vulnerabili+es affect every LTE- enabled device! ImplementaMon issues are (almost) fixed by baseband chip manufacturers J 3GPP/GSMA working on fixes However no updates from handset manufacturers yet L No response yet from MediaTek & Samsung L Mobile network operators (Germany) fixing their network configuramon issues; others may affected as well L 32

Thanks Ques+ons?