(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation



Similar documents
(U)SimMonitor: A Mobile Application for Security Evaluation of Cellular Networks

Prof. Christos Xenakis, System Security Laboratory, Department of Digital Systems School of Information Communication Technologies University of

Protecting against Mobile Attacks

Lecture Embedded System Security A. R. Darmstadt, Introduction Mobile Security

Security Threats for Mobile Platforms

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

SHORT MESSAGE SERVICE SECURITY

IAIK. Motivation 2. Advanced Computer Networks 2015/2016. Johannes Feichtner IAIK

U.S. Cellular Mobile Data Security. User Guide Version 00.01

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University

Studying Security Weaknesses of Android System

Smartphone Hacks and Attacks: A Demonstration of Current Threats to Mobile Devices

Norton Mobile Privacy Notice

10 best practice suggestions for common smartphone threats

Smartphone Pentest Framework v0.1. User Guide

BlackBerry 10.3 Work and Personal Corporate

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

Tutorial on Smartphone Security

Junos Pulse for Google Android

Trend Micro Incorporated Research Paper Adding Android and Mac OS X Malware to the APT Toolbox

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Security Best Practices for Mobile Devices

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Analysis of advanced issues in mobile security in android operating system

Trust Digital Best Practices

Certified Secure Computer User

Guideline on Safe BYOD Management

Data Protection Act Bring your own device (BYOD)

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Unknown threats in Sweden. Study publication August 27, 2014

Fighting Advanced Threats

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Feature List for Kaspersky Security for Mobile

Seven Things To Consider When Evaluating Privileged Account Security Solutions

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Emerging Security Technological Threats

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Chris Boykin VP of Professional Services

Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software

Are free Android virus scanners any good?

Practical Attacks against Mobile Device Management Solutions

Cybersecurity and internal audit. August 15, 2014

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Cloud Services Prevent Zero-day and Targeted Attacks

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN:

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One

The Hidden Dangers of Public WiFi

How To Protect Your Computer From Attack

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Firewalls, Tunnels, and Network Intrusion Detection

Introduction to Cyber Security / Information Security

Breaking the Cyber Attack Lifecycle

Agenda , Palo Alto Networks. Confidential and Proprietary.

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

Dirty use of USSD codes in cellular networks

74% 96 Action Items. Compliance

CRYPTUS DIPLOMA IN IT SECURITY

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Mobile network security report: Poland

CHECK POINT Mobile Security Revolutionized. [Restricted] ONLY for designated groups and individuals

Defending Against Cyber Attacks with SessionLevel Network Security

That Point of Sale is a PoS

Secure Your Mobile Workplace

CYBERTRON NETWORK SOLUTIONS

Technical Standards for Information Security Measures for the Central Government Computer Systems

Mobile Malware Network View. Kevin McNamee : Alcatel-Lucent

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Using Remote Desktop Clients

Service Specification Schedule For Fujitsu Cloud IaaS Trusted Public S5

Promoting Network Security (A Service Provider Perspective)

SS7 & LTE Stack Attack

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Transcription:

(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation DR. C. NTANTOGIAN 1, DR. C. XENAKIS 1, DR. G. KAROPOULOS 2 1 DEPT. O F DIGITAL SYST EMS, UNIVERSITY OF PIRAEUS 2 DEPT. O F I N FORMATICS AND T ELECOMMUNICATIONS, UNIVERSITY O F AT HENS 7/4/2016 6TH INFOCOM SECURITY 1

At a glance Cyber-criminals increasingly focus on smartphones (U)SimMonitor is both a malware and a security analysis tool for Android and iphone Collects data like: user identities, encryption keys, location data and network parameters Stealthy operation Impact: User identification Movement track Disclosure of phone calls and data sessions Reveals network security policies 7/4/2016 6TH INFOCOM SECURITY 2

Outline The status with mobile devices Mobile malware Motivation for this work (U)SimMonitor: Functionality Architecture Prerequisites Detection Impact criticality White hat usage 7/4/2016 6TH INFOCOM SECURITY 3

Mobile devices under attack Nowadays, cyber attacks are shifting to mobile devices 1. Always on and connected 2. Valuable and critical data 3. Processing and storage resources equivalent to PC 4. High penetration 7/4/2016 6TH INFOCOM SECURITY 4

Connection-enabled mobile devices GSM 3G LTE Wifi Bluetooth NFC 7/4/2016 6TH INFOCOM SECURITY 5

Valuable data on mobile devices Emails & documents (pdf, doc, etc.) Photos & videos Geolocation information Contacts and other lists SMS messages Critical applications (i.e., m-banking, m-wallet, m-visa, VPN, cloud storage & services, password managers, etc.) Phone information (IMEI, IMSI, phone number) 7/4/2016 6TH INFOCOM SECURITY 6

Processing & storage equivalent to PC High speed CPU Powerful computing 7/4/2016 6TH INFOCOM SECURITY 7

High Penetration of mobile devices 7/4/2016 6TH INFOCOM SECURITY 8

Emergence of mobile malware The increase of mobile malware exceeded this of PC malware 7/4/2016 6TH INFOCOM SECURITY 9

Statistics of mobile malware 7/4/2016 6TH INFOCOM SECURITY 10

Mobile malware evolution What is next? Ransomware Cyber war BotNet Money MMS Spreading Bluetooth Worm Organized Crime 7/4/2016 6TH INFOCOM SECURITY 11

Motivation of this work In general, we can observe that mobile malware target and exploit the characteristics of the mobile OS to perform a variety of malicious actions To the best of our knowledge, there is no mobile malware that targets the baseband modem of mobile phones to breach: the privacy of mobile users the security of cellular networks 7/4/2016 6TH INFOCOM SECURITY 12

What is the Baseband modem? Smartphone contain at least two CPUs: 1. The application processor that runs the applications 2. The baseband processor that handles connectivity to the cellular network. 7/4/2016 6TH INFOCOM SECURITY 13

(U)SimMonitor We have designed and implemented a new type of mobile malware for both Android and iphone devices, which attacks the baseband modems It is capable of stealing security credentials and sensitive information of the cellular technology permanent and temporary identities, encryption keys, location of users, etc. Github: https://github.com/ssl-unipi/u-simonitor 7/4/2016 6TH INFOCOM SECURITY 14

(U)SimMonitor functionality It reads via AT commands security related and sensitive data from USIM/SIM card Encryptions keys used in the mobile network (Kc, Kc GPRS, CK, IC) Key thresholds, ciphering indicator Identities, TMSI, P-TMSI, IMSI Network type, network provider Location area identity, Routing area identity (LAI, RAI) Cell ID The extracted data is uploaded to a server, deployed from the attacker 7/4/2016 6TH INFOCOM SECURITY 15

(U)SimMonitor Architecture AT commands extract data from USIM and SIM card It transfers the database contents to a secure server via SSH and subsequently deletes the contents of the database to save memory space in the phone Creates a system process to invoke a Linux shell script. The result of the executed AT commands are gathered by the Data Collection Unit Filters out unnecessary information and stores the final data in a local Includes all the database. AT commands that are executed sequentially Optionally, it can display the final data in the phone s screen Monitors and captures the occurrence of an event. Possible event types are: i) Outgoing or incoming calls ii) Screen on or off, iii) Power on or off, iv) Periodic (i.e., a time interval where data is collected periodically). 7/4/2016 6TH INFOCOM SECURITY 16

(U)SimMonitor Prerequisite (U)SimMonitor requires root privileges in order to execute AT commands (U)SimMonitor delivers a payload Exploits discovered vulnerabilities to automatically obtain root permissions Provides privilege escalation Many devices are already rooted 7/4/2016 6TH INFOCOM SECURITY 17

(U)SimMonitor Properties It runs in the background, while the user can normally operate his/her phone It uses the least possible resources of the modem It avoids blocking accidently a voice/data communication It has been designed to collect data transparently, without disrupting the proper operation of the phone 7/4/2016 6TH INFOCOM SECURITY 18

(U)SimMonitor detection We tested five popular mobile antivirus (AV) products whether they are capable of recognizing it as a virus None of the tested AVs raised an alarm We believe that AV products should include the syntax of AT commands as signatures for their virus databases 7/4/2016 6TH INFOCOM SECURITY 19

(U)SimMonitor Impact and Criticality Using IMSI and TMSI identities an attacker can identify the victim user Using the location/routing area and Cell-ID parameters an attacker can approximately track victim s movements Using the obtained encryption keys (i.e., Kc, Kc GPRS, CK, IK) an attacker may disclose phone calls and data session, regardless of the strength of the employed cryptographic algorithm Eliminates the need of breaking the security of the employed cryptographic algorithms the encryption keys are in the possession of the attacker Comprises a threat for all mobile network technologies, even for the security enhanced LTE networks it renders inadequate all possible security measures that can be taken from the mobile operator 7/4/2016 6TH INFOCOM SECURITY 20

(U)SimMonitor white hat use (U)SimMonitor can be used to capture and analyze the security policy that a cellular operator enforces A functionality which is currently missing from Android and iphone devices. Is ciphering disabled? How often the encryption keys are refreshed? How often the temporary identities are updated? Paves the way for quantitative risk assessment 7/4/2016 6TH INFOCOM SECURITY 21

Employed technologies by Greek mobile operators 7/4/2016 6TH INFOCOM SECURITY 22

AKA execution 7/4/2016 6TH INFOCOM SECURITY 23

IMSI requests 7/4/2016 6TH INFOCOM SECURITY 24

TMSI reallocation 7/4/2016 6TH INFOCOM SECURITY 25

(U)SimMonitor Video Demo 7/4/2016 6TH INFOCOM SECURITY 26

Contact Dr. Georgios Karopoulos Department of Informatics and Telecommunications University of Athens http://www.di.uoa.gr/~gkarop E-mail: gkarop@di.uoa.gr [1] Christos Xenakis, Christoforos Ntantogian. "Attacking the baseband modem of mobile phones to breach the users' privacy and network security." In Cyber Conflict: Architectures in Cyberspace (CyCon), 2015 7th International Conference on, pp. 231-244. IEEE, 2015. [2] Christos Xenakis, Christoforos Ntantogian, Orestis Panos, (U)SimMonitor: a mobile application for security evaluation of cellular networks, Computers & Security, Available online 31 March 2016, ISSN 0167-4048, http://dx.doi.org/10.1016/j.cose.2016.03.005. 7/4/2016 6TH INFOCOM SECURITY 27