Mobile network security report: Norway



Similar documents
Mobile network security report: Greece

Mobile network security report: Belgium

Mobile network security report: Poland

Mobile network security report: Germany

Mobile network security report: Netherlands

GSM security country report: USA

GSM security country report: Germany

Mobile network security report: Poland

Defending mobile phones. Karsten Nohl, Luca Melette,

An Example of Mobile Forensics

UMTS security. Helsinki University of Technology S Security of Communication Protocols

GSM and UMTS security

Mobile self- defense. Karsten Nohl SRLabs Template v12

SPYTEC 3000 The system for GSM communication monitoring

Mobile Phone Security. Hoang Vo Billy Ngo

GSM Risks and Countermeasures

SENSE Security overview 2014

BitSight Insights Global View. Revealing Security Performance Metrics Across Major World Economies

GSM Research. Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010

Network Security. Chapter 14. Security Aspects of Mobile Communications

Security Requirements for Wireless Networking

(U)SimMonitor: A Mobile Application for Security Evaluation of Cellular Networks

Mobile Security. Practical attacks using cheap equipment. Business France. Presented the 07/06/2016. For. By Sébastien Dudek

Worldwide attacks on SS7 network

Using an approximated One-Time Pad to Secure Short Messaging Service (SMS)

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

USB Portable Storage Device: Security Problem Definition Summary

Encrypted SMS, an analysis of the theoretical necessities and implementation possibilities

ASR 5x00 Series SGSN Authentication and PTMSI Reallocation Best Practices

PM ASSIGNMENT. Security in Mobile Telephony and Voice over IP

Attacking Automatic Wireless Network Selection. Dino A. Dai Zovi and Shane A. Macaulay

Transmission Security (TRANSEC) in an IP-based VSAT Architecture. February 2011

Ch GSM PENN. Magda El Zarki - Tcom Spring 98

IMSI Catcher. Daehyun Strobel. 13.Juli Seminararbeit Ruhr-Universität Bochum. Chair for Communication Security Prof. Dr.-Ing.

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Security of phone communications

Security Issues with the Military Use of Cellular Technology Brad Long, Director of Engineering, IFONE, Inc.

1 Introduction. 2 Assumptions. Implementing roaming for OpenBTS

USB Portable Storage Device: Security Problem Definition Summary

CSCE 465 Computer & Network Security

GSM Databases. Virginia Location Area HLR Vienna Cell Virginia BSC. Virginia MSC VLR

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Chapter 17. Transport-Level Security

Reviving smart card analysis

introduction to femtocells

Karsten Nohl, Breaking GSM phone privacy

Security Advisory Relating to OpenSSL Vulnerability Heartbleed on Various Polycom Products

Theory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, GSM Location System Syslog XP 3.

Implementing Security Update Management

RADIUS. Brief brochure. Product Purpose

How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph

Security Protocols/Standards

GSM GSM TECHNICAL November 1996 SPECIFICATION Version 5.0.0

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

The GSM and GPRS network T /301

TECHNICAL WHITE PAPER. TLS encryption: Is it really the answer to securing ?

GSM Network and Services

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Mobile Wireless Overview

SS7: Locate. Track. Manipulate.

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Global System for Mobile Communications (GSM)

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

The Trivial Cisco IP Phones Compromise

IPsec Details 1 / 43. IPsec Details

An Oracle White Paper December The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks

Security in cellular-radio access networks

dect provides high protection against unauthorized access

Three attacks in SSL protocol and their solutions

!!! "# $ % & & # ' (! ) * +, -!!. / " 0! 1 (!!! ' &! & & & ' ( ' 3 ' Giuseppe Bianchi

Karsten Nohl, Chris Paget 26C3, Berlin GSM SRSLY?

Understanding Mobile Terminated Call Failures

Wireless security (WEP) b Overview

Security in the smart grid

INSTANT MESSAGING SECURITY

CS549: Cryptography and Network Security

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Security in the GSM Network

Evaluating GSM A5/1 security on hopping channels

Security Evaluation of CDMA2000

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Man-in-the-Middle Attack on T-Mobile Wi-Fi Calling

Protocol Rollback and Network Security

TCG Trusted Network Connect IF-MAP Metadata for ICS Security. Document Draft Comments. Prepared by Joseph J. Januszewski, III, CISSP

Notes on Network Security - Introduction

EnergyAxis System: Security for the Smart Grid

TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and Control (NFCC) - Stage 1 Requirements

Monitoring mobile communication network, how does it work? How to prevent such thing about that?

Criteria for web application security check. Version

GeoMatrix. Positioning of Mobile Phones System

Solutions to Problem Set 1

SANS Security 528 CASP Practice Exam

Where every interaction matters.

Message Authentication Codes. Lecture Outline

Proxies. Chapter 4. Network & Security Gildas Avoine

The Misuse of RC4 in Microsoft Word and Excel

Authentication in WLAN

Transcription:

Mobile network security report: Norway GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin August 2014 Abstract. Mobile networks differ widely in their protection capabilities against common attacks. This report details the protection capabilities of three mobile networks in Norway. All of the networks have implemented reasonable protection against passive 2G intercept attacks. NetCom and Network Norway 2G users are predominantly using latest encryption technology. Impersonating 2G users of Network Norway is possible with simple tools. Network Norway allows user tracking.

Contents 1 Overview 2 2 Protection measures 3 3 Attack scenarios 4 3.1 Passive intercept.................................. 4 3.2 Active intercept.................................. 5 3.3 Impersonation................................... 6 3.4 User tracking................................... 6 4 Conclusion 6 1 Overview Protection dimension (higher means better) Operator Intercept Impersonation Tracking NetCom 2G 74% 79% 62% Network Norway 2G 63% 55% 45% Telenor 2G 67% 77% 83% Table 1: Implemented protection features relative to 2014 best practices (according to SRLabs GSM metric v2.5) Disclaimer. This report was automatically generated using data submitted to gsmmap.org by volunteers. (Thank you!) The analysis does not claim accuracy. Please do not base far-reaching decisions on the conclusions provided herein, but instead verify them independently. If you detect inaccuracies, we are looking forward to hearing from you. This document provides a security analysis of Norway s three mobile networks, based on data collected between January 2012 and August 2014. The analysis is based on data samples submitted to the GSM Map project 1. It compares implemented protection features across networks. The GSM Map website reports protection features condensed into three dimensions as shown in Table 1. This report details the logic behind the analysis results, lists some of the implemented protection features, and maps the protection capabilities to popular attack tools. 1 GSM Map Project: https://gsmmap.org Mobile network security report: Norway Page 2

C The SRLabs network security metric condenses a7ack vectors and mi9ga9ons Risk category Risks Components Mitigations Intercept (2G) Impersonation (2G) Tracking Intercept voice Intercept SMS Make calls illegitimately Receive victim s calls Local tracking Global tracking Predict freq s Crack keys in real time Crack keys offline Reuse cracked keys Track IMSI/ TMSI HLR location finding SRLabs Metric v2.0 Hopping entropy A5/3 Padding randomization A5/3 Padding randomization SI randomization Update key in each transaction Update TMSI in each transaction Encrypt location updates (preferably with A5/3) Always encrypt IMSI Hide MSC and IMSI in HLR responses Figure 1: Best practice protection measures can mitigate three attack scenarios. 0 2 Protection measures The SRLabs GSM security metric is built on the understanding that mobile network subscribers are exposed to three main risks: Intercept. An adversary records calls and SMS from the air interface. Decryption can be done in real time or as a batch process after recording transactions in bulk. Impersonation. Calls or SMS are either spoofed or received using a stolen mobile identity. Tracking. Mobile subscribers are traced either globally using Internet-leaked information or locally by repeated TMSI pagings. The SRLabs metric traces these three risks to an extensive list of protection measures, some of which are listed in Figure 1. Table 2 details the implementation depth of some of the mitigation measures present in Norway s mobile networks. Mobile network security report: Norway Page 3

Attack vector Networks NetCom Network Norway Telenor 2G Over-the-air protection - Encryption algorithm A5/1 27% 33% 58% A5/3 73% 67% 42% - Padding randomization - SI randomization - Require IMEI in CMC - Hopping entropy - Authenticate calls (MO) 95% 47% 97% - Authenticate SMS (MO) 95% 56% 97% - Authenticate paging (MT) 95% 40% 95% - Authenticate LURs 100% 50% 94% - Encrypt LURs 100% 100% 100% - Update TMSI 3% 3% 40% HLR/VLR configuration - Mask MSC - Mask IMSI Table 2: Protection measures implemented in analyzed networks, compared to best practice references observed in 2014. 3 Attack scenarios The protection measures impact the effectiveness of various common mobile network attack tools. 3.1 Passive intercept Passive 2G intercept requires two steps: First, all relevant data needs to be intercepted. This step cannot be prevented completely, but aggravated significantly by using less predictable frequency hopping sequences. All 2G networks in Norway use such less predictable hopping sequences. Secondly, the intercepted call and SMS traces need to be decrypted. In 2G networks, this can be prevented by hardening the A5/1 cipher or by upgrading to modern encryption algorithms. Hardening the A5/1 cipher. The A5/1 cipher was developed in 1987 and is still the most common encryption algorithm for 2G calls. First weaknesses of this cipher were discussed in 1994 2, but it took until the mid-2000 s until successfull attacks on 2G were demonstrated publicly. 2 See https://groups.google.com/forum/#!msg/uk.telecom/tkdcaytoeu4/mroy719hdroj Mobile network security report: Norway Page 4

These attacks exploit (partially) known plaintexts of the encrypted GSM messages to derive the encryption key. Consequently, countermeasures need to reduce the number of predictable bits in 2G frames. Nowadays, several generations of passive A5/1 decipher units exist, that attack different parts of the transaction. Early generation boxes attack the Cipher Mode Complete message. Telenor generally protects from these boxes. NetCom and Network Norway are fully vulnerable (Require IMEI in CMC). More modern decipher units leverage predictable Null frames. These Null frames contain little to no relevant information and are filled up with a fixed uniform padding, facilitating knownplaintext attacks. Network Norway and Telenor offer no attack surface through predictable null frames. NetCom is particularly prone to this type of attack. Recently updated intercept boxes further leverage System Information (SI) messages. These messages can be randomized, or not sent at all during encrypted transactions (SI randomization). NetCom and Network Norway have deployed no protection against this type of attack. Upgrading to modern encryption algorithms. With the introduction of 3G mobile telecommunications technology, the A5/3 cipher was introduced to 2G standards. Only theroretical attacks on this cipher were so far presented publicly, none of which have practical significance. Modern phones can use this cipher for 2G communication, if the network supports it. With passive intercept being prevented, attackers must use active intercept equipment, e.g. fake base stations, as described in Section 3.2. All 2G networks in Norway have begun rolling out A5/3. To intercept subscribers of all 2G networks in Norway in A5/3-enabled areas, attackers will need to use active equipment. 3.2 Active intercept Attacks through fake 2G base stations can be prevented to different degrees, based on what the fake base station is used for: Location finding: In this attack scenario, a phone is lured onto a fake station so that the phone s exact location can be determined. This scenario occurs independent of the phone network and hence cannot be prevented through network protection measures. Outgoing call/sms intercept: A fake base station can proxy outgoing connections. In this attack, connectivity to the real network is not necessarily required, so no protection can be achieved from outside the phone. Encrypted call/sms intercept: Modern fake base stations execute full man-in-the-middle attacks in which connections are maintained with both the phone and the real network. Networks can make such active attacks more difficult with a combination of two measures: First, by not allowing unencrypted calls. Secondly, by decreasing the authentication time given to an attacker to break the encrytion key. This timeout can be as much as 12 seconds according Mobile network security report: Norway Page 5

to common standards. The GSM Map database currently lacks reliable data on authentication times in Norway. All 2G networks in Norway use encryption in all 2G call and SMS transactions. However, the GSMmap currently lacks data to decide whether the networks would accept subscriber-originated unencrypted transactions as well. 3.3 Impersonation Mobile identities can (temporarily) be hijacked using specific attack phones. These phones require the authentication key deciphered from one transaction. They use this key to start a subsequent transaction. The obvious way to prevent this attack scenario is by requiring a new key in each transaction (Authenticate calls/sms). In Norway, 2G call impersonation is possible against Network Norway. The same is possible for SMS messages from Network Norway. 3.4 User tracking Mobile networks are regularly used to track people s whereabouts. Such tracking occurs at two different granularities: Global tracking: Internet-accessible services disclose the general location of GSM customers with granularity typically on a city level. The data is leaked to attackers as part of SMS delivery protocols in form of the MSC address (Mask MSC). NetCom and Telenor suppress MSC information for their customers in Norway. Network Norway allows MSCbased tracking. In addition, users IMSI s can leak in HLR requests. All 2G networks in Norway protect this information. Local tracking: Based on TMSI identifiers, users association with location areas and specific cells can be tracked, providing a finer granularity than MSC-based tracking, but a less fine granularity than location finding with the help of fake base stations. IMSI-based tracking is made more difficult by changing the TMSI in each transaction (Update TMSI). All 2G networks in Norway have not addressed this threat thoroughly. 4 Conclusion The mobile networks in Norway implement only few of the protection measures observed in other networks. All 2G networks in Norway have begun upgrading their network to the more secure A5/3 encryption algorithm. NetCom and Telenor are protecting their subscribers particularly well against tracking. The evolution of mobile network attack and defense techniques is meanwhile progressing further: Modern A5/1 deciphering units are harvesting the remaining non-randomized frames and thanks Mobile network security report: Norway Page 6

to faster computers are achieving high intercept rates again. The 3GPP, on the other hand, already completed standard extensions to reduce A5/1 attack surface to a minimum. These standards from 2009 are only hesitantly implemented by equipment manufacturers, leaving users exposed to phone intercept risks. The available protection methods even when implemented in full are barely enough to protect users sufficiently. A stronger push for implementing modern protection measures is needed to revert this erosion of mobile network security. Mobile network security report: Norway Page 7