SS7: Locate. Track. Manipulate.



Similar documents
Worldwide attacks on SS7 network

Locating Mobile Phones using Signalling System #7. Tobias Engel

Protecting Mobile Networks from SS7 Attacks. Telesoft White Papers

Security of phone communications

1 Introduction. 2 Assumptions. Implementing roaming for OpenBTS

Global System for Mobile Communication Technology

SIGNALING SYSTEM 7 (SS7) SECURITY REPORT

TELECOMMUNICATIONS REGULATORY AUTHORITY BAHRAIN. Bahrain Number Portability Implementation Routing and Charging specification

GSM and IN Architecture

Mobile Communications

SS7 & LTE Stack Attack

An Oracle White Paper December The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks

Mobile Application Part protocol implementation in OPNET

Digital Communications Exploring SS7 signaling fraud that threatens mobile network security and subscriber privacy

Advanced SIP Series: SIP and 3GPP Operations

Chapter 10 VoIP for the Non-All-IP Mobile Networks

GSM Research. Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010

Mobile Wireless Overview

Theory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, GSM Location System Syslog XP 3.

2 System introduction

Advanced SIP Series: SIP and 3GPP

Mobile Phone Network Security

Wireless and Mobile Network Architecture

An Oracle White Paper November Typical Key Performance Indicator Reports for Performance Intelligence Centers

End-2-End QoS Provisioning in UMTS networks

Contents VULNERABILITIES OF MOBILE INTERNET (GPRS), 2014

USSD Services for Interactive Mobile Users

SOLUTIONS FOR ROAMING AND INTEROPERABILITY PROBLEMS BETWEEN LTE AND 2G OR 3G NETWORKS

Dialogic Distributed Signaling Interface Protocol Stacks

Mobile Assurance. Centralized Roaming Management System (CRMS) Brochure.

NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications

Securing the Interconnect Signaling Network Security

How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph

Nokia Siemens Networks his 700 Integrated signaling application solutions

Practical Security Testing for LTE Networks BlackHat Abu Dhabi December 2012 Martyn Ruks & Nils

SERVICE PROVIDER ACCESS IN MOBILE NETWORKS. March 2003

OpenBTS and the Future of Cellular Networks

UNDERSTANDING CORE TELECOM SECURITY

ETSI TS V ( )

3GPP Femtocells: Architecture and Protocols. by Gavin Horn

Delivery of Voice and Text Messages over LTE

GSM security country report: USA

Mobile network security report: Poland

GSM security country report: Germany

GSM services over wireless LAN

Security Testing 4G (LTE) Networks 44con 6th September 2012 Martyn Ruks & Nils

GSM and UMTS security

An Example of Mobile Forensics

Mobile Communications Chapter 4: Wireless Telecommunication Systems slides by Jochen Schiller with modifications by Emmanuel Agu

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier

CS Fallback Function for Combined LTE and 3G Circuit Switched Services

LTE Overview October 6, 2011

LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks

Mobility and cellular networks

GSM v. CDMA: Technical Comparison of M2M Technologies

MOBILE CREDIT USING GSM NETWORK TOPUP FOR MOBILE PHONES

Agilent Network Monitoring Content Intercept Manager

GeoMatrix. Positioning of Mobile Phones System

Mobile network security report: Belgium

Mobile network security report: Germany

hubbing international wholesale solutions our solution in brief TDM / IP voice Orange, a major player in the wholesale market

SIP Roaming Server Product Overview. Mobile Convergence Technology

Mobile Security. Practical attacks using cheap equipment. Business France. Presented the 07/06/2016. For. By Sébastien Dudek

Long-Term Evolution. Mobile Telecommunications Networks WMNet Lab

Diameter in the Evolved Packet Core

Ch GSM PENN. Magda El Zarki - Tcom Spring 98

Access Mediation: Preserving Network Security and Integrity

Mobile Networking. SS7 Network Architecture. Purpose. Mobile Network Signaling

The GSM and GPRS network T /301

Utimaco LIMS Access Points. Realtime Network Monitoring for Lawful Interception and Data Retention

Mobile Devices Security: Evolving Threat Profile of Mobile Networks

PRIMARY SECURITY THREATS FOR SS7 CELLULAR NETWORKS

Mobile network security report: Netherlands

ETSI TS V6.5.0 ( )

Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks

Message Generator and Traffic Simulator (MGTS)

Mobile network security report: Poland

Wanderlust: Enabling roaming in the LTE era. Don Troshynski Vice President, Solutions Architecture

UMTS security. Helsinki University of Technology S Security of Communication Protocols

4G Mobile Networks At Risk

1. Public Switched Telephone Networks vs. Internet Protocol Networks

Protocol Signaling Procedures in LTE

FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem

II. Service deployment

Mobility Management 嚴 力 行 高 雄 大 學 資 工 系

ASR 5x00 Series SGSN Authentication and PTMSI Reallocation Best Practices

Introduction to SS7 Signaling This tutorial provides an overview of Signaling System No. 7 (SS7) network architecture and protocols

SERVICE CONTINUITY. Ensuring voice service

WHAT S BEHIND YOUR SMARTPHONE ICONS? A brief tour of behind-the-scenes signaling for multimedia services

Mobile SCTP Transport Layer Mobility Management for the Internet

ETSI ETR 363 TECHNICAL January 1997 REPORT

Cellular Analysis for Legal Professionals Larry E. Daniel Digital Forensic Examiner and Cellular Analyst EnCE, DFCP, BCE, ACE, CTNS, AME

ARCHITECTURES TO SUPPORT PSTN SIP VOIP INTERCONNECTION

GSM Architecture Training Document

LTE Attach and Default Bearer Setup Messaging

EP A1 (19) (11) EP A1 (12) EUROPEAN PATENT APPLICATION. (43) Date of publication: Bulletin 2006/26

Understanding Mobile Terminated Call Failures

Transcription:

You have a remote-controlled tracking device in your pocket Tobias Engel <tobias@ccc.de> @2b_as

2

Signalling System #7 Protocol suite used by most telecommunications network operators throughout the world to talk to each other Standardized in the 1980s in ITU-T Q.700 series When it was designed, there were only few telecoms operators, and they were either state controlled or really big corporations Walled Garden approach: trusted each other, so no authentication built in 3

Signalling System #7 today New protocols added in the 1990s and 2000s by ETSI and 3GPP to support mobile phones and the services they need (roaming, SMS, data...) Mobile Application Part (MAP) Contains everything mobile phones need that is not call signalling CAMEL Application Part (CAP) New protocol that allows the network operator to build custom services that are not possible with MAP still no authentication for any of this 4

Signalling System #7 today Getting access is easier than ever Can be bought from telcos or roaming hubs for a few hundred euros a month Usually (not always), roaming agreements with other networks are needed, but some telcos are reselling their roaming agreements Some network operators leave their equipment unsecured on the internet Femtocells are part of the core network and have been shown to be hackable 5

SS7 Procotol Stack This talk Mobile Application Part: specifies additional signalling that is ISDN User Part: CAP MAP required for mobile phones (roaming, Call Control SMS, etc.) ISUP TCAP SCCP Signalling Connection Control Part: network layer protocol, contains MTP Level 3 source and destination addresses for MAP messages MTP Level 2 M2UA SCTP MTP Level 1 IP SIGTRAN (example): SS7 transport over IP Ethernet 6

Network overview SMSC SMSC BSC/ RNC SS7 SS7 interconnect SS7 BSC/ RNC HLR HLR Basestation Subsystem Core Network Core Network Basestation Subsystem Carrier A Carrier B This talk 7

Network overview Home Location Register Database containing all data on a subscriber: SMSC SMSC phone number post-paid or pre-paid contract BSC/ RNC SS7 SS7 interconnect SS7 BSC/ RNC calls / text messages / data allowed? HLR HLR call forwardings Basestation Subsystem where is the subscriber, Core Network Core Network Basestation Subsystem i.e. that is Carrier A currently serving the Carrier B subscriber... 8

Network overview Home Location Register Database containing all data on a subscriber: SMSC SMSC phone number post-paid or pre-paid contract BSC/ RNC SS7 SS7 interconnect SS7 BSC/ RNC Visitor Location Register calls / text messages / data allowed? HLR HLR Database close to subscribers current geographical location call forwardings Basestation Subsystem... where is the subscriber, i.e. that is Carrier A currently serving the subscriber Core Network Core Network Receives a copy of subscribers data from HLR Mobile Switching Center Basestation Subsystem Carrier B Switch that routes calls/sms/ data to/from subscribers phone Co-located with 9

Network overview +491700140000 +13123149810 SMSC SMSC +491710760000 +12404494110 BSC/ RNC SS7 SS7 interconnect SS7 BSC/ RNC Basestation Subsystem +491700360000 HLR +491700960314 Core Network HLR Core Network +12404493120 +12404494085 Basestation Subsystem Carrier A Adressing by Global Title (looks like an international phone number) Carrier B 10

Cell-Level Tracking The network needs to know which base station ( cell ) is closest to the subscriber to deliver calls, SMS... If you can find out the ID of that cell, it s geographical position can be looked up in one of several databases The location of the cell tower is also a good approximation of the subscriber s location In cities, cell towers are so close that subscriber tracking down to street level is possible 11

Commercial Tracking Providers Several commercial providers offer cell-level tracking as service, claim coverage of about 70% of worldwide mobile subscribers (with some restrictions...) Only the MSISDN (phone number) is required to locate a subscriber 12

Cell Level Tracking with SS7/MAP MAP s anytimeinterrogation (ATI) service can query the subscriber s HLR for her Cell-Id and IMEI (phone serial number, can be used to look up phone type) Home network Visited network HLR anytimeinterrogation req providesubscriberinfo req Paging Request anytimeinterrogation resp providesubscriberinfo resp Paging Response 13

Cell Level Tracking with SS7/MAP Only meant as a network-internal service (e.g. to implement home zones ). External networks should not be able to invoke it but still... 14

Cell Level Tracking with SS7/MAP Many networks actually block ATI by now Home network Visited network HLR anytimeinterrogation req returnerror ati-not-allowed 15

Cell Level Tracking with SS7/MAP Instead, query the directly But use IMSIs (International Mobile Subscriber Identifiers), not phone numbers, to identify subscribers ask the HLR for the subscriber s IMSI and Global Title of the current Home Visited network network HLR sendroutinginfoforsm req sendroutinginfoforsm resp 16

Cell Level Tracking with SS7/MAP When the attacker knows the IMSI of the subscriber and the Global Title, the can be asked for the cell id of the subscriber Home network Visited network HLR sendroutinginfoforsm req sendroutinginfoforsm resp providesubscriberinfo req Paging Request providesubscriberinfo resp Paging Response 17

Cell Level Tracking with SS7/MAP Works for a lot of networks Most /MSC accept requests from anywhere no plausibility checks 18

Real-life tracking We tracked some folks (but only after asking for permission) For about two weeks, cell id was queried once per hour Many, many thanks to Sascha for his work on the maps! 19

Observations of a German network operator The Operator started filtering all network-internal messages at the network s borders This (combined with SMS home routing, which the operator has in place) essentially eliminated the simple form of tracking as seen before Attack traffic dropped more than 80%: Some of that traffic was due to misconfiguration at other networks Commercial use cases: - - a shipping company was tracking its vehicles an SMS service provider for banks who use text messages as a second form of authentication (mtan) was using the MAP sendimsi request to find out if the SIM was recently swapped 20

Observations of a German network operator Some of the network operators where the attacks originated either did not respond or played dumb when the issue was addressed by the German operator The operator believes that those attacks are being performed by state actors or the other network s operators themselves Some attacks are still happening, which requires other information sources or brute-forcing to get /MSC and IMSI 21

Location Services (LCS) In the US, E911 mandates: Wireless network operators must provide the latitude and longitude of callers within 300 meters, within six minutes of a request by a Public Safety Answering Point LCS can use triangulation to further narrow down a subscriber s position or even request a GPS position from the phone (via RRLP) Emergency services request a subscriber s location from the Gateway Mobile Location Center (GMLC) GMLC requires authentication 22

Location Services (LCS) 3GPP TS 23.271 version 11.2.0 Release 11 66 ETSI TS 123 271 V11.2.0 (2013-04) E.g. police Client GMLC HLR/ HSS V MSC SERVER RAN UE 1. LCS Service Request 2. Provide Subscriber Location Requires authentication 3. Location Request 4. Messages for individual positioning methods 5. Location Report 7. LCS Service Response 6. Provide Subscriber Location ack. Figure 9.3: Positioning for a Emergency Services MT-LR without HLR Query 1) Same as step 1 in figure 9.1 but with SS7: the Locate. LCS client Track. (PSAP) Manipulate. identifying first the target UE and the serving V- GMLC by previously supplied correlation information for the emergency call. 23

Location Services (LCS) 3GPP TS 23.271 version 11.2.0 Release 11 66 ETSI TS 123 271 V11.2.0 (2013-04) E.g. police Client GMLC HLR/ HSS V MSC SERVER RAN UE 1. LCS Service Request 2. Provide Subscriber Location Requires authentication 3. Location Request 4. Messages for individual positioning methods Does not require authentication (but verifies sender address) 5. Location Report 7. LCS Service Response 6. Provide Subscriber Location ack. Figure 9.3: Positioning for a Emergency Services MT-LR without HLR Query 1) Same as step 1 in figure 9.1 but with SS7: the Locate. LCS client Track. (PSAP) Manipulate. identifying first the target UE and the serving V- GMLC by previously supplied correlation information for the emergency call. 24

Location Services (LCS) Authentication at the GMLC can also be circumvented by directly querying the Home network Visited network HLR sendroutinginfoforsm req sendroutinginfoforsm resp providesubscriberlocation req RRLP Requests providesubscriberlocation resp 25

Verifying the sender, MAP-style CAP MAP TCAP SCCP Routing of MAP messages happens in the SCCP layer Requests get routed to the Called Party Address (e.g. the address of an ) Responses will be sent back to the Calling Party Address from the request 26

Verifying the sender, MAP-style Problem: SCCP doesn t know anything about MAP or what entities should be able to use which MAP services Solution : Response will be routed to this address Have the sender(!) put another copy of its Calling Party Address in an extra field in the MAP layer, so it can be verified Routing will still happen to addresses from the network layer This address gets verified 27

Verifying the sender, MAP-style If we tell the truth: Same address 28

Verifying the sender, MAP-style If we enter an address from the same network that we sent the request to: Similar addresses Response still gets routed back to this address 29

Denial of Service It is not only possible to read subscriber data - it can also be modified, since most network s /MSC don t do any plausibility checks Control every aspect of what a subscriber is allowed to do: enable or disable incoming and/or outgoing calls / SMS or data or delete the subscriber from the altogether Visited network Get IMSI / address from HLR insertsubscriberdata req deletesubscriberdata req / cancellocation req X 30

CAMEL??? Customised Applications for Mobile networks Enhanced Logic Specified in 3GPP TS 23.078 Like an overlay over usual MAP logic Defines a set of events, for which the should contact the CAMEL entity in the subscriber s home network (gsmscf = GSM Service Control Function) The gsmscf then decides if the desired action can continue unmodified or modified or will be aborted 31

CAMEL Example: German subscriber is roaming in France German HLR tells French notify my gsmscf at address +4917... whenever the subscriber wants to make a call Home network Visited network HLR gsm SCF insertsubscriberdata req with gsmscf address and list of events to report ( Detection Points ) 32

CAMEL Subscriber wants to make a phone call, but dials number in German national format (0317654...) MSC asks gsmscf in home network what to do with the call gsmscf rewrites number to international format (+49317654...) and tells MSC to continue with the new number Home network Visited network HLR gsm SCF initialdp 0317654... connect +49317654... Setup 0317654... Call setup to rewritten number 33

Intercepting calls with CAMEL Attacker overwrites gsmscf address in subscriber s with it s own, fake gsmscf address Caller network insertsubscriberdata req with address of attacker as gsmscf 34

Intercepting calls with CAMEL Subscriber wants to call +345678..., but the MSC now contacts the attacker instead of the subscriber s gsmscf Caller network +210987... +345678... Setup +345678... initialdp +345678... 35

Intercepting calls with CAMEL Attacker rewrites number to +210987..., his recording proxy (e.g. an Asterisk PBX) Caller network +210987... +345678... Setup +345678... initialdp +345678... connect +210987... 36

Intercepting calls with CAMEL MSC sets up call to +210987..., which bridges it to the original +345678... Both subscribers can talk to each other, while the attacker records the conversation Caller network +210987... +345678... Setup +345678... initialdp +345678... connect +210987... Voicecall to +210987... Voicecall to +345678... 37

HLR: Location Update When a subscriber travels to another region or country, the /MSC sends a MAP updatelocation request to the subscriber s HLR Home network Visited network HLR updatelocation req Location Updating Request 38

HLR: Update Location The HLR sends a copy of the subscriber s data to the /MSC and saves the address of the /MSC Home network Visited network HLR updatelocation req Location Updating Request Saves address insertsubscriberdata req 39

HLR: Update Location Now, when somebody wants to call or text the subscriber, the HLR gets asked for routing information (sendroutinginfo...) and hands out the address of the / MSC Some network Home network Visited network SMSC HLR sendroutinginfoforsm req sendroutinginfoforsm resp mt-forwardsm req SMS-DELIVER 40

HLR: Stealing Subscribers The updatelocation procedure is also not authenticated An attacker can simply pretend that a subscriber is in his network by sending the updatelocation with his Global Title to the subscriber s HLR Some network SMSC Home network HLR Visited network X Saves attacker s address updatelocation req insertsubscriberdata req 41

HLR: Stealing Subscribers Now, calls and SMS for that subscriber are routed to the attacker Example: Subscriber s bank sends text with mtan. Attacker intercepts message and transfers money to his own account Some network SMSC Home network HLR Visited network X sendroutinginfoforsm req sendroutinginfoforsm resp mt-forwardsm req 42

HLR: Supplementary Services USSD codes can be executed for other subscribers Some carriers offer transfer of prepaid credits via USSD Call forwardings can be set/deleted An attacker could forward a subscriber s calls to a premium rate number controlled by him and then call the subscriber s number, billing all the premium rate calls to the subscriber Switch active SIM in case of Multi-SIM 43

HLR: Supplementary Services Requests can even be sent without a previous updatelocation procedure, because the HLR does not check if the subscriber is in the network that is sending the request 44

Hybrid Attacks: TMSI De-anonymization An attacker can find out the phone numbers of subscribers around him: Paging of subscribers (e.g. to notify them of an incoming call) has to happen unencrypted TMSI (Temporary Mobile Subscriber Identifier) is normally used for paging so that the real identity of the subscriber (IMSI) does not have to be sent over the air unencrypted Paging Request contains TMSI 45

Hybrid Attacks: TMSI De-anonymization Attacker captures TMSI over the air, e.g. with OsmocomBB Paging Request contains TMSI 46

Hybrid Attacks: TMSI De-anonymization The MSC can be asked to hand out the IMSI if the TMSI is known With updatelocation, the attacker can figure out the MSISDN belonging to the IMSI Paging Request contains TMSI sendidentification req sendidentification resp containing IMSI 47

Hybrid Attacks: Intercept Calls The MSC can be also be asked for the session key for of the subscriber! sendidentification req with TMSI sendidentification resp containing session keys 48

Hybrid Attacks: Intercept Calls If the attacker captures an encrypted GSM or UMTS call, he can then decrypt it using the session key Passive attack, no IMSI catcher necessary sendidentification req with TMSI sendidentification resp containing session keys Voicecall 49

LTE LTE uses the Diameter protocol in the core network SS7 is becoming a legacy protocol, but: A lot of the SS7 design has been ported to Diameter, including its flaws E.g. there is still no end-to-end authentication for subscribers GSM/UMTS (and with them SS7) will be around for a long time to come (probably around 20 years) To be able to have connections from GSM/UMTS to LTE, there are interfaces mapping most of the SS7 functionality (including its flaws) onto Diameter 50

Summary An attacker needs SS7 access and (most of the time) SCCP roaming with his victim s network Then, with only his victim s phone number, he can Track his victim s movements (in some networks with GPS precision) Intercept his victim s calls, text messages (and probably data connections, not verified) Disable calls, SMS, data Re-route calls, at the victim s expense With only a TMSI, captured over the air interface, he can decrypt calls captured off the air (GSM, UMTS) find out the IMSI and phone number belonging to the TMSI 51

Countermeasures (for operators) Network operators should remove all necessities to hand out a subscriber s IMSI and current /MSC to other networks With SMS Home Routing, all text messages traverse an SMS router in the subscriber s home network When the HLR receives sendroutinginfoforsm request, it only needs to hand out the address of the SMS router instead of the MSC address Instead of the subscriber s IMSI, only a correlation id will be returned (that can be resolved by the SMS router) All MAP and CAP messages only needed internally in the network should be filtered at the network s borders If Optimal Routing is not used, sendroutinginfo (the one for voice calls, another source of MSC and IMSI), can also be filtered 52

Countermeasures (for subscribers) Tell your operator to take action Throw away phone (Sorry, there really isn t that much you can do) 53

Thank you! Questions? Tobias Engel <tobias@ccc.de> @2b_as 54

References Verint Skylock product brochure: http://apps.washingtonpost.com/g/page/business/skylock-product-description-2013/1276/ Defentek Infiltrator product brochure: http://infiltrator.mobi/infiltrator.pdf Signalling System #7, ITU-T Q.700 series: http://www.itu.int/rec/t-rec-q/e Mobile Application Part (MAP) specification, 3GPP TS 29.002: http://www.3gpp.org/ftp/specs/archive/29_series/29.002/ CAMEL Phase 4; Stage 2: 3GPP TS 23.078: http://www.3gpp.org/ftp/specs/archive/23_series/23.078/ CAMEL Application Part (CAP) specification, 3GPP TS 29.078: http://www.3gpp.org/ftp/specs/archive/29_series/29.078/ Washington Post, For sale: Systems that can secretly track where cellphone users go around the globe: http://wapo.st/ 1qavLmF Functional stage 2 description of Location Services (LCS), 3GPP TS 23.271: http://www.3gpp.org/ftp/specs/archive/ 23_series/23.271/ osmocombb: http://bb.osmocom.org/trac/ Evolved Packet System (EPS): MME and SGSN related interfaces based on Diameter protocol, 3GPP TS 29.272: http:// www.3gpp.org/ftp/specs/archive/29_series/29.272/ Study into routeing of MT-SMs via the HPLMN, 3GPP TR 23.840: http://www.3gpp.org/ftp/specs/archive/23_series/23.840/ Sergey Puzankov and Dmitry Kurbatov, How to Intercept a Conversation Held on the Other Side of the Planet: http:// www.slideshare.net/phdays/phd4-pres-callinterception119 55