Worldwide attacks on SS7 network



Similar documents
SS7: Locate. Track. Manipulate.

Protecting Mobile Networks from SS7 Attacks. Telesoft White Papers

Digital Communications Exploring SS7 signaling fraud that threatens mobile network security and subscriber privacy

Locating Mobile Phones using Signalling System #7. Tobias Engel

1 Introduction. 2 Assumptions. Implementing roaming for OpenBTS

Global System for Mobile Communication Technology

SS7 & LTE Stack Attack

Contents VULNERABILITIES OF MOBILE INTERNET (GPRS), 2014

Mobile Communications

TELECOMMUNICATIONS REGULATORY AUTHORITY BAHRAIN. Bahrain Number Portability Implementation Routing and Charging specification

How to secure an LTE-network: Just applying the 3GPP security standards and that's it?

SIGNALING SYSTEM 7 (SS7) SECURITY REPORT

Securing the Interconnect Signaling Network Security

SMS SS7 Fraud February 2005

UNDERSTANDING CORE TELECOM SECURITY

Control Traffic from Grey Routes and Boost Enterprise Messaging Revenue

EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server

An Oracle White Paper November Typical Key Performance Indicator Reports for Performance Intelligence Centers

GSM v. CDMA: Technical Comparison of M2M Technologies

Wireless and Mobile Network Architecture

An Oracle White Paper December The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks

hubbing international wholesale solutions our solution in brief TDM / IP voice Orange, a major player in the wholesale market

An Example of Mobile Forensics

How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph

Nokia Siemens Networks his 700 Integrated signaling application solutions

Mobile Application Part protocol implementation in OPNET

USSD Services for Interactive Mobile Users

FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem

The GSM and GPRS network T /301

LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks

ETSI ETR 363 TECHNICAL January 1997 REPORT

Mobility Management 嚴 力 行 高 雄 大 學 資 工 系

End-2-End QoS Provisioning in UMTS networks

4G Mobile Networks At Risk

Global System for Mobile Communications (GSM)

Chapter 10 VoIP for the Non-All-IP Mobile Networks

Mobile Networking. SS7 Network Architecture. Purpose. Mobile Network Signaling

Advanced SIP Series: SIP and 3GPP Operations

SIP Roaming Server Product Overview. Mobile Convergence Technology

Application Firewalls

TS-3GB-S.R0103-0v1.0 Network Firewall Configuration and Control (NFCC) - Stage 1 Requirements

LTE Overview October 6, 2011

Voice over IP over LTE (VoLTE) Impacts on LTE access. EFORT

@msecnet / Bogdan ALECU

Philippe Langlois, P1 Security Inc.

Mobile network security report: Poland

Intro to Firewalls. Summary

Utimaco LIMS Access Points. Realtime Network Monitoring for Lawful Interception and Data Retention

Access Mediation: Preserving Network Security and Integrity

ETSI TS V9.0.0 ( ) Technical Specification

How To Understand The Gsm And Mts Mobile Network Evolution

UMTS security. Helsinki University of Technology S Security of Communication Protocols

of the existing VoLTE roaming and interconnection architecture. This article compares existing circuit-switched models with the earlier

GSM services over wireless LAN

Theory and Practice. IT-Security: GSM Location System Syslog XP 3.7. Mobile Communication. December 18, GSM Location System Syslog XP 3.

Introduction. Channel Associated Signaling (CAS) Common Channel Signaling (CCS) Still widely deployed today Considered as old technology

GSM and IN Architecture

VOICE OVER IP SECURITY

3GPP Femtocells: Architecture and Protocols. by Gavin Horn

CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

Mobility Management usually includes two parts: location management and handoff management.

ETNO Expert Contribution on Data retention in e- communications - Council s Draft Framework Decision, Commission s Proposal for a Directive

STAR-GATE TM. Annex: Intercepting Packet Data Compliance with CALEA and ETSI Delivery and Administration Standards.

Telecommunication Origin Identification. Jie Zhang Vice chair, ITU-T SG2

Security researcher at P1 Security. Hacking Telco equipment: The HLR/HSS Laurent Ghigonis P1 Security

ETSI TS V6.5.0 ( )

Mobile Security. Practical attacks using cheap equipment. Business France. Presented the 07/06/2016. For. By Sébastien Dudek

Mobile network security report: Germany

Mobile network security report: Belgium

!!! "# $ % & & # ' (! ) * +, -!!. / " 0! 1 (!!! ' &! & & & ' ( ' 3 ' Giuseppe Bianchi

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

GSM security country report: USA

1 Community : SDM Subscribers Data Management. 1.1 Level : Aware TAP Mobile core network introduction

NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications

The Intel NetStructure SIU520 Signaling Interface

Advanced SIP Series: SIP and 3GPP

introduction to femtocells

Chapter 8 Security Pt 2

Jarkko Kuisma

ASR 5x00 Series SGSN Authentication and PTMSI Reallocation Best Practices

Chapter 2 PSTN and VoIP Services Context

GSM GPRS. Course requirements: Understanding Telecommunications book by Ericsson (Part D PLMN) + supporting material (= these slides)

VOIP Attacks On The Rise

Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated

Mobile network security report: Netherlands

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

The Trivial Cisco IP Phones Compromise

Cisco Advanced Services for Network Security

Gateway Security at Stateful Inspection/Application Proxy

Mobile network security report: Poland

1. Public Switched Telephone Networks vs. Internet Protocol Networks

Affording the Upgrade to Higher Speed & Density

Chapter 3: WLAN-GPRS Integration for Next-Generation Mobile Data Networks

IP Link Best Practices for Network Integration and Security. Introduction...2. Passwords...4 ACL...5 VLAN...6. Protocols...6. Conclusion...

Best Practices for Securing IP Telephony

Guidance Regarding Skype and Other P2P VoIP Solutions

Transcription:

Worldwide attacks on SS7 network P1 Security Hackito Ergo Sum 26 th April 2014 Pierre-Olivier Vauboin (po@p1sec.com) Alexandre De Oliveira (alex@p1sec.com)

Agenda Overall telecom architecture Architecture diagrams for 2G / 3G Most important Network Elements SS7 stack and interconnections Practical attack scenarios Mapping the SS7 network Tracking user location Sending spoofed SMS Demo

Telecom Overview Evolution from 2G to 3G

Practical Attack Scenarios SS7 Attack Vectors

Agenda Overall telecom architecture Architecture diagrams for 2G / 3G Most important Network Elements SS7 stack and interconnections Practical attack scenarios Mapping the SS7 network Tracking user location Sending spoofed SMS Demo

MSC Mobile Switching Center MSC: 5-50 per MNO Connected to 20-50 BSC In charge of call establishment Interfaces the BSC toward the rest of the network Connects the calls of the mobile users UE is attached to one MSC MAP Protocol Generates CDR (Charging Data Record) Security impact: Key compromise, content compromise, regional DoS, location tracking, Siemens MSC

HLR / HSS Home Location Register Home Subscriber Server HLR: 1-20 per MNO Heart of SS7 / SIGTRAN Subscriber database IMSI Authentication (AuC) : Ki Current subscriber location Supplementary services Queries from international partners (roaming) MAP Protocol Security impact: Key compromise, global DoS NSN HLR / HSS

HLR / HSS Home Location Register Home Subscriber Server I m Root!

Agenda Overall telecom architecture Architecture diagrams for 2G / 3G Most important Network Elements SS7 stack and interconnections Practical attack scenarios Mapping the SS7 network Tracking user location Sending spoofed SMS Demo

Global SS7 network Private and secure SS7 network? Interconnects many actors Different views depending on interconnection point Malicious entry point to SS7 network: Through any unsecure operator and attack other operators from there From Network Element OAM interface exposed on Internet Through compromised Femto Cell and more

SS7 / SIGTRAN Stack Protocol Layers Application Layer SS7 Session Layer Routing Layer Adaptation Layer SIGTRAN SIGTRAN MAP Stack

SS7 / SIGTRAN Stack Addressing schemes In Telecom networks a multitude of addressing schemes are used to identify Network Elements, subscribers, applications International Mobile Subscriber Identity (IMSI) SIM card number International Mobile Equipment Identity (IMEI) Device serial number Mobile Subscriber ISDN Number (MSISDN) Phone number STP SubSystem Number (SSN) Identifies application or service on Network Elements. Equivalent to TCP port. Global Title (GT) Length up to 15 digits. Looks like a phone number. Equivalent to IP address. Point Code (PC) 14 or 24 bits address. Equivalent to MAC address. NE NE SS7 Routing criteria: PC / GT / SSN or combo

Agenda Overall telecom architecture Architecture diagrams for 2G / 3G Most important Network Elements SS7 stack and interconnections Practical attack scenarios Mapping the SS7 network Tracking user location Sending spoofed SMS Demo

Practical Attack Scenarios Scan methodology Abusing legitimate messages (SRISM, SRI, ATI, ) Sending from any international SS7 interconnection Steps: Discovery scan and GT mapping: SCCP + TCAP Advanced attacks: specific MAP messages Targets: Attacking operators infrastructure Attacking subscribers

Discovery phase Finding the first targets Publicly available information International PC lists GT prefix / country / operator Subscriber MSISDN lists Probing from UE SS codes: *#61# Send SMS to your own SMSC to find your current MSC Changing GT prefix length Scan around confirmed targets

Discovery phase TCAP scan example Scan! HLR Found!

2G / 3G Network Mapping Active Network Mapping

Agenda Overall telecom architecture Architecture diagrams for 2G / 3G Most important Network Elements SS7 stack and interconnections Practical attack scenarios Mapping the SS7 network Tracking user location Sending spoofed SMS Demo

Spying on users

Tracking user location Based on non filtered MAP messages SRISM / SRI PSI / PSL ATI Targeted towards HLR or MSC / VLR Accuracy: Depending on type of message allowed MSC GT (Accuracy: City / Region) CellID (Accuracy: Street)

Tracking user location Get MSC / VLR / CellID from SS7 (Example with MAP ATI) 12345000123 VLR GT $ python src/p1ss7ng/mapgsm_cellid.py 02f8xx002c9084 Mobile Country Code (MCC) : 208 (France) Mobile Network Code (MNC) : xx (French Operator) Location Area Code (LAC) : 194 Cell ID : 23 12345000123 MSC GT 02f802002c9084 Cell ID

Tracking user location Open CellID databases

Tracking user location Low accuracy (MSC based location) Source: Tobias Engel (CCC)

Agenda Overall telecom architecture Architecture diagrams for 2G / 3G Most important Network Elements SS7 stack and interconnections Practical attack scenarios Mapping the SS7 network Tracking user location Sending spoofed SMS Demo

Sending SMS MO / MT ForwardSM MSC SMSC MSC MAP MO ForwardSM MAP MT ForwardSM MAP messages MO: Mobile Originating MT: Mobile Terminating SMSC: SMS Center (SMSC GT list is public)

Sending SMS Prerequisite to SMS: MAP SRISM SMSC MSC MT MT

SendRoutingInfoForSM SS7 MAP SRISM SSN HLR SCCP Dst GT == MSISDN Destination phone number (MSISDN): 12340000001

Answer to SRISM Answer comes from HLR Get IMSI for requested MSISDN RoutingInfoForSM-Res ::= SEQUENCE { imsi IMSI, locationinfowithlmsi [0] LocationInfoWithLMSI, extensioncontainer [4] ExtensionContainer OPTIONAL,..., ip-sm-gwguidance [5] IP-SM-GW-Guidance OPTIONAL } Contains MSC GT Both IMSI and MSC GT are required to send MAP MT Forward SM

Answer to SRISM SRISM answer reveals MSC GT and IMSI IMSI MSC GT

SMS attacks Sending spam SMS Sending spoof SMS Bypassing SMS firewall Anti Spam protections MT FSM directly targeting MSC Directly sent from signalling protocol

SMS attacks Based on MAP MT-FSM (Mobile Terminated Forward Short Message) 12345000123 MSC GT MAP MT FSM IMSI Originating phone number Spoof here! SMS content

Originating Address Try different encodings! (Different screening rules) 12345000001 Hackito

SMS spoofing Spoofing police! Also works with other special numbers: Emergency number Voice Mail number Operators services Other subscribers

Counter measures Protecting against SMS attacks SMS home routing SMS firewalls All incoming MAP MT Forward SM are routed to SMS firewall for inspection Prevents against SMS attacks: SMS spam is detected and rejected SMS spoofed is detected and rejected

SMS Home Routing Protecting users privacy / Protecting against spam SMS SMSC

SMS Home Routing SMS are routed to SMS firewall for inspection SMSC SMS MSC Firewall MT MT

Counter Counter measures? How to bypass protections Can you actually bypass SMS firewalls? YES! How? Directly sending MT Forward SM to MSC Route through SMS firewall is usually not enforced! This requires to scan and discover all available MSC prior to send SMS Possible in a few hours MSC number: typically < 50 Also require target IMSI (SRI / SRISM / sendimsi)

SMS Firewall bypassed P1 Vulnerability Knowledge Base P1VID#112 https://saas.p1sec.com/vulns/112

Telcomap project

Worldwide discovery SS7map: Scanning the worldwide SS7 network Discovery scan from international SS7 interconnection Targets: all operators / all countries Currently implemented testcases: GT/SSN discovery scan (SCCP / TCAP) MSISDN range scan (MAP SRI) More to come

SS7 Map Telecom Networks SS7 Exposure

GRX Map PS, GPRS, LTE http://sniffmap.telcomap.org/grx/

Galaxy Map ShodanHQ-like but for Telco Shodan is only 10% coverage of Telco OAM and Signaling But useful to prove the seriousness: anyone can get access from Internet

Sniffmap Map of Five Eyes interception http://sniffmap.telcomap.org/

Attack surface Telcomaps Sniff Map SS7 Map GRX Map Galaxy Map

MAP specification: 3GPP TS 29.002 http://www.3gpp.org/dynareport/29002.htm SMS specification: 3GPP TS 23.040 http://www.3gpp.org/dynareport/23040.htm Going further SMS Home routing specification: 3GPP TS 23.840 http://www.3gpp.org/dynareport/23840.htm Locating mobile phones using MSC GT (CCC) http://events.ccc.de/congress/2008/fahrplan/attachments/1262_25c3-locating-mobilephones.pdf Description of MAP usual callflows http://www.netlab.tkk.fi/opetus/s383115/2007/kalvot/3115l7-9e.pdf P1 Security SaaS and Vulnerability Knowledge Base https://saas.p1sec.com/ SMS Gateways http://www.vianett.com/ Open Cell ID databases / API http://opencellids.org/

Thank you! Questions? Thanks to P1 Security team Questions to: po@p1sec.com alex@p1sec.com

Back up demo

Back up demo

Back up demo