Dirty use of USSD codes in cellular networks



Similar documents
How To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph

introduction to femtocells

VMobile Talk User Guide

Mobile Security. Practical attacks using cheap equipment. Business France. Presented the 07/06/2016. For. By Sébastien Dudek

CanMobile. CanMobile is mobile banking service provided by Canara Bank. It helps you to do following banking transactions:

CUSTOMER EDUCATION ON MOBILE BANKING

Mobile NFC 101. Presenter: Nick von Dadelszen Date: 31st August 2012 Company: Lateral Security (IT) Services Limited

NetSafe Smartphone Security Report 2014

MobileLink User Guide

10 Quick Tips to Mobile Security

How to enroll Android devices in SoMobile. Content Introduction... 1 Prerequisites... 1 Enrollment... 2

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

Mobile Iron User Guide

Android support for Microsoft Exchange in pure Google devices

(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation

Brainloop Secure Dataroom Version QR Code Scanner Apps for ios Version 1.1 and for Android

An Example of Mobile Forensics

Mobile Wallet Platform. Next generation mobile wallet solution

Junos Pulse for Google Android

Security in cellular-radio access networks

Basics of VoIP Origination

Femtocells: A Poisonous Needle in the Operator s Hay Stack

Samsung Galaxy S II Software Upgrade

How To Use Smarttrust Wib On A Sim Card On A Mobile Phone

U.S. Cellular Mobile Data Security. User Guide Version 00.01

LTE and IMSI catcher myths

ESET ENDPOINT SECURITY FOR ANDROID

Smartwatch Security Research

Monitoring mobile communication network, how does it work? How to prevent such thing about that?

Step 1. Step 2. Open your browser and go to and you will be presented a logon screen show below.

CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP

The smartphone revolution

Setup Guide-Mobility. ActiveSync Hosted Exchange Configuration

NHSmail mobile configuration guide Android mobile devices

SECURE MOBILE APP DEVELOPMENT: DIFFERENCES FROM TRADITIONAL APPROACH

Setup Guide-Mobility ActiveSync Hosted Exchange Configuration

Trust Digital Best Practices

You will need to know your staff number and MyUWSAccount password to setup your .

Basic Using HSBC Mobile Banking Technical Information

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

Configuring an Android device to access Staff Wi-Fi and .

General information about NFC technology

DUO SECURITY CISCO VPN USER GUIDE 1/27/2016

Setup your university on your Android smartphone

Mobile Banking FAQ Page 1 of 9

Quick Start Guide: Iridium GO! Advanced Portal

About UmojaPhone App for Android UmojaPhone App Requirements Please note Set up

Digital Communications Exploring SS7 signaling fraud that threatens mobile network security and subscriber privacy

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

$920+ GST Paid Annually. e-commerce Website Hosting Service HOSTING:: WHAT YOU GET WORDPRESS:: THEME + PLUG-IN UPDATES

Security and the Smartphone Revolution

MAPMYFITNESS+ GUIDE FOR ANDROID. Spree Customer Service

IAIK. Motivation 2. Advanced Computer Networks 2015/2016. Johannes Feichtner IAIK

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation

Username: Password: your password. Domain Name: EXCH026. Server Name: EAST.EXCH026.serverdata.net

State Bank FreedoM: Frequently Asked Questions

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

Designing federated identity management architectures for addressing the recent attacks against online financial transactions.

ONE Mail Direct for Mobile Devices

Lecture Embedded System Security A. R. Darmstadt, Introduction Mobile Security

Tutorial on Smartphone Security

Sophos Mobile Control Technical guide

MiniPOS and BluePad-50 user manual

Android Support on Galaxy Nexus, Nexus S, and Motorola Xoom for Microsoft Exchange Policies

Comodo Mobile Security for Android Software Version 3.0

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

INTIMATE. GSM Auto Dialer. User Manual. Description-About GSM 2. Requirements 2. Select a SIM card 2. Installation.3

MOBILE APPS. QA Testing for mobile applications

A Guide to Mobile Security For Citizen Journalists

Are free Android virus scanners any good?

Mobile Operating Systems & Security

Avira Free Android Security (version 1.2) HowTo

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

MO-Call Android User Guide

Sophos Mobile Control User guide for Apple ios. Product version: 2 Document date: December 2011

Android EMM Enrollment

BlackBerry Device Software. Protecting BlackBerry Smartphones Against Malware. Security Note

Protecting against Mobile Attacks

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

That Point of Sale is a PoS

Mobile Devices Using Without Losing

Kaseya 2. User Guide. Version 1.0

Transcription:

.. Dirty use of USSD codes in cellular networks Ravishankar Borgaonkar Security in Telecommunications, Technische Universität Berlin TelcoSecDay, Heidelberg, 12th March 2013

Agenda USSD codes and services in mobile telephony Attacks in USSD network infrastructure Attacks on smartphones (end-users) SecT / TU-Berlin 2 / 35

USSD Basics technology - features - applications What is USSD in mobile telephony? a messaging service between mobile phones and an application server in the network but data is transferred in real time as a session (no SMSC-store and forward) faster than SMS and interactive service supported by all mobiles - feature phones to smartphones why USSD? to increase ARPU (Average Revenue Per User) SecT / TU-Berlin 3 / 35

USSD Applications Services Services based on USSD protocol: interactive data services (News, Sports etc) pre-paid phone top-up and balance queries mobile banking and money services access to social services such as Twitter, Facebook SecT / TU-Berlin 4 / 35

USSD Applications Toilet thinking Motivation stories Airtel Money in India, really? An interesting document playing with NFC protocol on Android with Collin SecT / TU-Berlin 5 / 35

GSM architecture GSM cellular architecture SecT / TU-Berlin 6 / 35

GSM architecture USSD Architecture Architectural components: MSC (Mobile Switching Center),VLR (Visitor Location Register) USSD Gateway USSD application/server Simple Messaging Peer-Peer interface SecT / TU-Berlin 7 / 35

GSM architecture Application Flow Example SecT / TU-Berlin 8 / 35

GSM architecture Service Example Mobile Banking: Twitter: Register your number to the Bank Get user id and MPIN (mobile pin) dial ussd code to access your account Register for the service by sending SMS (optional) dial USSD codes type username and password to access SecT / TU-Berlin 9 / 35

GSM architecture Security in USSD services Completely relies on security provided by cellular network The biggest bank in India claims: However in reality.. SecT / TU-Berlin 10 / 35

2. Attacks in USSD network infrastructure SecT / TU-Berlin 11 / 35

Information needed for an attacker USSD codes User ID to access the service password or MPIN tools to access the service on behalf of victim weaknesses of the cellular network SecT / TU-Berlin 12 / 35

Issues in Cellular Networks (GSM) No mutual authentication between mobile and base station fake base station attacks Base station decides when to turn on encryption Some networks do not use encryption IMSI sent when requested by base station SecT / TU-Berlin 13 / 35

Phishing attack Goal: Recover user id, password, MPIN set up a fake base station with OpenBSC openbsc have basic USSD support possible to build bank application base station can initiate USSD communication collect user ID, password, MPIN drawback: attack works in 200m range SecT / TU-Berlin 14 / 35

Tools to exploit -1 Using a compromised femtocell: femtocell: a small access point, connects the mobile phone to the 3G/UMTS network blackhat 2012 talk by Nico, Kevin and me compromised femtocell can be used for MiTM set-up allows to intercept/inject messages drawback: attacking range is 50m It is difficult for the victim user to recognize this attack SecT / TU-Berlin 15 / 35

Tools to exploit -2 Using OsmocomBB phone: using a phone supported by OsmocomBB the attack depends on the weaknesses in the cellular network Nullcon 2011 talk "Your Phone is Your Phone But Your Calls are My Calls" by Akib Sayyed et al. authentication bypass by using victim's IMSI/TMSI the same method can be used for replaying USSD messages SecT / TU-Berlin 16 / 35

Issues with cellular networks When mobile sends SMS/USSD message: SecT / TU-Berlin 17 / 35

Issues with cellular networks "Operators turn off encryption/authentication to reduce load on the base station." SecT / TU-Berlin 18 / 35

3. Attacks on smartphones (Andriod) SecT / TU-Berlin 19 / 35

USSD on smartphones USSD (Unstructured Service Supplementary Data): all smartphones including feature phones supports USSD as per 3GPP standards. technically referred as MMI (Man-Machine Interface) on the mobile device MMI commands and format: activation: *SC*SI#,deactivation: #SC*SI# for more details read TS 122.030 Example: * 31 # <called number> SEND Codes are executed via "Call Settings" menu option usually SecT / TU-Berlin 20 / 35

USSD on smartphones USSD (Unstructured Service Supplementary Data): all smartphones including feature phones supports USSD as per 3GPP standard. technically referred as MMI (Man-Machine Interface) on the mobile device MMI commands and format: activation: *SC*SI#,deactivation: #SC*SI# (TS 122.030) Example: * 31 # <called number> SEND Codes are executed via Call "Menu option" usually SecT / TU-Berlin 21 / 35

USSD on Android Vulnerability in Android : Dialer in Android invoking TEL:123 intent via any Android app put number 123 on the dialer to call however, Android dialer fails to differentiate between phone number and USSD codes this failure allows to execute USSD codes affects versions: ICS, Jelly Bean and older versions too Let's try some dirty USSD codes SecT / TU-Berlin 22 / 35

Affected Devices Almost every Android device (JellyBean, ICS and older versions too) Google Nexsus series HTC One series, HTC Sensation Samsung Galaxy SI, SII, SIII Motorola Driod series Sony Ericsson other vendors might be (not tested) SecT / TU-Berlin 23 / 35

SIM attacks Locking SIM card: Every SIM card has PIN code however there are only 3 valid attempts SIM 3 wrong pins card gets locked and ask PUK code PUK code is on smart card Solution: SIM card works after entering PUK code..dammm..less impact :( SecT / TU-Berlin 24 / 35

SIM attacks Killing SIM card: Instead of changing PIN code, change PUK code 10 wrong PUK code SIM is unusable for this attack, it does not matter you set up PIN on SIM card or not Solution: Go to shop and buy new SIM card. SecT / TU-Berlin 25 / 35

Dirty codes and methods USSD Codes: **05*1234545*1234*1234# - Change PIN code *#06# - Show IMEI number *#7780# - factory reset, different for every handset Method: everybody loves iframes (Reasons?) SecT / TU-Berlin 26 / 35

Attacking method 1. From a malicious website visiting a link kills your SIM permanently can be invoked via any Android app having permission to call phone attack works in all Android devices SecT / TU-Berlin 27 / 35

Attacking method From QR code QR Droid (popular barcode scanner app) 10,000,000+ downloads in Google Play it opens website directly by default Not all barcode apps tested attack works in all Android devices Solution: Remove QR Droid from your phone SecT / TU-Berlin 28 / 35

Attacking method By sending a WAP Push SMS WAP Push SMS (need a special application to send such SMS) discovered by c0rnholio @ http://www.silentservices.de/ thanks Nico (@imnion) for informing I extended the above attack with USSD exploit code however, this attacks works on Samsung devices only so far Solution: Turn off "Service Loading" feature SecT / TU-Berlin 29 / 35

Attacking method From NFC tag few NFC tag readers open URL directly by default it was showed earlier but still developers fail to implement basics of security works in NFC based Android devices SecT / TU-Berlin 30 / 35

Wiping out Samsung phones Samsung tragedy there is a USSD code for factory reset settings on Samsung devices send a SMS or a link and wipe out the device victim can only see the show, cant stop it ;) on Galaxy SIII, vulnerability can be exploited via NFC Attack can be combined: Kill SIM card and Wipe the phone in 3 sec SecT / TU-Berlin 31 / 35

Vulnerability Impact Mobile users: Loss of valuable data (if there is no backup) disconnects from the cellular network services until getting new SIM Financial loss- buy a new SIM card Network operators and vendors: loss in service -> money loss for operators issue new SIM cards if affected cost of updating SecT / TU-Berlin 32 / 35

Fixing the vulnerability informed to the involved parties it has been patched but Android fails always in updating the devices issues with Android devices on operator's contract update your device Test your Android device at : www.isk.kth.se/r bbo/testussd.html SecT / TU-Berlin 33 / 35

thanks (in no particular order) Jean-Pierre Seifert Collin Mulliner Nico Golde SecT / TU-Berlin 34 / 35

the end thank you for your attention questions? on tweet : @raviborgaonkar SecT / TU-Berlin 35 / 35