SlideShare una empresa de Scribd logo
1 de 46
Descargar para leer sin conexión
The known unknowns of SS7 and beyond
Siddharth Rao1 Silke Holtmanns2 Ian Oliver2 Tuomas Aura1
1Aalto University, Finland 2Bell Labs - Nokia Networks, Finland
Telco Security Day - Troopers
15 March 2016
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 1 / 46
Overview
1 SS7 based attacks
SS7 attacks recap
More SS7-MAP attacks
2 LTE/ Diameter based attacks
Motivation
Interworking Functions (IWF)
LTE IMSI disclosure attack
Location disclosure
3 Surveillance and signalling systems
Co-traveller: How NSA did it?
Is there any room for more surveillance-like attacks?
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 2 / 46
Co-authors - Dr. Silke Holtmanns
Dr. Silke Holtmanns is working for
Nokia Security Research, now part
of Bell Labs. She has 16 years of
cellular security experience. She is
rapporteur of many 3GPP security
specifications and reports and also
contributes actively to other cellular
security standardization bodies e.g.
GSMA, ETSI. She authored a book
and several book chapters in addi-
tion to a wide range of cellular secu-
rity articles.
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 3 / 46
Co-authors - Dr. Ian Oliver
Dr. Ian Oliver is a security re-
searcher in Bell Labs working on
NFV, Trusted Computing and Pri-
vacy. Prior to this he worked with
Semantic Web technologies at Nokia
Research and was the privacy of-
ficer for Here. He holds a re-
search fellow position at the Univer-
sity of Brighton and is the author
of the book Privacy Engineering: A
Dataflow and Ontological Approach.
He has published numerous papers
and holds over 40 patents.
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 4 / 46
Co-authors - Dr. Tuomas Aura
Dr. Tuomas Aura was appointed
as professor of computer science at
Aalto University in 2008. Before
that, he worked as a researcher at
Microsoft Research in Cambridge,
England.
His recent research has focused on
Internet and mobility protocols, user
privacy protection and distributed
security policies. Tuomas took part
in developing the security solutions
for the Mobile IPv6 and SEND pro-
tocol standards in the IETF.
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 5 / 46
About me: Twitter @sidnext2none
Currently a research assistant in
Secure Systems group in Aalto.
Master’s in information and
network security; Master’s in
cryptography.
Research Interests:
Security and privacy in
network protocols.
Evolution of inter-networking
technologies.
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 6 / 46
My journey so far with TelcoSec
Started in January, 2015 as a security intern at Nokia Networks.
Exploratory analysis survey of SS7 attacks → Thesis ”Analysis and
mitigation of recent attacks on mobile communication backend
networks”.
Core network SS7 LTE IWF
Location tracking beyond GSM networks.
Pedagogical study of evolution of Telco attacks.
Emerging threats to the network community via Telco backbone.
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 7 / 46
Part 1: SS7 attacks
SS7 background
and
new attacks
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 8 / 46
Background - Signalling System no. 7 (SS7)
Protocol foundation to enable
roaming.
Short Message and
Supplementary services.
Toll free numbers and
tele-voting.
Enhanced Message Service
(EMS).
Local Number Portability
(LNP).
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 9 / 46
SS7 Attck timeline
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 10 / 46
SS7 attack impact(1)
Location disclosure
1 Call setup messages.
2 SMS protocol messages.
3 Emergency services.
4 Billing platform messages.
Call based attacks
1 Billing platform messages.
2 Profile manipulation.
3 TMSI de-anonymization
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 11 / 46
SS7 attack impact(2)
SMS based attacks
1 SMS interception.
2 Sending fraud SMS messages.
DoS attacks
1 Interconnection handover messages.
2 MSC choking.
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 12 / 46
Check IMEI misusage
Check IMEI is used to query the EIR to know whether a mobile
phone (IMEI) is stolen (blacklisted), legitimate (white-listed) or on
alert (grey-listed).
Exploits a hidden relationship between IMEI and IMSI in some of the
EIRs.
Unnecessary/unknown feature which is not widely used.
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 13 / 46
Regular IMEI check procedure
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 14 / 46
CheckIMEI ASN structure
Contains only IMEI
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 15 / 46
Assumptions
Attacker has a stolen phone which is blacklisted and he knows the
IMSI (Subsriber id) which was associated with it while blocking or
last use by the victim.
The attacker does not need to have the original SIM as it is sufficient
to have just the IMSI.
Attacker has access to SS7 network.
The Global Title (GT, SS7 name of a node) of the Equipment
Identity Register (EIR) is required.
Mobile Switching Center (MSC) GT might be needed (depending on
operator configuration).
Feature and IMSI check options are enabled.
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 16 / 46
Feature
Users loose their phones and find it again → An easy ”recovery” in EIR
wanted:
MSC sends IMEI (device id) along with IMSI (subscriber id) during
MAP CHECK IMEI.
Initially the IMEI is checked to know the list it belongs to. If it is
found on the black list, an additional check of IMSI is made.
If there is a match between IMSI provisioned with IMEI in the EIR
database (This is the IMSI-IMEI pair in the EIR before the victim
blocks his stolen device) with the IMSI found in MAP CHECK IMEI
message then this overrides the blacklist condition.
Phone no longer blacklisted.
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 17 / 46
Attack scenario
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 18 / 46
CheckIMEI* ASN structure
Contains IMEI and IMSI !!!
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 19 / 46
Example
1 A CHECK IMEI* is received with IMEI = 12345678901234, and
IMSI = 495867256894125.
2 An individual IMEI match is found indicating that the IMEI is on the
Black List.
3 Normally required response would be Black Listed, however; because
an IMSI is present in the message, and the IMEI is on the Black List,
the IMSI is compared to the IMSI entry in the database for this IMEI.
4 In this case, the IMSI in the RTDB matches the IMSI in the query,
thus the Black Listed condition is cancelled/overridden.
5 EIR formulates a CHECK IMEI* response with Equipment Status =
0 whiteListed.
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 20 / 46
Why should somebody do this?
Stolen phones would have much higher value, if they are not blacklisted
and can be sold via ebay or similar means.
Figure : Source - /Wired/black-market
1 in 10 smart-phone owners are
the victims of phone theft.
In United States, 113 phones
per minute are stolen or lost.
$7 million worth of smart
phones on a daily basis.
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 21 / 46
EIR coverage
Figure : Source: Farrell, G. (2015). Preventing phone theft and robbery: the need
for government action and international coordination. Crime Science, 4(1), 1-11.
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 22 / 46
Summary
Attack has not been observed in real networks.
Research was done on protocol level and publicly available
information.
Not all EIRs affected.
Business case exist for the attack.
Check IMEI command can be added to the list of message to be
filtered by an SS7 specific firewall in the STP at the border of the
network, since this is a network internal message.
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 23 / 46
Part 2: LTE/Diameter attacks
LTE
and
Diameter attacks
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 24 / 46
Motivation
Most MNO upgrade their network gradually to avoid service
interruption and optimize ROI of infrastructure.
Inhomogeneous set-up =⇒ interesting attack vectors.
For interoperability with partners, edge nodes have the ability to
translate between Diameter ⇐⇒ SS7.
Attack translation
We wanted an easy way to port SS7 attacks to Diameter.
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 25 / 46
Ideal Diameter Network
Figure : Diameter roaming architecture between two newer networks.
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 26 / 46
Inhomogeneous Network
Figure : Different networks with different protocol support.
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 27 / 46
Interworking functions
Technical specification TS 29.305 and non-binding report TR
29.805.
Describes how Diameter and SS7-MAP messages should be translated
to each other i.e. Attribute Value Pairs (AVP) mapping.
General idea:
Attacker pretends to be an old type network or node.
It forces IPSec secured LTE Diameter network or nodes into using the
less secured SS7-MAP.
Craft SS7-like attack messages and IWF will take care of the rest.
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 28 / 46
Obtaining IMSI
Attacker claims to be an IWF node
The attacker sends a Send Routing Info For SM-Request (SRI SM),
which contains the MSISDN of the victim.
Typical multi-domain support scenario for roaming and routing
incoming SMS.
MAP commands have to be translated to Diameter specific commands
by the receiving IWF node.
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 29 / 46
Obtaining IMSI(2)
The IWF (in step 5) copies IMSI of the victim from username AVP
from SRA to SRI SM ACK.
TS 29.338 section 6.3.2 and TS 29.305 section A2.5.2.3
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 30 / 46
LTE Location disclosure attacks summary
SS7 attack vector IWF Attack? Reason
MAP SRI No Very few operators connect
HSS directly to DEA or inter-
connection.
MAP SRI SM Yes Location upto granularity of
MME.
MAP ATI No IWF cannot directly map ATI
commands.
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 31 / 46
LTE Location disclosure attacks summary (2)
MAP PSI Yes EPS Location Info i.e. cell
ID, subscriber state, IMEI,
software version and encryp-
tion keys.
Emergency calls (PSL) No IWF cannot directly map PSL
commands.
More Details at IFIP Networking 2016
Look for our paper - “User Location Tracking Attacks for LTE Net-
works Using the Inteworking Functionality”
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 32 / 46
Part 3: Surveillance
Surveillance
and
Signalling systems
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 33 / 46
Bigger problems beyond targeted attacks
Easy remote access to mobile user data ⇐⇒ Mass surveillance.
NSA exploited loopholes in Radio Access Network (IMSI catchers) to
target specific personnel.
Exploited core networks and signalling systems worldwide to track
cellphone locations of ”Co-travellers”.
Collected 5 billion records per day.
To find and develop more targets.
”Co-travller” was a sophisticated end-to-end surveillance system to
collect and analyze data from signalling systems.
Psychology, the new kind of SIGINT: frequent power-down, handset
swapping and SMS styles to analyse the behaviour of mobile users.
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 34 / 46
Co-traveller surveillance system overview
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 35 / 46
Types of data collected
Dialed Number Recognition (DNR)
Information collected from mobile phone network.
Location data, encryption keys, etc.
Digital Network Intelligence (DNI)
Information collected from mobile phone Internet.
e.g. Google location tracking cookie PREFID.
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 36 / 46
FASCIA database
Big database to dump meta-data from
various sources.
Device-location records −→ 27 TB of
data (over months).
Cellular identifiers: LAC, CelllD, VLR,
IMEI, IMSI, TMSI, MSISDN, MSRN,
MSC/VLR GT.
Encryption parameters: Kc, Rand,
Sres
Various other parameters from core
network and RAN.
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 37 / 46
Backend processing platforms
Juggernaut
Digital Receiver Technology, Inc. (DRT) surveillance systems
Intercepts both SS7 traffic and air interface traffic.
TUSKATTIRE
Meta-data cleaning, processing and normalizing the collected
Call-Related Data (CDR) i.e. Dailed Number Recognition.
Ghost machine
Hadoop based cloud analytic platform.
It can handle multiple analytic features at a time.
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 38 / 46
Co-traveller workflow
1 Start with a selector (target) with his IMSI.
2 Query the database for CellID, LAC and MSC/VLR details on specific
day and time.
3 Query for the IMSIs of all the mobile users who were in the vicinity of
that region (cell or MSC region) at that point of time - They are the
potential co-travellers.
4 Query as as in step 1 and rank the potential co-travellers to be the
real co-travellers by comparing the pattern of travel, cellular usage
and life style with or without the direct connection to the selector.
P.S: They do some serious datamining and pattern analysis/matching
here.
5 Continue tracking everyone :)
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 39 / 46
Why Nation-State Malwares Target Telco Networks?
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 40 / 46
Is there any room for more surveillance-like attacks?
Snowden revelations have definitely alerted many, especially the
security researchers.
Relatively easy to detect and alert (if not prevent) the attacks from
RAN. e.g: IMSI Catchers
SnoopSnitch, Darshak
More difficult to know if the attack happens from the core network
side - at least for the end users.
So they rely on Telcosec experts to protect their privacy.
More attacks paradigms would help to achieve ’security by design’
approach in future mobile generations.
More room for remote injection or stealing of cellular secrets from
mobile users on a mass scale? - Possibly yes.
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 41 / 46
USSD based attacks
Unstructured Supplementary Service Data (USSD) −→ cost
effective, faster (than SMS) and flexible mechanism.
Real time (session based) communication channel −→ suitable for
interactive menu based services.
Supported by majority of the phones - Neither phone based nor SIM
based.
Works on both home and roaming networks without extra charge.
Earlier talk by Ravi at Troopers on Dirty use of USSD codes,
attacks using USSD insecurity.
Can we convert dirty USSD to nasty USSD?
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 42 / 46
Network Initiated USSD operation
Ongoing work - open research questions/ study of emerging threats.
Push-Service mode or Network-Initiated USSD: The network sends
USSD message towards the mobile station.
HLR, MSC or VLR can initiate it −→ as a request seeking the MS to
respond or as a notification without the MS intervention.
Easy to flood/infect a large number of cellphones in a MSC/VLR
region.
Some specifications talk about using USSD for OS updates as well.
Trying to steal OTA keys? SIM related secrets?
If yes, then it is a big mess!!!
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 43 / 46
Conclusion
The SS7 saga continues =⇒ It will haunt us for some more years.
LTE attacks =⇒ It is possible to port SS7 attacks to Diameter
network using Interworking functions.
IMSI disclosure
Location tracking upto MME as well as cellID level.
IMEI and OS software version disclosure.
Bigger threats of surveillance and Advanced Persistent Threats
(APTs) via Telco backbones.
Emphasis in future should be on ’Security by design’.
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 44 / 46
References
S.P.Rao (2015)
Unblocking Stolen Mobile Devices Using SS7-MAP Vulnerabilities: Exploiting the
Relationship between IMEI and IMSI for EIR Access
Trustcom/BigDataSE/ISPA, 2015 IEEE, Helsinki, 2015, 1171–1176.
TS 29.305
InterWorking Function (IWF) between MAP based and Diameter based interfaces
3rd Generation Partnership Project (3GPP)
A.Soltani (2015)
Snowden files: NSA series
Washington Post
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 45 / 46
Thank you!
Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 46 / 46

Más contenido relacionado

La actualidad más candente

Mobile signaling threats and vulnerabilities - real cases and statistics from...
Mobile signaling threats and vulnerabilities - real cases and statistics from...Mobile signaling threats and vulnerabilities - real cases and statistics from...
Mobile signaling threats and vulnerabilities - real cases and statistics from...DefCamp
 
Simjacker: how to protect your network from the latest hot vulnerability
Simjacker: how to protect your network from the latest hot vulnerabilitySimjacker: how to protect your network from the latest hot vulnerability
Simjacker: how to protect your network from the latest hot vulnerabilityPositiveTechnologies
 
1 omo112050 bsc6000 gsm v9 r8c12 cell parameters issue1.00
1 omo112050 bsc6000 gsm v9 r8c12 cell parameters issue1.001 omo112050 bsc6000 gsm v9 r8c12 cell parameters issue1.00
1 omo112050 bsc6000 gsm v9 r8c12 cell parameters issue1.00Ahmed Gad
 
AIRCOM LTE Webinar 4 - LTE Coverage
AIRCOM LTE Webinar 4 - LTE CoverageAIRCOM LTE Webinar 4 - LTE Coverage
AIRCOM LTE Webinar 4 - LTE CoverageAIRCOM International
 
LTE Attach Call Flow_Vi.pptx
LTE Attach Call Flow_Vi.pptxLTE Attach Call Flow_Vi.pptx
LTE Attach Call Flow_Vi.pptxGaganVerma62
 
LTE Fundamentals Training and Certification by TELCOMA Global
LTE Fundamentals Training and Certification by TELCOMA GlobalLTE Fundamentals Training and Certification by TELCOMA Global
LTE Fundamentals Training and Certification by TELCOMA GlobalGaganpreet Singh Walia
 
LTE Architecture and LTE Attach
LTE Architecture and LTE AttachLTE Architecture and LTE Attach
LTE Architecture and LTE Attachaliirfan04
 
Lte Ran Architecture Aspects
Lte Ran Architecture AspectsLte Ran Architecture Aspects
Lte Ran Architecture AspectsBP Tiwari
 
volte ims network architecture
volte ims network architecturevolte ims network architecture
volte ims network architectureVikas Shokeen
 
5G NR: Key features and enhancements
5G NR: Key features and enhancements5G NR: Key features and enhancements
5G NR: Key features and enhancements3G4G
 
VoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack ExplainedVoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack ExplainedVikas Shokeen
 
Thr cellular concept
Thr cellular conceptThr cellular concept
Thr cellular conceptSajid Marwat
 
Lte system signaling procedures
Lte system signaling proceduresLte system signaling procedures
Lte system signaling procedurestharinduwije
 
2 g and 3g kpi improvement by parameter optimization (nsn, ericsson, huawei) ...
2 g and 3g kpi improvement by parameter optimization (nsn, ericsson, huawei) ...2 g and 3g kpi improvement by parameter optimization (nsn, ericsson, huawei) ...
2 g and 3g kpi improvement by parameter optimization (nsn, ericsson, huawei) ...Jean de la Sagesse
 
AIRCOM LTE Webinar 3 - LTE Carriers
AIRCOM LTE Webinar 3 - LTE CarriersAIRCOM LTE Webinar 3 - LTE Carriers
AIRCOM LTE Webinar 3 - LTE CarriersAIRCOM International
 
ims registration call flow procedure volte sip
ims registration call flow procedure volte sipims registration call flow procedure volte sip
ims registration call flow procedure volte sipVikas Shokeen
 
ENUM Theory, Implementation, VoIP and Routing SolutionsGary Richenaker
ENUM Theory, Implementation, VoIP and Routing SolutionsGary RichenakerENUM Theory, Implementation, VoIP and Routing SolutionsGary Richenaker
ENUM Theory, Implementation, VoIP and Routing SolutionsGary Richenakerenumplatform
 
Signaling security essentials. Ready, steady, 5G!
 Signaling security essentials. Ready, steady, 5G! Signaling security essentials. Ready, steady, 5G!
Signaling security essentials. Ready, steady, 5G!PositiveTechnologies
 
3 handoff management
3 handoff management3 handoff management
3 handoff managementవం శీ
 
User location tracking attacks for LTE networks using the Interworking Functi...
User location tracking attacks for LTE networks using the Interworking Functi...User location tracking attacks for LTE networks using the Interworking Functi...
User location tracking attacks for LTE networks using the Interworking Functi...Siddharth Rao
 

La actualidad más candente (20)

Mobile signaling threats and vulnerabilities - real cases and statistics from...
Mobile signaling threats and vulnerabilities - real cases and statistics from...Mobile signaling threats and vulnerabilities - real cases and statistics from...
Mobile signaling threats and vulnerabilities - real cases and statistics from...
 
Simjacker: how to protect your network from the latest hot vulnerability
Simjacker: how to protect your network from the latest hot vulnerabilitySimjacker: how to protect your network from the latest hot vulnerability
Simjacker: how to protect your network from the latest hot vulnerability
 
1 omo112050 bsc6000 gsm v9 r8c12 cell parameters issue1.00
1 omo112050 bsc6000 gsm v9 r8c12 cell parameters issue1.001 omo112050 bsc6000 gsm v9 r8c12 cell parameters issue1.00
1 omo112050 bsc6000 gsm v9 r8c12 cell parameters issue1.00
 
AIRCOM LTE Webinar 4 - LTE Coverage
AIRCOM LTE Webinar 4 - LTE CoverageAIRCOM LTE Webinar 4 - LTE Coverage
AIRCOM LTE Webinar 4 - LTE Coverage
 
LTE Attach Call Flow_Vi.pptx
LTE Attach Call Flow_Vi.pptxLTE Attach Call Flow_Vi.pptx
LTE Attach Call Flow_Vi.pptx
 
LTE Fundamentals Training and Certification by TELCOMA Global
LTE Fundamentals Training and Certification by TELCOMA GlobalLTE Fundamentals Training and Certification by TELCOMA Global
LTE Fundamentals Training and Certification by TELCOMA Global
 
LTE Architecture and LTE Attach
LTE Architecture and LTE AttachLTE Architecture and LTE Attach
LTE Architecture and LTE Attach
 
Lte Ran Architecture Aspects
Lte Ran Architecture AspectsLte Ran Architecture Aspects
Lte Ran Architecture Aspects
 
volte ims network architecture
volte ims network architecturevolte ims network architecture
volte ims network architecture
 
5G NR: Key features and enhancements
5G NR: Key features and enhancements5G NR: Key features and enhancements
5G NR: Key features and enhancements
 
VoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack ExplainedVoLTE Interfaces , Protocols & IMS Stack Explained
VoLTE Interfaces , Protocols & IMS Stack Explained
 
Thr cellular concept
Thr cellular conceptThr cellular concept
Thr cellular concept
 
Lte system signaling procedures
Lte system signaling proceduresLte system signaling procedures
Lte system signaling procedures
 
2 g and 3g kpi improvement by parameter optimization (nsn, ericsson, huawei) ...
2 g and 3g kpi improvement by parameter optimization (nsn, ericsson, huawei) ...2 g and 3g kpi improvement by parameter optimization (nsn, ericsson, huawei) ...
2 g and 3g kpi improvement by parameter optimization (nsn, ericsson, huawei) ...
 
AIRCOM LTE Webinar 3 - LTE Carriers
AIRCOM LTE Webinar 3 - LTE CarriersAIRCOM LTE Webinar 3 - LTE Carriers
AIRCOM LTE Webinar 3 - LTE Carriers
 
ims registration call flow procedure volte sip
ims registration call flow procedure volte sipims registration call flow procedure volte sip
ims registration call flow procedure volte sip
 
ENUM Theory, Implementation, VoIP and Routing SolutionsGary Richenaker
ENUM Theory, Implementation, VoIP and Routing SolutionsGary RichenakerENUM Theory, Implementation, VoIP and Routing SolutionsGary Richenaker
ENUM Theory, Implementation, VoIP and Routing SolutionsGary Richenaker
 
Signaling security essentials. Ready, steady, 5G!
 Signaling security essentials. Ready, steady, 5G! Signaling security essentials. Ready, steady, 5G!
Signaling security essentials. Ready, steady, 5G!
 
3 handoff management
3 handoff management3 handoff management
3 handoff management
 
User location tracking attacks for LTE networks using the Interworking Functi...
User location tracking attacks for LTE networks using the Interworking Functi...User location tracking attacks for LTE networks using the Interworking Functi...
User location tracking attacks for LTE networks using the Interworking Functi...
 

Destacado

LTE Asia 2014 - Remain Relevant - The Next Generation Diameter Signaling Cont...
LTE Asia 2014 - Remain Relevant - The Next Generation Diameter Signaling Cont...LTE Asia 2014 - Remain Relevant - The Next Generation Diameter Signaling Cont...
LTE Asia 2014 - Remain Relevant - The Next Generation Diameter Signaling Cont...Dialogic Inc.
 
Mpls security - Venice 2014
Mpls security - Venice 2014 Mpls security - Venice 2014
Mpls security - Venice 2014 Wardner Maia
 
Telco Business & Technology
Telco Business & TechnologyTelco Business & Technology
Telco Business & TechnologySARCCOM
 
Evolving the service provider architecture to unleash the potential of IoT - ...
Evolving the service provider architecture to unleash the potential of IoT - ...Evolving the service provider architecture to unleash the potential of IoT - ...
Evolving the service provider architecture to unleash the potential of IoT - ...FrenchWeb.fr
 
Worldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN networkWorldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN networkP1Security
 
Telco-OTT: infrastructure challenges and solutions
Telco-OTT: infrastructure challenges and solutionsTelco-OTT: infrastructure challenges and solutions
Telco-OTT: infrastructure challenges and solutionsVictor Pascual Ávila
 
The Modern Telco Network: Defining The Telco Cloud
The Modern Telco Network: Defining The Telco CloudThe Modern Telco Network: Defining The Telco Cloud
The Modern Telco Network: Defining The Telco CloudMarco Rodrigues
 
Telco 4.0 Business Operating Model Value Proposition Overview
Telco 4.0 Business Operating Model Value Proposition   OverviewTelco 4.0 Business Operating Model Value Proposition   Overview
Telco 4.0 Business Operating Model Value Proposition OverviewNigel Tebbutt
 

Destacado (10)

LTE Asia 2014 - Remain Relevant - The Next Generation Diameter Signaling Cont...
LTE Asia 2014 - Remain Relevant - The Next Generation Diameter Signaling Cont...LTE Asia 2014 - Remain Relevant - The Next Generation Diameter Signaling Cont...
LTE Asia 2014 - Remain Relevant - The Next Generation Diameter Signaling Cont...
 
V R F Checking
V R F CheckingV R F Checking
V R F Checking
 
Mpls security - Venice 2014
Mpls security - Venice 2014 Mpls security - Venice 2014
Mpls security - Venice 2014
 
Assaulting diameter IPX network
Assaulting diameter IPX networkAssaulting diameter IPX network
Assaulting diameter IPX network
 
Telco Business & Technology
Telco Business & TechnologyTelco Business & Technology
Telco Business & Technology
 
Evolving the service provider architecture to unleash the potential of IoT - ...
Evolving the service provider architecture to unleash the potential of IoT - ...Evolving the service provider architecture to unleash the potential of IoT - ...
Evolving the service provider architecture to unleash the potential of IoT - ...
 
Worldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN networkWorldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN network
 
Telco-OTT: infrastructure challenges and solutions
Telco-OTT: infrastructure challenges and solutionsTelco-OTT: infrastructure challenges and solutions
Telco-OTT: infrastructure challenges and solutions
 
The Modern Telco Network: Defining The Telco Cloud
The Modern Telco Network: Defining The Telco CloudThe Modern Telco Network: Defining The Telco Cloud
The Modern Telco Network: Defining The Telco Cloud
 
Telco 4.0 Business Operating Model Value Proposition Overview
Telco 4.0 Business Operating Model Value Proposition   OverviewTelco 4.0 Business Operating Model Value Proposition   Overview
Telco 4.0 Business Operating Model Value Proposition Overview
 

Similar a The known unknowns of SS7 and beyond

Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 ) ClubHack
 
Voice securityprotocol review
Voice securityprotocol reviewVoice securityprotocol review
Voice securityprotocol reviewFabio Pietrosanti
 
Securty Issues from 1999
Securty Issues from 1999Securty Issues from 1999
Securty Issues from 1999TomParker
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxronak56
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxdaniahendric
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxmakdul
 
The new era of mega trends securtity
The new era of mega trends securtityThe new era of mega trends securtity
The new era of mega trends securtityAhmed Sallam
 
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...viaForensics
 
Providing end to-end secure
Providing end to-end secureProviding end to-end secure
Providing end to-end secureIJNSA Journal
 
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKSPROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKSIJNSA Journal
 
Voice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A ResearchVoice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A ResearchIJMER
 
J.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the EnterpriseJ.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the EnterpriseDroidcon Berlin
 
RSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of ThingsRSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of ThingsDaniel Miessler
 
Dismantling intrusion prevention_systems
Dismantling intrusion prevention_systemsDismantling intrusion prevention_systems
Dismantling intrusion prevention_systemsOlli-Pekka Niemi
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten NohlCODE BLUE
 
Advanced fuzzing in the vo ip space
Advanced fuzzing in the vo ip spaceAdvanced fuzzing in the vo ip space
Advanced fuzzing in the vo ip spaceUltraUploader
 
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...IJCNCJournal
 
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...IJCNCJournal
 
Exfiltrating Data through IoT
Exfiltrating Data through IoTExfiltrating Data through IoT
Exfiltrating Data through IoTPriyanka Aash
 

Similar a The known unknowns of SS7 and beyond (20)

Telecom security issues (Raoul Chiesa, day 1 )
Telecom security issues   (Raoul Chiesa, day 1 ) Telecom security issues   (Raoul Chiesa, day 1 )
Telecom security issues (Raoul Chiesa, day 1 )
 
Voice securityprotocol review
Voice securityprotocol reviewVoice securityprotocol review
Voice securityprotocol review
 
Securty Issues from 1999
Securty Issues from 1999Securty Issues from 1999
Securty Issues from 1999
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docxAbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
 
The new era of mega trends securtity
The new era of mega trends securtityThe new era of mega trends securtity
The new era of mega trends securtity
 
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
 
Providing end to-end secure
Providing end to-end secureProviding end to-end secure
Providing end to-end secure
 
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKSPROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
 
Voice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A ResearchVoice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A Research
 
J.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the EnterpriseJ.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the Enterprise
 
RSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of ThingsRSA2015: Securing the Internet of Things
RSA2015: Securing the Internet of Things
 
Dismantling intrusion prevention_systems
Dismantling intrusion prevention_systemsDismantling intrusion prevention_systems
Dismantling intrusion prevention_systems
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
 
Advanced fuzzing in the vo ip space
Advanced fuzzing in the vo ip spaceAdvanced fuzzing in the vo ip space
Advanced fuzzing in the vo ip space
 
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...
 
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...
Machine to Machine Authenticated Key Agreement with Forward Secrecy for Inter...
 
Firewall
FirewallFirewall
Firewall
 
Exfiltrating Data through IoT
Exfiltrating Data through IoTExfiltrating Data through IoT
Exfiltrating Data through IoT
 

Último

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Último (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

The known unknowns of SS7 and beyond

  • 1. The known unknowns of SS7 and beyond Siddharth Rao1 Silke Holtmanns2 Ian Oliver2 Tuomas Aura1 1Aalto University, Finland 2Bell Labs - Nokia Networks, Finland Telco Security Day - Troopers 15 March 2016 Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 1 / 46
  • 2. Overview 1 SS7 based attacks SS7 attacks recap More SS7-MAP attacks 2 LTE/ Diameter based attacks Motivation Interworking Functions (IWF) LTE IMSI disclosure attack Location disclosure 3 Surveillance and signalling systems Co-traveller: How NSA did it? Is there any room for more surveillance-like attacks? Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 2 / 46
  • 3. Co-authors - Dr. Silke Holtmanns Dr. Silke Holtmanns is working for Nokia Security Research, now part of Bell Labs. She has 16 years of cellular security experience. She is rapporteur of many 3GPP security specifications and reports and also contributes actively to other cellular security standardization bodies e.g. GSMA, ETSI. She authored a book and several book chapters in addi- tion to a wide range of cellular secu- rity articles. Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 3 / 46
  • 4. Co-authors - Dr. Ian Oliver Dr. Ian Oliver is a security re- searcher in Bell Labs working on NFV, Trusted Computing and Pri- vacy. Prior to this he worked with Semantic Web technologies at Nokia Research and was the privacy of- ficer for Here. He holds a re- search fellow position at the Univer- sity of Brighton and is the author of the book Privacy Engineering: A Dataflow and Ontological Approach. He has published numerous papers and holds over 40 patents. Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 4 / 46
  • 5. Co-authors - Dr. Tuomas Aura Dr. Tuomas Aura was appointed as professor of computer science at Aalto University in 2008. Before that, he worked as a researcher at Microsoft Research in Cambridge, England. His recent research has focused on Internet and mobility protocols, user privacy protection and distributed security policies. Tuomas took part in developing the security solutions for the Mobile IPv6 and SEND pro- tocol standards in the IETF. Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 5 / 46
  • 6. About me: Twitter @sidnext2none Currently a research assistant in Secure Systems group in Aalto. Master’s in information and network security; Master’s in cryptography. Research Interests: Security and privacy in network protocols. Evolution of inter-networking technologies. Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 6 / 46
  • 7. My journey so far with TelcoSec Started in January, 2015 as a security intern at Nokia Networks. Exploratory analysis survey of SS7 attacks → Thesis ”Analysis and mitigation of recent attacks on mobile communication backend networks”. Core network SS7 LTE IWF Location tracking beyond GSM networks. Pedagogical study of evolution of Telco attacks. Emerging threats to the network community via Telco backbone. Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 7 / 46
  • 8. Part 1: SS7 attacks SS7 background and new attacks Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 8 / 46
  • 9. Background - Signalling System no. 7 (SS7) Protocol foundation to enable roaming. Short Message and Supplementary services. Toll free numbers and tele-voting. Enhanced Message Service (EMS). Local Number Portability (LNP). Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 9 / 46
  • 10. SS7 Attck timeline Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 10 / 46
  • 11. SS7 attack impact(1) Location disclosure 1 Call setup messages. 2 SMS protocol messages. 3 Emergency services. 4 Billing platform messages. Call based attacks 1 Billing platform messages. 2 Profile manipulation. 3 TMSI de-anonymization Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 11 / 46
  • 12. SS7 attack impact(2) SMS based attacks 1 SMS interception. 2 Sending fraud SMS messages. DoS attacks 1 Interconnection handover messages. 2 MSC choking. Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 12 / 46
  • 13. Check IMEI misusage Check IMEI is used to query the EIR to know whether a mobile phone (IMEI) is stolen (blacklisted), legitimate (white-listed) or on alert (grey-listed). Exploits a hidden relationship between IMEI and IMSI in some of the EIRs. Unnecessary/unknown feature which is not widely used. Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 13 / 46
  • 14. Regular IMEI check procedure Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 14 / 46
  • 15. CheckIMEI ASN structure Contains only IMEI Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 15 / 46
  • 16. Assumptions Attacker has a stolen phone which is blacklisted and he knows the IMSI (Subsriber id) which was associated with it while blocking or last use by the victim. The attacker does not need to have the original SIM as it is sufficient to have just the IMSI. Attacker has access to SS7 network. The Global Title (GT, SS7 name of a node) of the Equipment Identity Register (EIR) is required. Mobile Switching Center (MSC) GT might be needed (depending on operator configuration). Feature and IMSI check options are enabled. Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 16 / 46
  • 17. Feature Users loose their phones and find it again → An easy ”recovery” in EIR wanted: MSC sends IMEI (device id) along with IMSI (subscriber id) during MAP CHECK IMEI. Initially the IMEI is checked to know the list it belongs to. If it is found on the black list, an additional check of IMSI is made. If there is a match between IMSI provisioned with IMEI in the EIR database (This is the IMSI-IMEI pair in the EIR before the victim blocks his stolen device) with the IMSI found in MAP CHECK IMEI message then this overrides the blacklist condition. Phone no longer blacklisted. Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 17 / 46
  • 18. Attack scenario Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 18 / 46
  • 19. CheckIMEI* ASN structure Contains IMEI and IMSI !!! Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 19 / 46
  • 20. Example 1 A CHECK IMEI* is received with IMEI = 12345678901234, and IMSI = 495867256894125. 2 An individual IMEI match is found indicating that the IMEI is on the Black List. 3 Normally required response would be Black Listed, however; because an IMSI is present in the message, and the IMEI is on the Black List, the IMSI is compared to the IMSI entry in the database for this IMEI. 4 In this case, the IMSI in the RTDB matches the IMSI in the query, thus the Black Listed condition is cancelled/overridden. 5 EIR formulates a CHECK IMEI* response with Equipment Status = 0 whiteListed. Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 20 / 46
  • 21. Why should somebody do this? Stolen phones would have much higher value, if they are not blacklisted and can be sold via ebay or similar means. Figure : Source - /Wired/black-market 1 in 10 smart-phone owners are the victims of phone theft. In United States, 113 phones per minute are stolen or lost. $7 million worth of smart phones on a daily basis. Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 21 / 46
  • 22. EIR coverage Figure : Source: Farrell, G. (2015). Preventing phone theft and robbery: the need for government action and international coordination. Crime Science, 4(1), 1-11. Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 22 / 46
  • 23. Summary Attack has not been observed in real networks. Research was done on protocol level and publicly available information. Not all EIRs affected. Business case exist for the attack. Check IMEI command can be added to the list of message to be filtered by an SS7 specific firewall in the STP at the border of the network, since this is a network internal message. Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 23 / 46
  • 24. Part 2: LTE/Diameter attacks LTE and Diameter attacks Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 24 / 46
  • 25. Motivation Most MNO upgrade their network gradually to avoid service interruption and optimize ROI of infrastructure. Inhomogeneous set-up =⇒ interesting attack vectors. For interoperability with partners, edge nodes have the ability to translate between Diameter ⇐⇒ SS7. Attack translation We wanted an easy way to port SS7 attacks to Diameter. Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 25 / 46
  • 26. Ideal Diameter Network Figure : Diameter roaming architecture between two newer networks. Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 26 / 46
  • 27. Inhomogeneous Network Figure : Different networks with different protocol support. Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 27 / 46
  • 28. Interworking functions Technical specification TS 29.305 and non-binding report TR 29.805. Describes how Diameter and SS7-MAP messages should be translated to each other i.e. Attribute Value Pairs (AVP) mapping. General idea: Attacker pretends to be an old type network or node. It forces IPSec secured LTE Diameter network or nodes into using the less secured SS7-MAP. Craft SS7-like attack messages and IWF will take care of the rest. Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 28 / 46
  • 29. Obtaining IMSI Attacker claims to be an IWF node The attacker sends a Send Routing Info For SM-Request (SRI SM), which contains the MSISDN of the victim. Typical multi-domain support scenario for roaming and routing incoming SMS. MAP commands have to be translated to Diameter specific commands by the receiving IWF node. Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 29 / 46
  • 30. Obtaining IMSI(2) The IWF (in step 5) copies IMSI of the victim from username AVP from SRA to SRI SM ACK. TS 29.338 section 6.3.2 and TS 29.305 section A2.5.2.3 Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 30 / 46
  • 31. LTE Location disclosure attacks summary SS7 attack vector IWF Attack? Reason MAP SRI No Very few operators connect HSS directly to DEA or inter- connection. MAP SRI SM Yes Location upto granularity of MME. MAP ATI No IWF cannot directly map ATI commands. Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 31 / 46
  • 32. LTE Location disclosure attacks summary (2) MAP PSI Yes EPS Location Info i.e. cell ID, subscriber state, IMEI, software version and encryp- tion keys. Emergency calls (PSL) No IWF cannot directly map PSL commands. More Details at IFIP Networking 2016 Look for our paper - “User Location Tracking Attacks for LTE Net- works Using the Inteworking Functionality” Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 32 / 46
  • 33. Part 3: Surveillance Surveillance and Signalling systems Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 33 / 46
  • 34. Bigger problems beyond targeted attacks Easy remote access to mobile user data ⇐⇒ Mass surveillance. NSA exploited loopholes in Radio Access Network (IMSI catchers) to target specific personnel. Exploited core networks and signalling systems worldwide to track cellphone locations of ”Co-travellers”. Collected 5 billion records per day. To find and develop more targets. ”Co-travller” was a sophisticated end-to-end surveillance system to collect and analyze data from signalling systems. Psychology, the new kind of SIGINT: frequent power-down, handset swapping and SMS styles to analyse the behaviour of mobile users. Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 34 / 46
  • 35. Co-traveller surveillance system overview Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 35 / 46
  • 36. Types of data collected Dialed Number Recognition (DNR) Information collected from mobile phone network. Location data, encryption keys, etc. Digital Network Intelligence (DNI) Information collected from mobile phone Internet. e.g. Google location tracking cookie PREFID. Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 36 / 46
  • 37. FASCIA database Big database to dump meta-data from various sources. Device-location records −→ 27 TB of data (over months). Cellular identifiers: LAC, CelllD, VLR, IMEI, IMSI, TMSI, MSISDN, MSRN, MSC/VLR GT. Encryption parameters: Kc, Rand, Sres Various other parameters from core network and RAN. Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 37 / 46
  • 38. Backend processing platforms Juggernaut Digital Receiver Technology, Inc. (DRT) surveillance systems Intercepts both SS7 traffic and air interface traffic. TUSKATTIRE Meta-data cleaning, processing and normalizing the collected Call-Related Data (CDR) i.e. Dailed Number Recognition. Ghost machine Hadoop based cloud analytic platform. It can handle multiple analytic features at a time. Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 38 / 46
  • 39. Co-traveller workflow 1 Start with a selector (target) with his IMSI. 2 Query the database for CellID, LAC and MSC/VLR details on specific day and time. 3 Query for the IMSIs of all the mobile users who were in the vicinity of that region (cell or MSC region) at that point of time - They are the potential co-travellers. 4 Query as as in step 1 and rank the potential co-travellers to be the real co-travellers by comparing the pattern of travel, cellular usage and life style with or without the direct connection to the selector. P.S: They do some serious datamining and pattern analysis/matching here. 5 Continue tracking everyone :) Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 39 / 46
  • 40. Why Nation-State Malwares Target Telco Networks? Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 40 / 46
  • 41. Is there any room for more surveillance-like attacks? Snowden revelations have definitely alerted many, especially the security researchers. Relatively easy to detect and alert (if not prevent) the attacks from RAN. e.g: IMSI Catchers SnoopSnitch, Darshak More difficult to know if the attack happens from the core network side - at least for the end users. So they rely on Telcosec experts to protect their privacy. More attacks paradigms would help to achieve ’security by design’ approach in future mobile generations. More room for remote injection or stealing of cellular secrets from mobile users on a mass scale? - Possibly yes. Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 41 / 46
  • 42. USSD based attacks Unstructured Supplementary Service Data (USSD) −→ cost effective, faster (than SMS) and flexible mechanism. Real time (session based) communication channel −→ suitable for interactive menu based services. Supported by majority of the phones - Neither phone based nor SIM based. Works on both home and roaming networks without extra charge. Earlier talk by Ravi at Troopers on Dirty use of USSD codes, attacks using USSD insecurity. Can we convert dirty USSD to nasty USSD? Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 42 / 46
  • 43. Network Initiated USSD operation Ongoing work - open research questions/ study of emerging threats. Push-Service mode or Network-Initiated USSD: The network sends USSD message towards the mobile station. HLR, MSC or VLR can initiate it −→ as a request seeking the MS to respond or as a notification without the MS intervention. Easy to flood/infect a large number of cellphones in a MSC/VLR region. Some specifications talk about using USSD for OS updates as well. Trying to steal OTA keys? SIM related secrets? If yes, then it is a big mess!!! Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 43 / 46
  • 44. Conclusion The SS7 saga continues =⇒ It will haunt us for some more years. LTE attacks =⇒ It is possible to port SS7 attacks to Diameter network using Interworking functions. IMSI disclosure Location tracking upto MME as well as cellID level. IMEI and OS software version disclosure. Bigger threats of surveillance and Advanced Persistent Threats (APTs) via Telco backbones. Emphasis in future should be on ’Security by design’. Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 44 / 46
  • 45. References S.P.Rao (2015) Unblocking Stolen Mobile Devices Using SS7-MAP Vulnerabilities: Exploiting the Relationship between IMEI and IMSI for EIR Access Trustcom/BigDataSE/ISPA, 2015 IEEE, Helsinki, 2015, 1171–1176. TS 29.305 InterWorking Function (IWF) between MAP based and Diameter based interfaces 3rd Generation Partnership Project (3GPP) A.Soltani (2015) Snowden files: NSA series Washington Post Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 45 / 46
  • 46. Thank you! Sid Rao (Aalto/Nokia) Evolution of Telco Attacks TelcoSec Day, Troopers16 46 / 46