new attack vectors for mobile core networks · - functionality similar to ss7, but protocol is...

49
© 2018 Nokia 1 New Attack Vectors for Mobile Core Networks Silke Holtmanns, Isha Singh Cyber Security Team Espoo 29.11.2018

Upload: others

Post on 19-Apr-2020

15 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

© 2018 Nokia1

New Attack Vectors for Mobile Core Networks

Silke Holtmanns, Isha Singh

Cyber Security Team Espoo

29.11.2018

Page 2: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

2 <Change information classification in footer> © Nokia 2016Bell Labs

Bell Labs

Industrial Security Research?

Page 3: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

3

Bell Labs

• Theoretical studies go into attack and

countermeasure design

• Validation and awareness of our research

by GSMA standards input and publication

• Customer feedback and test results allow

us to fine-tune and optimize our

countermeasures

• Research input will fit product needs and

operators requests

• Operator needs can be discovered ”live”

for new research challenges and

disruptive new solutions

Nokia Bell Labs – Future Attacks and MitigationResearch that solves real problems together with our customers and sometimes even competitors

LabProblem study /Threats/Attack

Design AttackTesting

Countermeasures

Validation and Awareness

CustomerFeedbackProduct Improvements

Bell Labs Research Lifecycle

Page 4: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

4 <Change information classification in footer> © Nokia 2016Bell Labs

Bell Labs

A brief history of roaming

Page 5: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

5

Bell Labs

Roaming

Source: Mondial Location Finder, National Geographics, Wikipedia

You connected to

3 Austria, T-Mobile, A1

DeepSec

participants

CMCC, Airtel,

MegaFon, Telenor

My colleagues,

friends, family

connected to DNA,

Elisa, Telia

Page 6: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

6

Bell Labs

Connecting networks – The ”hidden private Internet”

The Interconnection Network (IPX)

Page 7: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

7

Bell Labs

I switch on my phone

ViennaAntenna Core Network

Carrier / IPX

Core Network

Authentication -> run to home networkChecking subscriber

Page 8: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

8

Bell Labs

The start of roaming

Handful of Nordic Operators

Page 9: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

9

Bell Labs

Global Mobile Phone Core Networks

Organically grown structure – Connect them all…..

PCRF

2G(G)MSC

HLR

MTP

SS7

MAP

GSM SCTP

SIGTRAN

VLR

IoT

S/GGSN

GTP

SBA

GRX S9

Sh

S6a

IMS

MME

HSS

Cx

AS

OCS

CSCF

IPX

SIP

IF B, C, E, F

Rx

SMF

AMF

AF

N8

N32

UDM

GPRS

SEPP

Page 10: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

© 2018 Nokia10<Change information classification in footer> © Nokia 2016

▪ Roaming network established more than 37 years ago between a few state owned operators

▪ Build on trust (closed private network)

▪ No inbuilt security (in particular, no sourceauthentication)

▪ Nowadays about 2000 partners

▪ SS7 protocol stack was constantly extended for new services and features

▪ Now moving towards LTE/Diameter (3G/4G)

▪ 5G Service Based Architecture at the horizont

History of Interconnection Networks

Page 11: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

11

Bell Labs

<Change information classification in footer> © Nokia 2016

Closed & Private Network?

Page 12: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

12

Bell Labs

How do attackers get in

Rent a Service

Kick in the door

Hack via Internet Social Engineering

Become an Operator

Bribing an Employee

Page 13: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

© 2018 Nokia13<Change information classification in footer> © Nokia 2016

Even our ”friends & partners”

Page 14: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

© 2018 Nokia14<Change information classification in footer> © Nokia 2016

GTP Internet Scanner

GPRS Transfer Protocol (GTP)

Page 15: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

15 <Change information classification in footer> © Nokia 2016Bell Labs

Bell Labs

Protocol and Attack Evolution

Page 16: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

© 2018 Nokia16<Change information classification in footer> © Nokia 2016

Attacks are realityWhy should attackers stop? Because we have 4G or 5G?

• Intelligence communities use mobile networks as a way for VIP tracking and eavesdropping

• Dark Service companies use Interconnection to make money (fraud, SMS interception, location tracking offerings)

• Military uses mobile network data for target localization

Page 17: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

17

Bell Labs

Existing Attacks for the ”old” SS7

• Location Tracking

• Eavesdropping

• Fraud

• Denial of Service user & network

• Credential theft

• Data session hijacking (GTP)

• Unblocking stolen phone

• SMS interception

• One time password theft and account

takeover for banks, Telegram, Facebook,

Whatsapp, g-mail (bitcoin)

If no protection is deployed

Page 18: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

18

Bell Labs

• Standards:

- GSMA IR.88, FS.07, FS.11

- CVE program

• Regulations:

- Nordic Countries, EU ENISA, US FCC

• Products:

- SS7 ”understanding” firewalls

- Security functionalities in Core Network

nodes

• Services:

- Telco penetration testing

• Public community

- SS7 on github

<Change information classification in footer> © Nokia 2016

Countermeasures (SS7)

Page 19: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

© 2018 Nokia19<Change information classification in footer> © Nokia 2016

- Functionality similar to SS7, but protocolis different

- When in 2014 the SS7 attacks becameknown, also attention was paid to diameter

- Highest priority was SS7 as it was themost commonly used protocol

- Diameter was soon also tackled

- Countermeasures, filters and monitoringapproaches exist

- Global trust problem still causingdifficulties

3G/4G Diameter Based Communication Attacks

2G SS7

5G Rest API

3G/4G Diameter

Page 20: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

© 2018 Nokia20<Change information classification in footer> © Nokia 2016

- Attacks are more ”operator specific”

- Depend strongly on actualconfiguration and deployement

- 3G/4G IPX is used by moreprogressive operators

- Attacks

- Location Tracking (CyCon)

- Fraud (DefCon)

- Data Interception (CCC)

- DoS of subscriber (Blackhat)

3G/4G Diameter Based Communication

Page 21: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

21 <Change information classification in footer> © Nokia 2016Bell Labs

Bell Labs

How do 3G/4G attacks work?

Example: Charging Attack

Page 22: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

22

Bell Labs

UE eNB

MME

HSS

SGW

PCRF

PGW

S9

Network used for testing of attack

Page 23: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

23

Bell Labs

S9

Operator A

Operator B

Operator F

Operators with connected 3G/4G S9 charging interface

IPX

Page 24: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

24

Bell Labs

Page 25: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

25

Bell Labs

Visited -

PCRF

Home -

PCRF

S9

CCR

CCA

RAR

RAA

Credit Control Request- Money?- What kind of service?

Re-Authentication Request- All kind of control and

information- PCC management

Normal incoming request for roaming (Fin in Austria)

Page 26: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

26

Bell Labs

• Policy Charging Control

- Defines everything about your subsription

- Data type

- Data rates

- Whatever cellular service you can think off

• Defines how to handle you and what to grant you ”service flow filters”

• Usually identified by a string

• My own subscription is company paid and quite ”generous”

- Perfect target for an attacker

What is a ”PCC”?Something you all have

Page 27: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

27 <Change information classification in footer> © Nokia 2016Bell Labs

Bell Labs

Attack

1. Steal PCC of good subscription

2. Update cheap subscription with PCC of good subscripion

Page 28: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

28

Bell Labs

H-PCRFH-PCRFS9

RAR

RAA

Re-Authentication Request (RAR)- IMSI

Re-Authentication Answer (RAA)- QoS-Rule-Install AVP

Attacker

Requesting PCC via RAR (posing as home network)

Page 29: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

29

Bell Labs

Page 30: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

H-PCRFH-PCRFS9

RAR

RAA

Attacker

Re-Authentication Request- QoS-Rule-Install

Answer does not matter

Attack Scenario 1: Putting PCC via RAR (posing as home network)

Page 31: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

31

Bell Labs

H-PCRFV-PCRFS9

RAR

RAA

Re-Authentication Request (RAR)- IMSI

Re-Authentication Answer (RAA)- QoS-Rule-Install AVP

Attacker

Attack Scenario 2: Putting PCC via RAR to outgoing roamer

Page 32: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

32

Bell Labs

Page 33: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

33

Bell Labs

Page 34: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

34

Bell Labs

Before and After

Page 35: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

35

Bell Labs

Countermeasures for 2G/3G/4G (reality is never easy….)

MitigateGSMA IR88,FS.11,FS.19,FS.07

Signaling & IP FirewallSMS Home Routing

CooperateShare experiences (GSMA)Business rules / contracts

Cooperation with legislators

PrepareBudget, policies & plansLayered / Zoned Security

Node hardening/procedures

DetectMonitor network trafficPenetration & re-testing

Tenant monitoring

Page 36: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

36 <Change information classification in footer> © Nokia 2016Bell Labs

Bell Labs

What about 5G Core Network?

Work ahead

Page 37: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

37

Bell Labs

• 5G protects user privacy on the air interface

- Various protections against false base stations

• Unified security standards also for non-cellularaccess

• 5G Standards have introduced a new securityproxy for roaming

• Security functionalities can now be virtualized

• Steering of roaming can be used to guide users to the best partners

• Security is more then standards & functions!

Security is a road

Page 38: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

© 2018 Nokia38

Inter-operator signalling (HTTP REST API calls)

38

SEPP: Security Edge Protection Proxy

• A SEPP is a non-transparent proxy on the roaming, inter-PLMN interfaces.• A SEPP validates, modifies, and protects every HTTP packet sent between two

roaming partners’ SBA Network Functions (NFs).

Service

Based

Architecture

Page 39: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

© 2018 Nokia39

REST API – Authentication vs Authorization?

How does the receiving network know that all therequested info elements ”make sense” for this TLS tunnel with this partner e.g. location, IMSI, keys

What elements would you allow your partners to create? Charging? New users?

Prepaid to postpaid? Malcious location ”update”? ChangingMSISDN? What replacements are ok? Code insertion?

Delete subscriber data?

Page 40: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

© 2018 Nokia40 <Change information classification in footer> © Nokia 2016

Who is allowed to do what?Security requires configurations & policies!

Rogue partner node Is doing ”something”Talking to your main database

And you have to check in the node, if he is allowed to do that

Fraud? Location tracking?

Fraud? Data interception?

Page 41: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

© 2018 Nokia41

Rest API – Vulnerabilities are ”known”Welcome to the Internet

Remote code execution

Data stealing, authorization fail

DoS

Fraud, data theft

DoS Network? Priviledge escalation

Page 42: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

© 2018 Nokia42

Will the vulnerable nodes be found?Not will, only when and how fast is the question

Page 43: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

© 2018 Nokia43 <Change information classification in footer> © Nokia 2016

Pay attention to little details - configurations…..

the requested resource allows sharing with every origin. This basically means that any site can send an request and access the server’s response

Supports info pulling, info putting and deletion

That is the software + version they use

They support RestAPI

Page 44: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

© 2018 Nokia44

Somebody paid attention to the detailsBut not the right persons….

Page 45: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

© 2018 Nokia45 © 2018 Nokia45

Going back is not an option

So let’s move forward and pay attention to security……

Page 46: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

© 2018 Nokia46

• Production Security Testing

• Software composition sec analysis

• Code sec review

• Port scanning / vuln scan

• Web app / OWASP sec scan

• Robustness testing (fuzzy)

• DoS testing

• Preparedness

• Incident response plans

• Network segmentation and zoning (FWs)

• Patching plan / contract with vendor

• Keep up to date (GSMA)

Security is a road 5G – To Do List

• Deployment & Operation

- Authorization internally

- Authorization settings with partners

• Who is allowed to send what messages / recevie whatinformation (conversion contracts -> access control)

- Clean ”IT” housekeeping

• Internal / external DNS

• Separation of roamers and own

• Only the right ports / interfaces open

• Validation & Lifecycle

- PenTesting to see if things really hold (regularly as things change)

- Algorithm retirement

- Deployment change, when things change (employeeleaves company, partner contract ends etc)

Page 47: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

47 <Change information classification in footer> © Nokia 2016Bell Labs

Bell Labs

Thanks to

EU SCOTT Project for funding part of this research

[email protected]

Page 48: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter

48 <Change information classification in footer> © Nokia 2016Bell Labs

Let’s go swimmingQuestions…

Page 49: New Attack Vectors for Mobile Core Networks · - Functionality similar to SS7, but protocol is different - When in 2014 the SS7 attacks became known, also attention was paid to diameter