SlideShare a Scribd company logo
1 of 25
Download to read offline
SRLabs Template v12
Mobile threats evolution
Luca Melette <luca@srlabs.de>
Agenda
1
 Attacks over the air
 Attacks over the wire
 How to protect yourself
Mobile communications have been secretly intercepted for decades
2
Stationary catcher
(1990)
Handheld catcher
(2015)
Portable catcher
(2000)
IMSI Catchers are the famous devices operated by police and intelligence
agencies to locate and spy on mobile users, since the beginning of GSM
GSM interception is now available to the masses
3
Years of research unearthed important GSM vulnerabilities and
produced low cost IMSI catchers and passive interception systems
OsmoSDR/Airprobe
USB DVB-T stick
< $10
(2015)
CalypsoBTS/OsmocomBB
Motorola C123
$20-$50
(2010)
OpenBTS/Airprobe
USRP + RFX900
$1000
(1998)
Listening to broadcast channels can disclose local user identities
4
Mitigation
 Avoid paging by IMSI as much as possible
 Frequently refresh TMSIs
Risk
 Detect user presence
 Use IMSIs for further attacks
Source code: git://git.osmocom.org/osmocom-bb
IMSI?
IMSI?
IMSI?
IMSI?
Broadcast
channel
Passive GSM intercept is still a major privacy risk in many countries
5
Mitigation
 Adopt randomization techniques
 Use a strong cipher (A5/3 or A5/4)
Risk
 Intecept calls and SMS
 Follow user movements
Tutorial: https://srlabs.de/decrypting_gsm
Source code: https://opensource.srlabs.de/projects/a51-decrypt
In the past two years
we found networks
using no encryption
in these countries:
Cambodia, China,
Hong Kong, India,
Israel, Kyrgyzstan,
Lebanon, Morocco,
Myanmar, Pakistan,
Vietnam
Voice/SMS
Encrypted
frames
Decrypted
voice/SMSKraken
The common GSM encryption standard
A5/1 can be cracked with rainbow tables
in a normal PC with a GPU and 2TB disk,
while A5/2 can be cracked very quickly
even only using bruteforce on a CPU
GPRS settings (mobile data) can greatly differ from voice and SMS
6
Mitigation
 Double check radio security settings
 Use a strong cipher (GEA/3 or GEA/4)
Risk
 Intecept mobile data traffic
 Follow user movements
Tutorial: https://srlabs.de/gprs
Mobile Internet
Some operators surprisingly forget to turn on
encryption on GPRS (or even UMTS) leaving
passive sniffers full access to mobile Internet
Missing authentication enable user impersonation and frauds
7
Mitigation
 Always require user authentication
 Move to a more recent radio generation
Risk
 Spoof caller ID for calls and SMS
 Send premium SMS (fraud)
No code available
SMS for TMSI
0x8a13b0cf
Call from TMSI
0x8a13b0cf
(1)
(3)
Step 1: Capture some call or
SMS directed to the victim
(2)
Step 2: Recover the key if
transaction was encrypted
Step 3: Start a call or send
SMS impersonating the
victim with TMSI and key
A similar attack can be applied to mobile terminated traffic
Rogue base stations can massively collect user identities
8
Mitigation
 Monitor radio traffic to detect anomalies
 Force mobile to use only 3G/4G networks
Risk
 Collect user identities in that area
 Use IMSIs for further attacks
Source code: http://openbts.org/get-the-code
CID 3
LAC 9
f 6
High power
LUR
Time IMSI IMEI LAC/TA
13:37:37 22288... 35612... 1 / 2
13:37:42 22201... 01851... 1 / 1
The catching process works as follows:
1. The victim is attracted by the catcher
due to the strong signal.
2. The fake tower requests all the relevant
information of the user and device
3. The victim is pushed back to the original
cell and gets normal coverage as before
4. No evidence is left on the mobile but
the catcher has a full log of users
More sophisticated fake cell towers can take full control of users
9
Mitigation
 Monitor radio traffic to detect anomalies
 Force mobile to use only 3G/4G networks
Risk
 Intercept voice/SMS/mobile data
 Manipulate traffic in both directions
No code available
Victim Real
Network
Communication
forced to weak
encryption in
order to crack the
key in realtime
Call/SMS logging
and manipulation
The real network can enforce
strong encryption and perform
authentication, as the victim
can provide valid responses for
any sort of request
Kraken
Persistent malware on the SIM can be remotely installed via SMS
10
Mitigation
 Patch vulnerable SIM cards
 Block binary SMS from unknown origins
Risk
 Intercept voice/SMS/mobile data
 User location tracking (fine-grained)
Tutorial: https://srlabs.de/rooting-sim-cards
Source code: https://opensource.srlabs.de/git/SIMtester.git
Low security and software
bugs provide the attacker a
completely stealth remote
location tracking system or
decryption oracle
A special broken binary SMS
transparently reaches the
SIM and make the mobile
send a signed response that
is crackable by the attacker
Using rainbow tables
DES signatures can
be cracked and the
attacker gains admin
privilege on the SIM
Agenda
11
 Attacks over the air
 Attacks over the wire
 How to protect yourself
Mobile operators share their subscribers data over trusted clouds
12
Voice, SMS, USSD
Signalling (SS7)
Mobile Internet
and MMS (GRX)
Net 1
Net 2
Net 3
Net 4
Country B
Country A
Only members of the GSM Association
should have access to these clouds
Public
Internet
User location tracking is cheap and widely available on the Internet
13
Mitigation
 Operators to deploy SMS home routing
 Block requests from untrusted sources
Risk
 User location retrieval (coarse position)
 Entirely stealth and remote tracking
Slides: https://berlin.ccc.de/~tobias/25c3-locating-mobile-phones.pdf
Many providers
online offer HLR
lookups for just a
few dollar cents
Try on google:
hlr lookup
Starting from a
mobile number
one can visualize
which state and
city the mobile
user is currently
visiting
Fine-grained position is obtainable with roaming related requests
14
Mitigation
 Deploy SS7 filtering at network borders
 Block requests from untrusted sources
Risk
 User location retrieval (fine-grained)
 Remote tracking (not always stealth)
Slides: http://berlin.ccc.de/~tobias/31c3-ss7-locate-track-manipulate.pdf
SS7
Net 1
Net 2
Victim
Dear Net 1, my subscriber
Victim is currently roaming in
your network, could you tell me
where and if it’s in a call?
Sure! Dear Net 2, your Victim is
currently served by a cell near
the Tour Eiffel and it’s not in a call
Trusted network relations can ease spam and frauds attempts
15
Mitigation
 Check plausibility of user requests
 Block requests from untrusted sources
Risk
 User impersonation (call/SMS fraud)
 Mass SMS advertisement delivery
SS7
Net 1
Net 2
Victim
Dear Net 1, your user Victim is
visiting me, can you give me his
full profile? And also, he wants
to send an SMS to ...
Dear Net 2, here is the profile
and thanks for the SMS, I will try
to deliver it and bill it to Victim
Strong encryption can be defeated by trusted key handovers
16
Mitigation
 Block internal-only SS7 requests
 Accept only speakers from a whitelist
Risk
 Capture and decrypt user traffic
 Reuse keys to spoof legitimate towers
Slides:https://events.ccc.de/congress/2014/Fahrplan/system/attachments/2493/or
iginal/Mobile_Self_Defense-Karsten_Nohl-31C3-v1.pdf
SS7
Net 1
Net 2
Victim
Dear Net 1, I need immediately
the encryption key to connect a
call of your subscriber Victim
that is coming towards me
Dear Net 2, sure! Here is the key
and all the rest you need to keep
the call going, good luck!
Voice and SMS can be remotely intercepted in several ways
17
Mitigation
 Perform smart SS7 plausibility checks
 Accept only speakers from a whitelist
Risk
 Intercept calls and SMS
 Manipulate/spoof user traffic
Video: www.9jumpin.com.au/show/60minutes/stories/2015/august/phone-hacking
SS7
Net 1
Net 2
Victim
Dear cell XXX, forget what Net 1
said about Victim, he wants now
to forward all his calls to me
Father
Father tries to call Victim but the
call is immediately rerouted to the
attacker that can start recording
and forward it to the Victim
Mobile data can also be remotely diverted, blocked and spoofed
18
Mitigation
 Block internal-only GTP requests
 Accept only speakers from a whitelist
Risk
 Intercept mobile data (Internet)
 Manipulate/spoof user traffic
Slides:https://events.ccc.de/camp/2015/Fahrplan/system/attachments/2649/origi
nal/CCCamp-SRLabs-Advanced_Interconnect_Attacks.v1.pdf
GRX
(or Internet)
Net 1
Net 2
Victim
Dear Net 1, your user Victim is
visiting me, can you give me his
current IP and make me the
owner of it?
Dear Net 2, here is the current IP and
connection settings for Victim, now it’s all
yours, and here are some packets for him
Agenda
19
 Attacks over the air
 Attacks over the wire
 How to protect yourself
GSM Map allows users to compare security in several countries
20
Security levels are summarized in a chart and detailed in a report
21
A similar world map shows risk levels associated to SS7 exposure
22
SnoopSnitch monitors network anomalies and attack attempts
23
It currently shows: network security levels (intercept, impersonation), IMSI
catcher events, SS7 attacks, reception of malicious SMS (silent & binary)
Take aways
24
Questions?
Luca Melette <luca@srlabs.de>
 Many vulnerabilities found in the past
years are still a threat for mobile users
 Network operators worldwide should
improve their security to prevent abuse
 Attack tools are available to researchers,
and criminals are not far behind them

More Related Content

What's hot

Global Botnet Detector
Global Botnet DetectorGlobal Botnet Detector
Global Botnet DetectorBrenton Mallen
 
A Brief Incursion into Botnet Detection
A Brief Incursion into Botnet DetectionA Brief Incursion into Botnet Detection
A Brief Incursion into Botnet DetectionAnant Narayanan
 
Attacks you can't combat: vulnerabilities of most robust MNOs
Attacks you can't combat: vulnerabilities of most robust MNOsAttacks you can't combat: vulnerabilities of most robust MNOs
Attacks you can't combat: vulnerabilities of most robust MNOsPositiveTechnologies
 
Secuvoice SNS - Christoff Erdman
Secuvoice SNS - Christoff ErdmanSecuvoice SNS - Christoff Erdman
Secuvoice SNS - Christoff ErdmanFox-IT
 
Botnet Detection Techniques
Botnet Detection TechniquesBotnet Detection Techniques
Botnet Detection TechniquesTeam Firefly
 
Technical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - englishTechnical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - englishPrivateWave Italia SpA
 
Secure your Voice over IP (VoIP)
Secure your Voice over IP (VoIP)Secure your Voice over IP (VoIP)
Secure your Voice over IP (VoIP)Techso
 
Sectechbiz Is A Uae Based Company
Sectechbiz Is A Uae Based CompanySectechbiz Is A Uae Based Company
Sectechbiz Is A Uae Based CompanySectechbiz
 
FortressFone Overview 012915
FortressFone Overview 012915FortressFone Overview 012915
FortressFone Overview 012915Tom Malatesta
 
Botnets presentation
Botnets presentationBotnets presentation
Botnets presentationMahmoud Ibra
 
A Survey of Botnet Detection Techniques
A Survey of Botnet Detection TechniquesA Survey of Botnet Detection Techniques
A Survey of Botnet Detection Techniquesijsrd.com
 
GSM security solution by FINETUNE Technologies
GSM security solution by FINETUNE TechnologiesGSM security solution by FINETUNE Technologies
GSM security solution by FINETUNE TechnologiesEngr.MEESHU SHARKER
 
Gsm security
Gsm securityGsm security
Gsm securitymaicuong8
 
A review botnet detection and suppression in clouds
A review botnet detection and suppression in cloudsA review botnet detection and suppression in clouds
A review botnet detection and suppression in cloudsAlexander Decker
 

What's hot (19)

Global Botnet Detector
Global Botnet DetectorGlobal Botnet Detector
Global Botnet Detector
 
A Brief Incursion into Botnet Detection
A Brief Incursion into Botnet DetectionA Brief Incursion into Botnet Detection
A Brief Incursion into Botnet Detection
 
Attacks you can't combat: vulnerabilities of most robust MNOs
Attacks you can't combat: vulnerabilities of most robust MNOsAttacks you can't combat: vulnerabilities of most robust MNOs
Attacks you can't combat: vulnerabilities of most robust MNOs
 
Secuvoice SNS - Christoff Erdman
Secuvoice SNS - Christoff ErdmanSecuvoice SNS - Christoff Erdman
Secuvoice SNS - Christoff Erdman
 
Botnet Detection Techniques
Botnet Detection TechniquesBotnet Detection Techniques
Botnet Detection Techniques
 
BOTNET
BOTNETBOTNET
BOTNET
 
On the verge of fraud
On the verge of fraudOn the verge of fraud
On the verge of fraud
 
Technical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - englishTechnical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - english
 
Secure your Voice over IP (VoIP)
Secure your Voice over IP (VoIP)Secure your Voice over IP (VoIP)
Secure your Voice over IP (VoIP)
 
Sectechbiz Is A Uae Based Company
Sectechbiz Is A Uae Based CompanySectechbiz Is A Uae Based Company
Sectechbiz Is A Uae Based Company
 
FortressFone Overview 012915
FortressFone Overview 012915FortressFone Overview 012915
FortressFone Overview 012915
 
Botnets
BotnetsBotnets
Botnets
 
Botnets presentation
Botnets presentationBotnets presentation
Botnets presentation
 
Botnets
BotnetsBotnets
Botnets
 
A Survey of Botnet Detection Techniques
A Survey of Botnet Detection TechniquesA Survey of Botnet Detection Techniques
A Survey of Botnet Detection Techniques
 
GSM security solution by FINETUNE Technologies
GSM security solution by FINETUNE TechnologiesGSM security solution by FINETUNE Technologies
GSM security solution by FINETUNE Technologies
 
SS7 Vulnerabilities
SS7 VulnerabilitiesSS7 Vulnerabilities
SS7 Vulnerabilities
 
Gsm security
Gsm securityGsm security
Gsm security
 
A review botnet detection and suppression in clouds
A review botnet detection and suppression in cloudsA review botnet detection and suppression in clouds
A review botnet detection and suppression in clouds
 

Similar to 2015.11.06. Luca Melette_Mobile threats evolution

Voice communication security
Voice communication securityVoice communication security
Voice communication securityFabio Pietrosanti
 
Hack.lu 2016 - 2G and 3G intercom hacking
Hack.lu 2016 - 2G and 3G intercom hackingHack.lu 2016 - 2G and 3G intercom hacking
Hack.lu 2016 - 2G and 3G intercom hacking📡 Sebastien Dudek
 
SS7: Locate -Track - Manipulate Attack - SPY24™.pdf
SS7: Locate -Track - Manipulate Attack - SPY24™.pdfSS7: Locate -Track - Manipulate Attack - SPY24™.pdf
SS7: Locate -Track - Manipulate Attack - SPY24™.pdfSPY24
 
GSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj VermaGSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj VermaOWASP Delhi
 
Fake BTS Network Vulnerabilities
Fake BTS Network VulnerabilitiesFake BTS Network Vulnerabilities
Fake BTS Network VulnerabilitiesSecurity Gen
 
Making your Asterisk System Secure
Making your Asterisk System SecureMaking your Asterisk System Secure
Making your Asterisk System SecureDigium
 
WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC SecurityAlex Hunte
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTCQuobis
 
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIESEFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIESIJNSA Journal
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate ITPeter Wood
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comchrist university
 
J.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the EnterpriseJ.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the EnterpriseDroidcon Berlin
 
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Zarafa
 

Similar to 2015.11.06. Luca Melette_Mobile threats evolution (20)

Voice communication security
Voice communication securityVoice communication security
Voice communication security
 
Hack.lu 2016 - 2G and 3G intercom hacking
Hack.lu 2016 - 2G and 3G intercom hackingHack.lu 2016 - 2G and 3G intercom hacking
Hack.lu 2016 - 2G and 3G intercom hacking
 
Gsm Srsly (Shmoocon)
Gsm  Srsly (Shmoocon)Gsm  Srsly (Shmoocon)
Gsm Srsly (Shmoocon)
 
Test
TestTest
Test
 
SS7: Locate -Track - Manipulate Attack - SPY24™.pdf
SS7: Locate -Track - Manipulate Attack - SPY24™.pdfSS7: Locate -Track - Manipulate Attack - SPY24™.pdf
SS7: Locate -Track - Manipulate Attack - SPY24™.pdf
 
GSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj VermaGSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj Verma
 
33c3 - 2G and 3G intercom attacks
33c3 - 2G and 3G intercom attacks33c3 - 2G and 3G intercom attacks
33c3 - 2G and 3G intercom attacks
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
 
Fake BTS Network Vulnerabilities
Fake BTS Network VulnerabilitiesFake BTS Network Vulnerabilities
Fake BTS Network Vulnerabilities
 
B010331019
B010331019B010331019
B010331019
 
Making your Asterisk System Secure
Making your Asterisk System SecureMaking your Asterisk System Secure
Making your Asterisk System Secure
 
WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC Security
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTC
 
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIESEFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
Clonning
ClonningClonning
Clonning
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.comMOBILE PHONE CLONING-Steginjoy2013@gmail.com
MOBILE PHONE CLONING-Steginjoy2013@gmail.com
 
J.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the EnterpriseJ.-P. Seifert; Security-Aware Android Applications for the Enterprise
J.-P. Seifert; Security-Aware Android Applications for the Enterprise
 
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011
 

More from Tech and Law Center

One step further in the surveillance society the case of predictive policing
One step further in the surveillance society the case of predictive policingOne step further in the surveillance society the case of predictive policing
One step further in the surveillance society the case of predictive policingTech and Law Center
 
Andrea Molino: Applicazione delle tecnologie ICT al settore Agricolo
Andrea Molino: Applicazione delle tecnologie ICT al settore AgricoloAndrea Molino: Applicazione delle tecnologie ICT al settore Agricolo
Andrea Molino: Applicazione delle tecnologie ICT al settore AgricoloTech and Law Center
 
Emanuela Pala: Internet of Things & Smart Agriculture
Emanuela Pala: Internet of Things & Smart Agriculture Emanuela Pala: Internet of Things & Smart Agriculture
Emanuela Pala: Internet of Things & Smart Agriculture Tech and Law Center
 
Tommaso De Gregorio: Growing Hazelnuts
Tommaso De Gregorio: Growing Hazelnuts Tommaso De Gregorio: Growing Hazelnuts
Tommaso De Gregorio: Growing Hazelnuts Tech and Law Center
 
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...Tech and Law Center
 
Cybersecurity & Digital Forensics / Dronitaly - 25 Ottobre 2014
Cybersecurity & Digital Forensics / Dronitaly - 25 Ottobre 2014Cybersecurity & Digital Forensics / Dronitaly - 25 Ottobre 2014
Cybersecurity & Digital Forensics / Dronitaly - 25 Ottobre 2014Tech and Law Center
 
Giuseppe Vaciago: From Crime to privacy-oriented crime prevention in the Big ...
Giuseppe Vaciago: From Crime to privacy-oriented crime prevention in the Big ...Giuseppe Vaciago: From Crime to privacy-oriented crime prevention in the Big ...
Giuseppe Vaciago: From Crime to privacy-oriented crime prevention in the Big ...Tech and Law Center
 
SECURITY OF THE DIGITAL NATIVES - Italian version
SECURITY OF THE DIGITAL NATIVES - Italian versionSECURITY OF THE DIGITAL NATIVES - Italian version
SECURITY OF THE DIGITAL NATIVES - Italian versionTech and Law Center
 
SECURITY OF THE DIGITAL NATIVES - English version
SECURITY OF THE DIGITAL NATIVES - English versionSECURITY OF THE DIGITAL NATIVES - English version
SECURITY OF THE DIGITAL NATIVES - English versionTech and Law Center
 
Android malware overview, status and dilemmas
Android malware  overview, status and dilemmasAndroid malware  overview, status and dilemmas
Android malware overview, status and dilemmasTech and Law Center
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
 
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)Tech and Law Center
 
The Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityThe Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityTech and Law Center
 
Legal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe VaciagoLegal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe VaciagoTech and Law Center
 

More from Tech and Law Center (15)

One step further in the surveillance society the case of predictive policing
One step further in the surveillance society the case of predictive policingOne step further in the surveillance society the case of predictive policing
One step further in the surveillance society the case of predictive policing
 
Andrea Molino: Applicazione delle tecnologie ICT al settore Agricolo
Andrea Molino: Applicazione delle tecnologie ICT al settore AgricoloAndrea Molino: Applicazione delle tecnologie ICT al settore Agricolo
Andrea Molino: Applicazione delle tecnologie ICT al settore Agricolo
 
Emanuela Pala: Internet of Things & Smart Agriculture
Emanuela Pala: Internet of Things & Smart Agriculture Emanuela Pala: Internet of Things & Smart Agriculture
Emanuela Pala: Internet of Things & Smart Agriculture
 
Tommaso De Gregorio: Growing Hazelnuts
Tommaso De Gregorio: Growing Hazelnuts Tommaso De Gregorio: Growing Hazelnuts
Tommaso De Gregorio: Growing Hazelnuts
 
Smart intelligence
Smart intelligenceSmart intelligence
Smart intelligence
 
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
 
Cybersecurity & Digital Forensics / Dronitaly - 25 Ottobre 2014
Cybersecurity & Digital Forensics / Dronitaly - 25 Ottobre 2014Cybersecurity & Digital Forensics / Dronitaly - 25 Ottobre 2014
Cybersecurity & Digital Forensics / Dronitaly - 25 Ottobre 2014
 
Giuseppe Vaciago: From Crime to privacy-oriented crime prevention in the Big ...
Giuseppe Vaciago: From Crime to privacy-oriented crime prevention in the Big ...Giuseppe Vaciago: From Crime to privacy-oriented crime prevention in the Big ...
Giuseppe Vaciago: From Crime to privacy-oriented crime prevention in the Big ...
 
SECURITY OF THE DIGITAL NATIVES - Italian version
SECURITY OF THE DIGITAL NATIVES - Italian versionSECURITY OF THE DIGITAL NATIVES - Italian version
SECURITY OF THE DIGITAL NATIVES - Italian version
 
SECURITY OF THE DIGITAL NATIVES - English version
SECURITY OF THE DIGITAL NATIVES - English versionSECURITY OF THE DIGITAL NATIVES - English version
SECURITY OF THE DIGITAL NATIVES - English version
 
Android malware overview, status and dilemmas
Android malware  overview, status and dilemmasAndroid malware  overview, status and dilemmas
Android malware overview, status and dilemmas
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)
 
The Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityThe Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the Singularity
 
Legal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe VaciagoLegal Aspect of the Cloud by Giuseppe Vaciago
Legal Aspect of the Cloud by Giuseppe Vaciago
 

Recently uploaded

Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxBipin Adhikari
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 

Recently uploaded (20)

Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptx
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 

2015.11.06. Luca Melette_Mobile threats evolution

  • 1. SRLabs Template v12 Mobile threats evolution Luca Melette <luca@srlabs.de>
  • 2. Agenda 1  Attacks over the air  Attacks over the wire  How to protect yourself
  • 3. Mobile communications have been secretly intercepted for decades 2 Stationary catcher (1990) Handheld catcher (2015) Portable catcher (2000) IMSI Catchers are the famous devices operated by police and intelligence agencies to locate and spy on mobile users, since the beginning of GSM
  • 4. GSM interception is now available to the masses 3 Years of research unearthed important GSM vulnerabilities and produced low cost IMSI catchers and passive interception systems OsmoSDR/Airprobe USB DVB-T stick < $10 (2015) CalypsoBTS/OsmocomBB Motorola C123 $20-$50 (2010) OpenBTS/Airprobe USRP + RFX900 $1000 (1998)
  • 5. Listening to broadcast channels can disclose local user identities 4 Mitigation  Avoid paging by IMSI as much as possible  Frequently refresh TMSIs Risk  Detect user presence  Use IMSIs for further attacks Source code: git://git.osmocom.org/osmocom-bb IMSI? IMSI? IMSI? IMSI? Broadcast channel
  • 6. Passive GSM intercept is still a major privacy risk in many countries 5 Mitigation  Adopt randomization techniques  Use a strong cipher (A5/3 or A5/4) Risk  Intecept calls and SMS  Follow user movements Tutorial: https://srlabs.de/decrypting_gsm Source code: https://opensource.srlabs.de/projects/a51-decrypt In the past two years we found networks using no encryption in these countries: Cambodia, China, Hong Kong, India, Israel, Kyrgyzstan, Lebanon, Morocco, Myanmar, Pakistan, Vietnam Voice/SMS Encrypted frames Decrypted voice/SMSKraken The common GSM encryption standard A5/1 can be cracked with rainbow tables in a normal PC with a GPU and 2TB disk, while A5/2 can be cracked very quickly even only using bruteforce on a CPU
  • 7. GPRS settings (mobile data) can greatly differ from voice and SMS 6 Mitigation  Double check radio security settings  Use a strong cipher (GEA/3 or GEA/4) Risk  Intecept mobile data traffic  Follow user movements Tutorial: https://srlabs.de/gprs Mobile Internet Some operators surprisingly forget to turn on encryption on GPRS (or even UMTS) leaving passive sniffers full access to mobile Internet
  • 8. Missing authentication enable user impersonation and frauds 7 Mitigation  Always require user authentication  Move to a more recent radio generation Risk  Spoof caller ID for calls and SMS  Send premium SMS (fraud) No code available SMS for TMSI 0x8a13b0cf Call from TMSI 0x8a13b0cf (1) (3) Step 1: Capture some call or SMS directed to the victim (2) Step 2: Recover the key if transaction was encrypted Step 3: Start a call or send SMS impersonating the victim with TMSI and key A similar attack can be applied to mobile terminated traffic
  • 9. Rogue base stations can massively collect user identities 8 Mitigation  Monitor radio traffic to detect anomalies  Force mobile to use only 3G/4G networks Risk  Collect user identities in that area  Use IMSIs for further attacks Source code: http://openbts.org/get-the-code CID 3 LAC 9 f 6 High power LUR Time IMSI IMEI LAC/TA 13:37:37 22288... 35612... 1 / 2 13:37:42 22201... 01851... 1 / 1 The catching process works as follows: 1. The victim is attracted by the catcher due to the strong signal. 2. The fake tower requests all the relevant information of the user and device 3. The victim is pushed back to the original cell and gets normal coverage as before 4. No evidence is left on the mobile but the catcher has a full log of users
  • 10. More sophisticated fake cell towers can take full control of users 9 Mitigation  Monitor radio traffic to detect anomalies  Force mobile to use only 3G/4G networks Risk  Intercept voice/SMS/mobile data  Manipulate traffic in both directions No code available Victim Real Network Communication forced to weak encryption in order to crack the key in realtime Call/SMS logging and manipulation The real network can enforce strong encryption and perform authentication, as the victim can provide valid responses for any sort of request Kraken
  • 11. Persistent malware on the SIM can be remotely installed via SMS 10 Mitigation  Patch vulnerable SIM cards  Block binary SMS from unknown origins Risk  Intercept voice/SMS/mobile data  User location tracking (fine-grained) Tutorial: https://srlabs.de/rooting-sim-cards Source code: https://opensource.srlabs.de/git/SIMtester.git Low security and software bugs provide the attacker a completely stealth remote location tracking system or decryption oracle A special broken binary SMS transparently reaches the SIM and make the mobile send a signed response that is crackable by the attacker Using rainbow tables DES signatures can be cracked and the attacker gains admin privilege on the SIM
  • 12. Agenda 11  Attacks over the air  Attacks over the wire  How to protect yourself
  • 13. Mobile operators share their subscribers data over trusted clouds 12 Voice, SMS, USSD Signalling (SS7) Mobile Internet and MMS (GRX) Net 1 Net 2 Net 3 Net 4 Country B Country A Only members of the GSM Association should have access to these clouds Public Internet
  • 14. User location tracking is cheap and widely available on the Internet 13 Mitigation  Operators to deploy SMS home routing  Block requests from untrusted sources Risk  User location retrieval (coarse position)  Entirely stealth and remote tracking Slides: https://berlin.ccc.de/~tobias/25c3-locating-mobile-phones.pdf Many providers online offer HLR lookups for just a few dollar cents Try on google: hlr lookup Starting from a mobile number one can visualize which state and city the mobile user is currently visiting
  • 15. Fine-grained position is obtainable with roaming related requests 14 Mitigation  Deploy SS7 filtering at network borders  Block requests from untrusted sources Risk  User location retrieval (fine-grained)  Remote tracking (not always stealth) Slides: http://berlin.ccc.de/~tobias/31c3-ss7-locate-track-manipulate.pdf SS7 Net 1 Net 2 Victim Dear Net 1, my subscriber Victim is currently roaming in your network, could you tell me where and if it’s in a call? Sure! Dear Net 2, your Victim is currently served by a cell near the Tour Eiffel and it’s not in a call
  • 16. Trusted network relations can ease spam and frauds attempts 15 Mitigation  Check plausibility of user requests  Block requests from untrusted sources Risk  User impersonation (call/SMS fraud)  Mass SMS advertisement delivery SS7 Net 1 Net 2 Victim Dear Net 1, your user Victim is visiting me, can you give me his full profile? And also, he wants to send an SMS to ... Dear Net 2, here is the profile and thanks for the SMS, I will try to deliver it and bill it to Victim
  • 17. Strong encryption can be defeated by trusted key handovers 16 Mitigation  Block internal-only SS7 requests  Accept only speakers from a whitelist Risk  Capture and decrypt user traffic  Reuse keys to spoof legitimate towers Slides:https://events.ccc.de/congress/2014/Fahrplan/system/attachments/2493/or iginal/Mobile_Self_Defense-Karsten_Nohl-31C3-v1.pdf SS7 Net 1 Net 2 Victim Dear Net 1, I need immediately the encryption key to connect a call of your subscriber Victim that is coming towards me Dear Net 2, sure! Here is the key and all the rest you need to keep the call going, good luck!
  • 18. Voice and SMS can be remotely intercepted in several ways 17 Mitigation  Perform smart SS7 plausibility checks  Accept only speakers from a whitelist Risk  Intercept calls and SMS  Manipulate/spoof user traffic Video: www.9jumpin.com.au/show/60minutes/stories/2015/august/phone-hacking SS7 Net 1 Net 2 Victim Dear cell XXX, forget what Net 1 said about Victim, he wants now to forward all his calls to me Father Father tries to call Victim but the call is immediately rerouted to the attacker that can start recording and forward it to the Victim
  • 19. Mobile data can also be remotely diverted, blocked and spoofed 18 Mitigation  Block internal-only GTP requests  Accept only speakers from a whitelist Risk  Intercept mobile data (Internet)  Manipulate/spoof user traffic Slides:https://events.ccc.de/camp/2015/Fahrplan/system/attachments/2649/origi nal/CCCamp-SRLabs-Advanced_Interconnect_Attacks.v1.pdf GRX (or Internet) Net 1 Net 2 Victim Dear Net 1, your user Victim is visiting me, can you give me his current IP and make me the owner of it? Dear Net 2, here is the current IP and connection settings for Victim, now it’s all yours, and here are some packets for him
  • 20. Agenda 19  Attacks over the air  Attacks over the wire  How to protect yourself
  • 21. GSM Map allows users to compare security in several countries 20
  • 22. Security levels are summarized in a chart and detailed in a report 21
  • 23. A similar world map shows risk levels associated to SS7 exposure 22
  • 24. SnoopSnitch monitors network anomalies and attack attempts 23 It currently shows: network security levels (intercept, impersonation), IMSI catcher events, SS7 attacks, reception of malicious SMS (silent & binary)
  • 25. Take aways 24 Questions? Luca Melette <luca@srlabs.de>  Many vulnerabilities found in the past years are still a threat for mobile users  Network operators worldwide should improve their security to prevent abuse  Attack tools are available to researchers, and criminals are not far behind them