Imsi - Catcher.detection ProviderICdetection101
Imsi - Catcher.detection ProviderICdetection101
Introduction
Version 1.01; fixes typos, includes some clarifications and updated references. Original
publication appeared at 19th International Symposium on Research in Attacks,
Intrusion and Defenses (RAID 2016) at Springer International Publishing DOI
10.1007/978-3-319-45719-2_13
numbers from nearby phones, later versions offered call- and message interception.
Today, IMSI Catchers are used to (i) track handsets, (ii) deliver geo-target
spam [34], (iii) send operator messages that reconfigure the phone (e.g., installing
a permanent MITM by setting a new APN, http-proxy, or attack the management
interface [42]), (iv) directly attack SIM cards with encrypted SMS [35] that
are filtered by most operators by now, and (v) also can potentially intercept
mobile two-factor authentication schemes (mTAN). IMSI Catchers have become
affordable, and can be build for less then USD 1,500 [15]. Pell and Soghoian [38]
argue that we are currently on the brink of age where almost everyone is able to
eavesdrop phone calls, similar to the 1990ies when cheap analog scanners were
used to listen to mobile phones in the US and Europe.
In brief, these devices exploit the phones behavior of preferring the strongest
cell phone tower signal in the vicinity to maximize the signal quality and minimize
its own power consumption. Additionally, on GSM networks (2G), only the phone
(via the SIM - Subscriber Identification Module) needs to authenticate to the
network, but not vice versa and can therefore be easily deluded to disable content
data encryption. This enables an attacker to answer a phones requests as if the
phone was communicating with a legitimate cell phone network.
In contrast, the Universal Mobile Telecommunication System (UMTS, 3G)
and Long Term Evolution (LTE, 4G) require mutual two-way authentication, but
are still not completely immune to IMSI Catchers. Tracking and identifying IMSI
Catchers are build on the weakness that a network has to be able to identify
its subscriber before it can authenticate him/her. Additionally, unauthenticated
commands can be used to downgrade a phone into using 3G or the less secure
2G (GSM) only, eventually giving way to a full Man-in-the-Middle attack.
Additionally, some phones execute unauthenticated commands, even though
the standard demands prior authentication [37].
This issue gains additional momentum as commercial networks increasingly
surpass dedicated administrative and governmental networks in coverage and
data rates and thus carry more and more increasingly sensitive data. Additionally,
today, many economic sectors critically depend on a reliable and secure mobile
communication infrastructure (e.g., logistics).
While most previous work focused on the detection of rouge base stations on
the consumer side, this paper takes the approach from the network operators
perspective and discusses novel detection capabilities from an academic as well
as practical point of view.
The cooperation with T-Mobile Austria a mobile phone network operator
with over four million subscribers enabled us to test theories, identify detection
artifacts and generate statistics out of core network data. We focused on passive
detection methods, readily available data in todays monitoring solutions and
the identification of changes that promise better detectability and scalability.
The scope of this paper is the detection of attacks on the radio access network
(RAN) in 2G (GE/RAN), 3G (UTRAN), and LTE networks (E-UTRAN). While
there are attacks on the backbone and interconnection interface, or within a
mobile network provider, we focus on the last-mile radio link between the cell
tower and the terminal device. The traditional telecommunication network model
centers all the intelligence in the network and attaches (dumb) end devices that
have to obey the network. Thus, these types of attacks give an attacker a lot of
control over the end user device.
The pivotal sections of the paper are as follows:
Evaluation of 22 phones on (i) how they interact with the genuine network
once released from an IMSI Catcher (Section 5.1) and (ii) which artifacts are
produced.
Development and implementation of detection strategies based on the artifacts
and test of their fitness including their limitations on real-world data of a
network operator (Section 5 and 6)
Background
Previous work [16, 32, 36, 40, 43] focused on the subscriber (customer) side;
this paper shifts perspectives and addresses the detection of such attacks from
the operator side. The particular challenge lies in the structure of digital mobile
networks: They where drafted in a time of low bandwidth connections, when
signaling traffic occupied a significant amount of the network infrastructure.
Therefore, these networks were designed in a highly hierarchical and geographically
distributed fashion with as much signaling traffic as possible being handled locally
or regionally, thus, offloading the backbone. This poses unique challenges when
acquiring and correlating the necessary data in order to detect anomalies in the
network. Additionally, the legacy of having a GSM network being upgraded to
UMTS and later again upgraded to LTE implies that the structure and the used
data formats are not as clean and neat as one would expect from a freshly built
LTE network with additional 2G and 3G radio front-ends.
Compared to the time when 2G networks were designed, today the ratio
between user data and signaling data has completely changed. With LTE, users
are offered 100 MBit or more.
The lowered backbone bandwidth costs and the (now) relatively low volume
of signaling data allows mobile phone operators to en-bloc collect and monitor
more data parameters than before. Many cellular network operators routinely
collect data on different network levels and elements (e.g., from switches, servers,
and via network probes) to detect, track and debug malfunctions and optimize
their network. The strength of such Network Intelligence systems is to correlate
transactions over different levels and protocols in the network structure, extract
important values, and build an extensive index of the latter. This is done for
several million signaling packets per minute. The limitation is that these indices
are primarily built to search for traffic based on simple identifiers such as a
specific customer, network element, protocol, or transaction type. Our goal is to
use this monitoring systems to find far more complex symptom patterns that are
typically produced by IMSI Catchers.
2.1 Working principles of a mobile phone network
Mobile phone networks became much more complex over the years. Each new
generation or access technology (e.g., 2G GSM, 3G UMTS, 4G LTE) introduced
Location/Tracking Area Update Messages are the Swiss army knife of the
Mobility Management (MM) in mobile networks: A phone freshly turned on will
first try to make a Location/Tracking Area Update Request (LUR,TAUR) using
its last known (cached) values. If its TMSI hasnt expired and is valid in this
Location/Tracking Area, the network will accept the phone. Otherwise it will
trigger a re-authentication4 . Therefore, even a phone arriving on a plane from
another continent will first try to perform an LUR/TAUR providing the LAI/TAI
data from another network. This is intended, as it allows for national roaming
and seamless handover of active calls across an international border. (In LTE,
the network can additionally provide an individual set of Tracking Areas for each
UE, so that a group of subscribers e.g., on a train do not perform a Tracking
Area Update all at once.)
Additionally, a ME/UE will perform periodic Location/Tracking updates,
even when not moved in an interval configured by the network (e.g., 24 hours)
to assure the network of its continued presence.
Periodically during operation and at shutdown, parts of the baseband state are
stored on the SIM card and the phone itself. For example, instead of performing
a full frequency scan for all receivable base stations at power on, the phone will
first try the frequency range where it received signals from its mobile phone
network before. Also, it will retry its old TMSI in an attempt to speed up the
procedure. (After all, if the phone has not been offline for too long, it still could
be valid.)
For UMTS and LTE encryption no practical cryptanalytic attacks are known,
and mutual authentication is needed for (most) transactions. However, vulnerabilities in the SS7/Diameter exchange between providers allow the recovery of
sessions keys [20, 36] and therefore either decrypting traffic or impersonating a
network.
Fig. 1. Downgrade attack from 4G to 2G using Access Technology not allowed messages
(simplified)
permanent error will be cached by the MS/UE until next reboot. 3GPP defined
rules on how to allow a network operator to expel a mobile from one access
technology e.g., for LTE [9, 41, c.f. reject cause #7] or 3G [25]. Therefore, a chain
of tracking IMSI Catchers denying access and forcing a cell re-selection with
another access technology can downgrade a client step by step (Figure 1). Once
arrived at 2G/GSM without mutual authentication the attacker can capture the
phone and hold it in the fake cell.
These Location/Tracking Update Reject messages are intentionally not covered by the mutual authentication in UMTS and LTE, as a (foreign) network
must be able to reject a user that has no subscription or no roaming agreement
with the home network.
A tracking (or identifying) IMSI Catcher does not hold a mobile device in the
fake cell, but drops it back into the real network immediately. For an attacker
it is advantageous to simulate a new Cell-ID as well as a new LAC as this will
always trigger an active communication (Location/Tracking Update) from the
attracted mobile device.
Simulation of a new Cell without a LAC leaves the attacker without knowledge
which phones are currently listening to the broadcast channel. He/she could only
page previously known subscribers (based on IMSI) to verify their existence.
Additionally, it will disturb the availability of the attracted phones for the
complete operating time of the IMSI Catcher.
Unless for very specific operations, for the above mentioned reasons, an
attacker will most likely choose a fake Location/Tracking Area Code (LAC) (or
one that is unused in the geographical area) so that every mobile phone attaching
to this cell initiates a Location/Tracking Update procedure. This informs the
attacker of every phone entering the cell, gives him/her the ability to download
identification data and then reject the Location/Tracking Update. Depending
on the error cause used, the phone might return later (temporary error), or
put the LAC or MNC on a blacklist (permanent error). An attacker wishing to
enumerate all phones again simply chooses another LAC. This procedure disturbs
each phone for less than a second per scan and has no major implications on
availability.
Figure 2 (upper part) presents the message flow. Known IMSI Catchers
download the IMSI and IMEI since both are easily retrievable. The IMEI is also
commonly downloaded by genuine networks in order to apply the correct protocol
(workaround) policy based on the phone model.
5.1
10
Fig. 2. A tracking IMSI Catcher identifies a phone and drops it back into the real
network.
3. A new Location Update Request is sent using a dummy Location Area Code,
since the last LAC value isnt valid.
We tested 22 different phone models5 for their behavior after they dropped
back into the genuine network in 2G (Figure 3). 86% produced no Location
5
Nokia Lumia 920.1, E71, 6310, 6150, 3210, 3710A-1, LG Nexus 4, Nexus 5, Apple
29%
13.6%
86.4%
LUR
no LUR
71%
79.6%
2G
LUR
2.6%
6.5%
0.2%
11.1%
valid
FFFE
8001
other
no LAC
11
Sheet1
A5/0
A5/1
A5/2
A5/3
83.7%
Sheet1
3G
LUR
4.0%
11.3%
1.0%
valid
FFFE/0
other
no LAC
Update (Option 1) and 14% generated6 a Location Update Request with a dummy
origin-LAC 0xFFFE (65534). The special values 0 and 0xFFFE are reserved
when no valid LAC is available by the MS/UE [1, 7]. Additionally, on GSM many
phones also use 0x8001 (32769).
However, these dummy LACs are no direct indicator for an IMSI Catcher
even for this minority of phones, as they are used quite regularly. In a dataset
containing all nationwide 2G Location Update Requests within one minute
(daytime) we found 9.1% of all transactions using a dummy LAC and 11.1% using
no LAC at all (see Figure 5a) without any geographical pattern. The numbers
for 3G (Figure 5b) are smaller: 4% of Location Update Requests contained a
dummy LAC (0xFFFE or 0x0000) from the same network. 1% contained also
dummy values for the Mobile Country Code (MCC) and Mobile Network CodePage 2
(MNC).
7
64% of our test phones generated a GPRS
Page 2 Attach request within the next
6
7
IPhone 4, IPhone 6, Nexus One, Motorola Moto G2, Moto G XT1032, Samsung
Galaxy Nexus, Galaxy S3, Galaxy Xcover2, Galaxy S5, Sony Xperia Z2-SCR10, BG
Aquaris E4.5 Ubuntu Phone, Kyocera Torque KS-701, Sony Ericsson ST17I
All Nokia models introduced before 2000.
Technically, this is an Location Update Request with Origin LAC set to the current
LAC and an optional GRPS header with the Attach-Bit set.
Page 2
Page 2
12
two minutes, if and only if it had a data connection before and did not have
an additional WiFi connection. This is due to the fact that our test setup did
not indicate GPRS support for the fake cell. Such a GRPS Attach request is
nothing extraordinary and happens regularly (42% of all Location Updates on a
real network contain such a header) for example if a phone drops out of WiFi
and needs an Internet connection.
18% of this GPRS Attach messages had the No Valid TMSI available flag set.
However, on a real network 4.5% of LUR messages have this flag set.
13
0.7
0.35
0.95
1.175
1.425
1.4
Seconds
An IMSI Catcher of this type holds the mobile in the cell and can therefore
man-in-the-middle any transaction, and has control over the mobile phone by
means of any network management commands (Figure 6).
6.1
14
11
15
All
Samsung Galaxy Nexus
Samsung Galaxy S3 Mini
Samsung Galaxy S4
Apple Iphone 3gs
Apple Iphone 4s
Apple Iphone 5s
LG Nexus 4
LG Nexus 5
Nokia Lumia 930
HTC One X
HTC Blade
HTC Grand X
Seconds
16
Fig. 9. Location update tunneling effect: Because a detach message is not guaranteed,
location/tracking area updates happen between non-adjacent cells.
Additionally, road and railway tunnels also offer geographical shortcuts, but
unlike plane routes the ends of the tunnel only connect two points and will be
statistically assigned as neighbors, since a large number of passengers traverse
without turning off their phones.
Old baseband state restoration Phones regularly and at certain events save
parts of the baseband state information to non-volatile memory. For faster boot
times, the phone can facilitate this information (e.g. already knows the frequency
range of the preferred operator and does not has to scan the whole frequency
range). This includes the last known LAC.
One of our test phones had a defective power button which lead to random
reboots. In the traces we discovered that the phone sometimes used obsolete
LAC information as origin (i.e. reused a LAC as origin a second time, because
another location change was not recorded properly before reboot).
6.4 Detection of a access technology downgrade
As described in Section 3.4 and Figure 1, access technology downgrades are
easy to perform and included in todays commercially available IMSI Catchers [23].
A phone camping on 2G even though 3G or 4G should be available in the
area is not a strong indicator. In some cases, structural properties can lead to
better reception of certain frequency ranges (e.g., 2G on lower frequencies is
usually better receivable underground). On the other hand, a MS/UE can be set
intentionally to use 2G only for power conservation. A provider could install an
application on the SIM to monitor the access technology and location updates;
however, this is out of scope for this paper.
Discussion
17
(LUR tunnel effect, restoration of old baseband states) and therefore needs to be
backed up by additional geographical, temporal and subscriber based correlation.
Another method is the transmission delay introduced by an MITM
attack. We tested this technique based on the authorization round trip times.
In general, the deviation is quite large, but can be narrowed if the device type
is considered as well. Every device has a very specific distribution of round trip
times. However, for a statistically significant result (e.g. for a device under attack),
multiple measurements have to be collected.
From the provider point of view, the hardest attack to detect is that of a
tracking-only IMSI Catcher. Except for a few very old phones, this particular
attack does not produce any messages in the core network. It has still to be
explored if certain frequency-monitoring functions on BTS, NodeBs, and eNodeBs
can be repurposed to detect such rouge base stations.
7.1
Ethical Considerations
As described in the research set up (Section 4) we have used real data only
under very strict conditions to comply with ethical and legislative requirements.
We have only worked on signaling data and never had access to user data or
personal subscriber information.
7.2 Comparison with client detection methods
Operator detection of IMSI Catchers does not supersede client detection (c.f.
Section 8.1). It complements it and gives the operator the opportunity to monitor
such attacks in its network regardless of precautions by individual subscribers.
However, since the detection schemes can only find phones that are either under
the control of an attacker - or just switched back to the genuine network - the
operator can only warn the user in question post-attack.
On the other hand, client based techniques give the user the ability to detect
a current attack against his/her very device. On tracking IMSI Catchers this
technique provides better detection rates.
7.3 Limitations
The current implementation of our detection methods is based on the old
somewhat limited monitoring system deployed in the network. It can filter some
pre-extracted of each packet and transaction against a query containing a limited
set of operators and literal values (i.e. filter by a specific cell, IMSI, IMEI,
protocol type, etc). It can not compare between cells or apply more complex
filters. Additionally, the return buffer size is limited to 10K-30K results, depending
on the search mode. This limits our current implementations to single users (or
single cells) at a time. This is the reason we could not run a nation wide search
so far.
7.4
Future Work
Our results show that detection from the operator side is possible and tested
its usefulness within the limitations of the current monitoring system. We suggest
that parameters such as ciphering and origin LAC in Location Area Updates
should be extracted directly at the probes and made available. This pre-selection
step will eliminate current limitations. For example, it will allow to search for
18
inconsistencies in used ciphers, based on the IMEI (or TAC). Additionally, a new
monitoring system based on Apache Hadoop is currently in development that is
expected to remove most limitations of the current system.
With the large number of dummy LACs used by phones, one can wonder if
an attacker could use dummy LACs such as 0xFFFE for masking their existence.
Another way, to mask the fake LAC of an IMSI Catcher is, to announce a neighbor
frequency occupied by a second IMSI Catcher with a reasonable LAC. While
doubling the hardware costs for an attacker, this might whitewash the Origin
LAC field used in Section 6.3. Both ideas need further testing with end devices
to confirm or deny their practical feasibility. As discussed before (Section 6.4), a
SIM card application can monitor and report certain network parameters back
to the network (e.g., keep a local copy of a CellID/LAC trail) and detect both
cases. However, over time, many different cards from different vendors have been
acquired so developing and maintaining such an application poses a financial
burden and an operational risk.
Furthermore, we plan to refine the timing models used in Section 6.2 to
become more accurate and create better models for timing delays introduced by
traffic relaying.
Related Work
8.1
19
20
Measurement triangulation. The network has the ability to request measurement reports to other cells in the vicinity. A fake base station can use these
reports to estimate the position of the phone based on signal levels and known
positions of the cells. This is also possible on 4G [41].
Disable GPS. Because of (former) Egyptian regulations prohibiting the usage
of GPS, some older phones (iPhone [22], Nokia [5]) are known to disable the
GPS receiver when either associated or just in the vicinity of a network using
the Egyptian Mobile Country Code. An attacker can use this to disable the GPS
receiver on certain phones.
Conclusion
IMSI Catchers are still a major problem for todays networks: (i) Tracking IMSI
Catchers work directly on GSM, UMTS, and LTE networks as Location/Tracking
Update Rejects are excluded from cryptographic message integrity checks. Mutual
authentication only prevent plain capturing IMSI Catchers. (ii) These reject
messages can be used to downgrade a phone until the next reboot to a lower
access technology (e.g. GSM) without mutual authentication. Therefore, the
weakest-link principle applies.
In this paper we analyzed the different types of IMSI Catchers and their
working principles as well as if and how they can be detected from the network
operators side. Due to our cooperation with an European carrier we have been
able to systematically perform real-world experiments and test our detection
methods on real world-data.
Strong indicators we identified are for example the usage of invalid LACs
(which are transmitted by the phones when they fall back to the genuine network
after an attack), or the usage of weak ciphers to detect downgrade attacks for
devices that were previously able to use strong ones. Additionally we showed that
a number of weak indicators can be correlated geographically, temporally, and
on subscriber basis e.g., for detecting targeted attacks, similar to current fraud
detection schemes used by credit card companies. This includes fingerprinting
devices based on profiles, unusual movements, and implausible location update
trails. We also addressed corner cases and how to deal with them.
As mobile networks where initially designed with the reduction of signaling
traffic in mind, not all of the necessary information is readily available for analysis,
or even not collected centrally and in a scalable fashion. Some of the indicators
we identified therefore demand changes in the monitoring systems currently used
in such networks. However, based on already available data from a real-world
mobile network, we were able to show the practical applicability for multiple of
our methods.
Acknowledgments We want to thank the whole crew of the core network security
team and radio access network team at T-Mobile. They have been a great help. We are
very grateful for the reviewers comments and help to improve the quality of the paper
and point to new interesting future work opportunities. This research was partially
funded by the COMET K1 program through the Austrian Research Promotion Agency
(FFG).
21
References
1. Digital cellular telecommunications system (Phase 2+); Interworking between Phase
1 infrastructure and Phase 2 Mobile Stations (MS), http://www.etsi.org/deliver/etsi_
ts/101600_101699/101644/05.01.00_60/ts_101644v050100p.pdf
device, http://apps.washingtonpost.
com/g/page/world/how-the-nsa-pinpoints-a-mobile-device/645/, accessed Oct 30
2015
4. Digital cellular telecommunications system (Phase 2+); Location Services (LCS);
Mobile Station (MS) - Serving Mobile Location Centre (SMLC) Radio Resource LCS Protocol (RRLP) (2007), http://www.etsi.org/deliver/etsi_ts/101500_
101599/101527/08.18.00_60/ts_101527v081800p.pdf, 3GPP TS 04.31 version 8.18.0
5. Egypt tries to control the use of GPS by banning except with individual licences (2008), http://www.balancingact-africa.com/news/en/issue-no-429/topstory/egypt-tries-to-contr/en
6. Emergency Communications (EMTEL); European Public Warning System (EUALERT) using the Cell Broadcast Service (2012), http://www.etsi.org/deliver/etsi_
ts/102900_102999/102900/01.01.01_60/ts_102900v010101p.pdf
22
20. Engel, T.: SS7: Locate. Track. Manipulate. (2014), at 31C3, https://events.ccc.
de/congress/2014/Fahrplan/events/6249.html, accessed Oct 30 2015
21. Ettus Research: Universal Software Radio Peripheral, https://www.ettus.com/product
22. Farivar, C.: Apple removes GPS functionality from Egyptian iPhones (2008),
http://www.macworld.com/article/1137410/Apple_removes_GPS_func.html
23. Gamma Group: 3G-GSM Interctiopn & Target Location. Sales brochure, https:
//info.publicintelligence.net/Gamma-GSM.pdf, accessed Nov 2nd 2015
24. Goldberg, I., Wagner, D., Green, L.: The (Real-Time) Cryptanalysis of A5/2. In:
Rump session of Crypto99 (1999)
25. GSM Association: IR.50 2G 2.5G 3G Roaming v4.0 (2008), http://www.gsma.
com/newsroom/all-documents/ir-50-2g2-5g3g-roaming/, accessed Sept 25 2015
26. Prohibiting A5/2 in mobile stations and other clarifications regarding A5 algorithm
support, http://www.3gpp.org/ftp/tsg_sa/TSG_SA/TSGS_37/Docs/SP-070671.zip
27. Gneysu, T., Kasper, T., Novotny, M., Paar, C., Rupp, A.: Cryptanalysis with
COPACOBANA. IEEE Transaction on Computers 57(11) (November 2008)
28. Hulton, D., Steve: Cracking GSM. Black Hat DC 2008 (03 2008)
29. Joachim, F., Rainer, B.: Method for identifying a mobile phone user or for
eavesdropping on outgoing calls (2000), patent, Rohde & Schwarz, EP1051053
30. Labs, S.: Kraken: A5/1 Decryption Rainbow Tables. via Bittorent (2010), https:
//opensource.srlabs.de/projects/a51-decrypt, accessed Nov 12 2015
31. Liu, J., Yu, Y., Standaert, F.X., Guo, Z., Gu, D., Sun, W., Ge, Y., Xie, X.: Small
Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations
in 3G/4G USIM Cards, pp. 468480. Springer International Publishing (2015)
32. Malette, L.: Catcher Catcher, https://opensource.srlabs.de/projects/mobile-networkassessment-tools/wiki/CatcherCatcher, accessed Nov 12th 2015
33. Michau, B., Devine, C.: How to not break LTE crypto (2016)
34. Muncaster, P.: Chinese cops cuff 1,500 in fake base station spam raid. The
Register, 26 Mar 2014, http://www.theregister.co.uk/2014/03/26/spam_text_china_
clampdown_police/
42. Solnik, M., Blanchou, M.: Cellular Exploitation on a Global Scale: The Rise and
Fall of the Control Protocol. Blackhat 2014, Las Vegas
43. SR Labs: Snoopsnitch (12 2014), https://opensource.srlabs.de/projects/snoopsnitch,
accessed Nov 12 2015
23
44. Tu, G., Li, Y., Peng, C., Li, C., Raza, M.T., Tseng, H., Lu, S.: New Threats
to SMS-Assisted Mobile Internet Services from 4G LTE Networks (2015), http:
//arxiv.org/abs/1510.08531
45. Welte, H.: OpenBSC - Running your own GSM network (08 2009), talk
at Hacking at Random 2009. Slides: https://openbsc.osmocom.org/trac/rawattachment/wiki/FieldTests/HAR2009/har2009-gsm-report.pdf