Telco Signalling Security Assessment
Telco Signalling Security Assessment
The purpose of this Request for Information (RFI) is to allow MNO to understand and evaluate
protection for its customers and business, MNO is required to mitigate these risks and prevent
attacks by monitoring and filtering signalling traffic at the network boundaries
(i.e. the interconnection points towards external signalling mobile networks).
General Conditions
Bidders must specify which chapters of GSMA recommendation is every single assessment
compliant with. Must be but not limited to:
ITU Q.704 (07/96), Specifications of Signalling System No. 7 – Message transfer part:
Signalling network functions and messages.
3GPP Technical Specification Group Core Network and Terminals; Mobile Application
Part (MAP) specification; Rel-8
3GPP Technical Specification Group Services and System Aspects; 3G Security; Network
Domain Security; MAP application layer security (Release 7)
3GPP Technical Specification Group Core Network and Terminals; Study into routing of
MT-SMs via the HPLMN; Rel-7
Compliance with international standards. During a penetration test, experts use technical
materials developed by the Provider and follow generally recognized standards and guidelines
on providing information security, such as:
Extensive resources. Experts are welcome to use but not limited to the advanced security
analysis tools, both freeware and commercial:
Bidders are free to propose other types of assessment that should be described and priced
separately.
It is requested a local instance of Threat monitoring intrusion detection system showing near the
real time attacks and threats on own GUI with 3rd party FW integration option.
The results should be presented in a report that covers all the case assessed including call traces.
Meeting on-site should also be included to present all the results and describe the different
problems identified.
Fraud investigation capabilities must be demonstrated on voice, sms and data side, since it can
be important to conduct such investigation
Strong security assessment IoT capabilities must be demonstrated in order to verify the IoT
security postures in evolving scenario’s
Due to upcoming 5G launching the bidder must show research capabilities to conduct security
assessment and supply chain (security guidelines, security advisory, security roll out testing)
MNO intention under this RFI is to purchase an overall Security Assessment covering the
following domains:
The work must be carried out using the black-box method. The operations are carried out by the
Service Provider's experts under the conditions a potential attacker may encounter. The
following type of attacker is used for external penetration testing.
A highly-skilled outside attacker acting from the Internet without any privileges in the System
and performing attacks to gain access to one or several MNO´s LAN nodes and obtain privileges
enough to launch an attack against internal components of the System.
Security assessment is designed to detect defects, the exploitation of which needs tools that are
generally available or can be obtained from open sources and specialized sources with limited
access.
Signaling System Number 7 Protocol level assessment
The following are mandatory attack cases but not limited for execution during the SS7 security
assessment:
o Information Disclosure
o Subscriber Availability Disruption
o Fraud
o Subscriber traffic interception
o Network equipment Dos
o GSMA IR.82 compliance check
To be more specific:
IMSI disclosure. The attack is based on requesting the address of the switch where the
subscriber is located and IMSI. The request is a part of the SMS delivery procedure; it allows the
source network to receive information about the subscriber's location for further routing of the
message. It can be used for unauthorized network exploration.
Subscriber location discovery. The attack is based on an unauthorized request for the
subscriber's location. Received data is used for online billing of the subscriber's terminating calls.
The intruder obtains the CGI, which allows them to determine the subscriber's location to within
hundreds of meters.
Subscriber profile disclosure. The attack is based on the subscriber profile restoration
procedure. The intruder might send a message to restore the subscriber's profile and obtain it.
Service disruption. The attack involves registering the subscriber within a new switch coverage
area. A similar procedure takes place when a subscriber is registered on a roaming partner's
network. If the attack is successful, the subscriber does not receive calls or text messages,
although the subscriber's phone indicates that it has network coverage.
Terminating SMS message interception. False registration of the subscriber allows the
intruder to redirect the subscriber's messages to the intruder's host.
USSD manipulation. The attack allows imitating a legitimate message with a USSD request sent
from VLR to HLR. The most dangerous attack scenario is sending a request for transfer of funds
between subscriber accounts. Some cases that could be tested are as below:
Paying category change. The attack is based on changing VLR-CSI parameters in the
subscriber profile that control online billing. If the intruder removes the VLR-CSI parameter, the
subscriber's paying category will be post-paid, and all subsequent calls of the subscriber will
bypass the online billing system.
Originating call redirection. The attack is based on changing a gsmSCF address of the online
billing system in the subscriber's profile. All originating calls will request this address, inserted by
the intruder, for online billing. The intruder might redirect an originating call to another MSISDN
To be more specific:
Subscriber's profile disclosure. Because several procedures may contain sending parts of
subscriber’s profile in the answer, attacker can exploit corresponding requests. As a result of
the attack, information from the subscriber's profile will be returned by the network.
Disrupting a service availability. The attack involves sending a large number of connection
requests or malformed messages. As a result of the attack, normal operation of the target is
disrupted.
Fraud. This attack is based on removing barring for the subscriber’s services.
To be more specific:
IMSI brute force. The attack uses a “Send Routing Information for GPRS Request” message
via GRX to obtain a list of valid IMSI for further attacks.
Blocking connection to the internet. The attack involves swamping the available pool of
PDP tunnels, resulting in authorized subscribers receiving a “No resource available” error.
Internet at the expensive of others. The attack involves using an authorized subscriber’s
IMSI to establish an unauthorized connection to the internet. The subscriber is billed for the
attacker’s internet usage.
Intercepting a subscriber’s data. The attack involves the use of spoofed GSN addresses to
conduct a phishing attack on a subscriber’s data traffic.
Session Initiation Protocol (SIP) Security Assessment
The following are a high level sample of attack vectors for execution during the SIP security
assessment.
o Authentication manipulation
o Traffic Manipulation
o DoS
To be more specific:
Authentication manipulation. These attacks use a variety of methods, including both checks of
authentication from SIP UE and from SIP Trunk.
Example Authentication Manipulation Attacks to be performed in both SIP UE and SIP Trunks
scenarios include:
Traffic manipulation. These attacks are aimed at scanning and changing the direction of traffic
flows. Results of these attacks include:
Example Traffic Manipulation Attacks to be performed in both SIP UE and SIP Trunking scenarios
include:
o Call Redirection
o Forced call teardown
o Media injection
Service Availability Disruption. These attacks are aimed impacting network performance.
Results of these attacks include:
Example Service availability disruption Attacks to be performed in both SIP UE and SIP Trunking
scenarios include:
Category 1
Category 2
Category 3
Upon completion of complex testing, the Customer must receive the final Report on Testing
Results, which must contain but not limited to
Decision criteria
The final decision will be based on the following points: