Cyber Security Threats To Telecom Networks
Cyber Security Threats To Telecom Networks
Rosalia D’Alessandro
Hardik Mehta
Loay Abdelrazek
Press Release: some highlights
Cyber Security Threats to Telecom Networks - Rosalia D’Alessandro, Hardik Mehta and Loay Abdelrazek 2
Telecom Architecture Overview
IMS
Internet
MME HSS
PCRF
Other Data
ENodeB
Network
4G SGW
PGW
MVNO
CRBT IPX
Streaming Server
MVNO
OLT
FTTH SBC CDN GRX
Transcoder
Content
DRM
OLO
Access Network Core Network
Cyber Security Threats to Telecom Networks - Rosalia D’Alessandro, Hardik Mehta and Loay Abdelrazek 3
Possible Entry Points
IMS
Internet
MME HSS
PCRF
Other Data
ENodeB
Network
4G SGW
PGW
MVNO
CRBT IPX
SGSN HLR
Internet
NodeB RNC
3G
GGSN Other Data
MSC/VLR
Network
Streaming Server
MVNO
OLT
FTTH SBC CDN GRX
Transcoder
Content
DRM
OLO
Access Network Core Network
Cyber Security Threats to Telecom Networks - Rosalia D’Alessandro, Hardik Mehta and Loay Abdelrazek 4
Attack Vectors
Mobile Stations (3G/ 4G): Internet: IMS
• Enumeration and exploitation of internal core • Compromise web applications deployed in DMZ
network nodes • Exploitation of internal network components possible
Internet
• Sending crafted SIP messages to perform tasks
MME like, HSS if there is lack of segregation between DMZ and core
Caller ID spoofing PCRFnetwork
Other Data
ENodeB
• Identifying nodes running signaling stacks (e.g. • Possible to connect with network nodes (e.g Network
4G SGW
SIGTRAN stack) and sending malicious signaling traffic PGW PGW/GGSN or SGSN) exposed on the public domain
using Sigploit • Sending crafted SIP messages to SBCs exposed MVNO
on the
public domain
IPX
Fiber to The Home (FTTH):
• Enumeration
SGSN
and exploitation of internal core
HLR Roaming interfaces: Internet
NodeB RNC
3G network nodes • Using SS7, perform HLR lookup to get subscriber
GGSN information like, IMSI and serving MSC Other Data
• VLAN hoping possible between VoIP, ITPV and Data
MSC/VLR
Network
• Using GTP, identify active tunnel session and hijack
• Using VoIP, Crafted SIP messages can be sent to
the session
perform SIP attacks like DoS
• Using SS7/ Diameter, perform attacks leadingMVNO
to fraud
• Using IPTV, Send crafted IGMP messages to subscribe Streaming Server
like over-billing
unbilled channels
OLT
FTTH SBC CDN
Transcoder• Using SS7/ Diameter, perform interception attacks
GRX
Content like, SMS and Call
DRM
OLO
Access Network Core Network
Cyber Security Threats to Telecom Networks - Rosalia D’Alessandro, Hardik Mehta and Loay Abdelrazek 5
Attack Vectors
IMS
Internet
MME HSS
PCRF
Other Data
ENodeB
Network
4G SGW
PGW
MVNO
IPX
Roaming in Pakistan
SGSN HLR Internet
NodeB RNC
3G
GGSN Other Data
MSC/VLR
Network
Streaming Server
MVNO
OLT
FTTH SBC CDN GRX
Transcoder
Content
DRM
OLO
Access Network Core Network
Cyber Security Threats to Telecom Networks - Rosalia D’Alessandro, Hardik Mehta and Loay Abdelrazek 6
Attack Vectors
IMS
PCRF
Other Data
ENodeB
Network
4G SGW
PGW
MVNO
IPX
Streaming Server
MVNO
OLT
FTTH SBC CDN GRX
Transcoder
Content
DRM
OLO
Access Network Core Network
Cyber Security Threats to Telecom Networks - Rosalia D’Alessandro, Hardik Mehta and Loay Abdelrazek 7
Attack Scenario
IMS
Internet
MME HSS
PCRF
Other Data
ENodeB
Network
4G SGW
PGW
MVNO
CRBT IPX
HLR
‐ Internal network enumeration resulted in
SGSN Internet
NodeB RNC
identification of node part of VAS networks,
3G
CRBT GGSN Other Data
MSC/VLR
Network
‐ Caller Ring Back Tone (CRBT), is connecting
with HLR and MSC, it enabled customers to
subscribe for personalized audio, in place of MVNO
Streaming Server
regular tone
OLT
‐ FTTH
Due to lack of basic security controls, it SBC
was CDN Transcoder GRX
possible to gain root access of the node from Content
DRM
subscriber network segment
OLO
Access Network Core Network
Cyber Security Threats to Telecom Networks - Rosalia D’Alessandro, Hardik Mehta and Loay Abdelrazek 8
Attack Scenario
‐ The compromised node is connected to the core. IMS
‐ It is then possible to use the node to initiate other core related
attacks (i.e using protocol vulnerabilities like SS7, Diameter of Internet
GTP). MME HSS
‐ Using a global title scanner, we can gather more info about the PCRF
Other Data
SS7 core. ENodeB
Network
4G SGW
PGW
MVNO
CRBT IPX
SGSN HLR
Internet
NodeB RNC
3G
GGSN Other Data
MSC/VLR
Network
Streaming Server
MVNO
OLT
FTTH SBC CDN GRX
Transcoder
Content
DRM
OLO
Access Network Core Network
Cyber Security Threats to Telecom Networks - Rosalia D’Alessandro, Hardik Mehta and Loay Abdelrazek 9
Attack Scenario
‐ HLR(s) are identified. Attacker
HLR
MSC IMS
‐ Query the HLR(s) to retrieve the IMSI.
SendRoutingInfoForSM Req.
‐ IMSI is the key to any mobile operation. (MSISDN, HLR GT) Internet
MME HSS
PCRF
Other Data
ENodeB
Network
4G SGW SendRoutingInfoForSM Resp.
PGW
(IMSI, VMSC GT)
MVNO
CRBT IPX
SGSN HLR
Internet
NodeB RNC
3G
GGSN Other Data
MSC/VLR
Network
Streaming Server
MVNO
OLT
FTTH SBC CDN GRX
Transcoder
Content
DRM
OLO
Access Network Core Network
Cyber Security Threats to Telecom Networks - Rosalia D’Alessandro, Hardik Mehta and Loay Abdelrazek 10
Attack Scenario
‐ Internet at the expense of others. IMS
MVNO
CRBT IPX
SGSN HLR
Internet
NodeB RNC
3G
GGSN Other Data
MSC/VLR
Network
Streaming Server
MVNO
OLT
FTTH SBC CDN GRX
Transcoder
Content
DRM
OLO
Access Network Core Network
Cyber Security Threats to Telecom Networks - Rosalia D’Alessandro, Hardik Mehta and Loay Abdelrazek 11
Attack Demonstration
Basic Best Practices to Reduce Attack Exposure
• Implement network traffic segregation
• Bind services to correct network interfaces
• Limit the reachability of internal nodes from UEs
• Limit the reachability of network nodes from Internet by configuring correctly routing protocols
• Deploy secure configuration of network nodes
• Secure configuration of all network services;
• Disabling of insecure and unneeded network services;
• Changing of default passwords;
• Hardening;
• Configuration and enabling of authentication and access control; Logging of all access attempts and other security-relevant
events;
• Configuration of the network node to not disclose unnecessary information;
• Continuous deployment of the latest security patches.
• Security testing and regular vulnerability scanning;
• Implement traffic filtering policies at the boundaries
• Basic IP Filtering
• Signaling FW
• Monitor network traffic to discover anomalies
• Deploy a Security Signaling Monitoring (Intrusion Detection System / IDS)
Cyber Security Threats to Telecom Networks - Rosalia D’Alessandro, Hardik Mehta and Loay Abdelrazek 13
Thank You