FS.07 v4.0 PDF
FS.07 v4.0 PDF
Copyright Notice
Copyright © 2017 GSM Association
Disclaimer
The GSM Association (“Association”) makes no representation, warranty or undertaking (express or implied) with respect to and does not accept
any responsibility for, and hereby disclaims liability for the accuracy or completeness or timeliness of the information contained in this document.
The information contained in this document may be subject to change without prior notice.
Antitrust Notice
The information contain herein is in full compliance with the GSM Association’s antitrust compliance policy.
V4.0 Page 1 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
Table of Contents
1 Introduction 5
1.1 Overview 5
1.2 Scope 5
1.3 Abbreviations 6
1.4 References 9
2 SS7 Networks: A Short Introduction 14
2.1 SS7 Network Architecture 14
2.1.1 Service Switching Point (SSP) 14
2.1.2 Service Control Point (SCP) 14
2.1.3 Signal Transfer Point (STP) 14
2.2 SS7 Protocols 15
2.3 SIGTRAN Network Architecture 18
2.3.1 Signalling Gateway (SG) 19
2.3.2 IP-enabled SCP (IP-SCP) 20
2.3.3 Other SIGTRAN Network Elements 20
2.4 SIGTRAN Protocols 21
2.4.1 SCCP User Adaptation Layer (SUA) 23
2.4.2 ISDN Q.921-User Adaptation Layer (IUA) 23
2.4.3 SS7 Message Transfer Part 3 (MTP3) User Adaptation Layer (M3UA) 23
2.4.4 Message Transfer Part 2 (MTP2) User Adaptation Layer (M2UA) 24
2.4.5 MTP Level 2 Peer Adaptation (M2PA) 25
3 SS7 Open Source Projects 27
3.1 OpenSS7 27
3.2 Libss7 & Asterix 28
3.3 Mobicents 29
3.4 Safeseven 30
3.5 SigPloit 31
4 Security Analysis Taxonomy 32
4.1 Network Attacks Taxonomy 32
4.2 Attack Effects Taxonomy 35
4.3 Attacks-Effects Mapping 36
5 SS7 Security Analysis 37
5.1 ISUP Layer 38
5.1.1 Spoofing via Automated Phone Systems 38
5.1.2 Fake Number Presentation 38
5.2 SCCP Layer 39
5.2.1 Flooding to Know Exact Network Element (NE) GTs 39
5.2.2 Network Element Impersonation 40
5.2.3 TCAP 40
V4.0 Page 2 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
5.2.4 TCAPsec 41
5.2.5 TCAP Handshake 42
5.3 MAP Layer 46
5.3.1 Retrieval of Cryptographic Material 46
5.3.2 Retrieval of the Location of a Mobile User 47
5.3.3 Retrieval of Mobile Subscriber Identity (e.g. IMSI) 48
Denial of Service (DoS) towards a Mobile Subscriber 48
5.3.4 Overload of the SS7 Network and Equipment 50
5.3.5 Fraud Towards Mobile Operators or Mobile Subscribers 51
5.3.6 Interception of User Traffic 52
5.3.7 Retrieval of Subscriber Info (Enabled Services, Service State, etc.) 53
5.3.8 Abuse of SMS Services 53
5.4 CAP Layer 57
5.5 INAP Layer 57
6 SIGTRAN Security Analysis 58
6.1 Overview 58
6.2 SIGTRAN Security Features 59
6.2.1 IP Layer 59
6.2.2 SCTP Layer 60
6.3 SIGTRAN Vulnerabilities and Attacks 61
6.3.1 Address Camping or Stealing or Squatting Attack 61
6.3.2 Association Hijacking Attack Version 1 62
6.3.3 Association Hijacking Attack Version 2 62
6.3.4 Bombing Attack or Amplification Attack 63
6.3.5 Association Redirection 63
6.3.6 SCTP Scan 63
6.3.7 User Adaptation Layers 63
6.4 Other Security Threats 64
7 Risks for Mobile Network Operators 66
8 Recommendations and Countermeasures 69
8.1 SCCP Global Title Anti-Spoofing 71
8.2 MAP Screening Policy Guidelines 71
8.2.1 Category 1 72
8.2.2 Category 2 73
8.2.3 Category 3 74
8.2.4 Filtering Considerations 75
9 Conclusions 76
Annex A SS7/SIGTRAN Network Incident Report Template 77
Annex B Further Attack Scenarios 78
B.1 [Attack Scenario Title] 78
B.2 Remove IMEI from EIR Blacklist Attack 78
V4.0 Page 3 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
V4.0 Page 4 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
1 Introduction
1.1 Overview
Signalling System 7 (SS7) was designed and initially deployed for a closed telecommunications
community because relatively few telephone companies with well-defined network boundaries
existed. Therefore, SS7 possesses limited security capabilities, but that environment no longer
exists because of market liberalization/deregulation. Nowadays there are more telephony
providers than could have been imagined when SS7 was first designed. There is also increasing
convergence between the public switched telephone network (PSTN) and IP networks,
supported by SS7 protocol extensions such as signalling transport (SIGTRAN), which supports
SS7 capabilities over IP networks.
SS7 has relied on the concept of isolated signalling networks for much of its security but the
new and evolving scenarios change this paradigm, increasing the exposure of the mobile
networks and creating the need for additional security enforcements.
Additionally, the proliferation of open source projects focussed on SS7 might carry a public
disclosure of known or zero-day mobile network vulnerabilities and might make low-cost tools
available that can breach these networks. The open source projects released for radio access
networks (RAN) (e.g. Osmocom) have demonstrated that the walled garden approach used by
mobile network operators (MNOs) is not successful and that the mobile networks could be
exposed to new and unpredictable attacks.
1.2 Scope
This document contains:
• An analysis of the security of each SS7 and SIGTRAN stack layer. Some SS7 threats
have been treated in a limited way in some GSMA permanent reference documents
(PRDs) (e.g. IR.70 [2] and IR.71 [3] only refer to SMS SS7 frauds) but an analysis for
each layer has never been proposed;
• The security threats and vulnerabilities for SS7 and SIGTRAN identified by the analysis
aforementioned;
• A proposed taxonomy of the open source projects available;
• A description of the possible attacks which can be implemented against mobile networks
and an evaluation of the real risks raised by them;
• Proposed best practice counter measures, with guidelines for implementing a screening
policy for MAP messages.
• A SS7/SIGTRAN network incident report template
Risks pertaining to IMS and LTE networks are out of the scope of this document.
V4.0 Page 5 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
1.3 Abbreviations
Term Description
AS Application Server
ASP Application Server Process
BSC Base Station Controller
BSS Base Station Subsystem
BSSAP Base Station Subsystem Application Part
C7 Common Channel 7, name often used for SS7 in ITU communities
CAMEL Customised Applications for Mobile networks Enhanced Logic
CAP Camel Application Part
CF Call Forwarding
CIC Circuit Identification Code
CLEC Competitive Local Exchange Carrier
CLI Calling Line Information
(D)DOS Distributed Denial of Service
DNS Domain Name System
DPC Destination Point Code
eDNS External DNS
GPL General Public Licence
GPRS General Packet Radio Services
GRX GPRS Roaming Exchange
GSM Global System for Mobile Communications
GT Global Title
HLR Home Location Register
HP(L)MN Home Public (Land) Mobile Network
HTTP Hypertext Transfer Protocol
HUR High Usage Report
IAM Initial Address Message
IDP Initial Detection Point
IDS Intrusion Detection Systems
IETF Internet Engineering Task Force
IGP International Gateway Point
IGW Interworking GateWay
IMSI International Mobile Subscriber Identity
IN Intelligence Network
INAP Intelligent Network Application Protocol
V4.0 Page 6 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
Term Description
IP Internet Protocol
IPSec Internet Protocol Security
IPSP IP Server Process
ISDN Integrated Services Digital Network
ISUP ISDN User Part
ITU-T International Telecommunications Union – Telecom sector
IUA ISDN Q.921-User Adaptation Layer
IVR Interactive Voice Response
M2UA MTP2 User Adaptation layer
M3UA MTP3 User Adaptation layer
M2PA MTP Level 2 Peer Adaptation
MAP Mobile Application Part
MG Media Gateway
MGC Media Gateway Controller
MGCP Media Gateway Control Protocol
MNO Mobile Network Operator
MS Mobile Station
MSC Mobile Switching Centre
MSISDN Mobile Subscriber ISDN
MSU Message Signalling Unit
MTP Message Transfer Part
MWI Message Waiting Indication
MTU Maximum Transmission Unit
NA Nature of Address
NAT Network Address Translation
NI Network Indicator
NP Numbering Plan
NRTRDE Near Real-Time Roaming Data Exchange
NS Number Series
OPC Originating Point Code
OSI Open Systems Interconnection
PBX Private Branch Exchange
PC Point Code
PLMN Public Land Mobile Network
PRD Permanent Reference Document (GSMA)
V4.0 Page 7 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
Term Description
PRI Primary Rate Interface (ISDN)
PRS Premium Rate Services
PSTN Public Switched Telephone Network
RAN Radio Access Network
RANAP Radio Access Network Application Part
ROSE Remote Operation Service Element
SAD Security Association Database (TCAPSec)
SCCP Signalling Connection Control Part
SCF Service Control Function
SCMG SCCP Management
SCN Switched Circuit Network
SCP Service Control Point
SCTP Stream Control Transmission Protocol
SDP Service Data Point
SEG Security Gateway (TCAPSec)
SEP Signalling End Point
SG Signalling Gateway
SGP Signalling Gateway Process
SGSN Serving GPRS Support Node
SI Service Indicator
SIGTRAN Signalling Transport
SIO Service Information Octet
SIP Session Initiation Protocol
SK Service Key
SMS Short Message Service
SMS-C SMS Centre
SNMP Simple Network Management Protocol
SPC Signalling Point Code
SPD Security Policy Database (TCAPSec)
SS7 Signalling System Number 7
SSN SubSystem Number
SSP Service Switching Point
STP Signalling Transfer Point
SUA SCCP User Adaptation
TCAP Transaction Capabilities Application Part
V4.0 Page 8 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
Term Description
TDM Time Division Multiplexing
TLS Transport Level Security
TT Translation Type
TUP Telephone User Part
UA User Adaptation
UMTS Universal Mobile Telecommunications System
UTRAN UMTS Terrestrial Radio Access Network
VLR Visitor Location Register
VMS VoiceMail Service
VoIP Voice over Internet Protocol
VPLMN Visited PLMN
1.4 References
Ref Document Link
GSMA PRD FS.11 “SS7 Interconnect Security
[1]
Monitoring Guidelines.”
GSMA PRD IR.82 “SS7 Security Network
[2]
Implementation Guidelines.”
[3] GSMA PRD IR.70 “SMS SS7 Fraud v4.0”
[4] GSMA PRD IR.71 “SMS SS7 Fraud Prevention v5.0”
GSMA PRD SG.07 “The Potential Misuse and a https://infocentre2.gsma.com
[5]
Threat Analysis of the GSM System v2.0”
GSMA PRD SG.22 “SMS Firewall Best Practices and
[6]
Policies”
[7] GSMA PRD FF09 “Introduction to SMS Fraud”, v. 2.1
Securing SS7 Telecommunications Networks.
[8] Proceedings of the 2001 IEEE Workshop on
Information Assurance and Security.
Signalling System 7 (SS7) Message Transfer Part 2 https://tools.ietf.org/html/rfc4
[9]
(MTP2) - User Peer-to-Peer Adaptation Layer (M2PA) 165
V4.0 Page 9 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
V4.0 Page 10 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
V4.0 Page 11 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
V4.0 Page 12 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
V4.0 Page 13 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
The SS7 standard defines the signalling architecture and protocols employed for message
transport. This section describes these components in detail.
V4.0 Page 14 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
In Figure 1 the four main line types connecting end-users to a SSP are shown:
• Analogue lines (voice trunk): analogue signalling messages are converted to digital
signalling messages by the SSP
• Integrated Services Digital line (ISDN) lines (D-Channel): digital signalling messages
very similar to SS7 packets
• Leased lines
V4.0 Page 15 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
The SS7 Message Transfer Part (MTP) layers 1-3 map respectively to physical, data link and
network layers of the Open Systems Interconnection (OSI) model. The user and application
parts of SS7 correspond to OSI layers 4-7 and these define the connection/connectionless
protocols and the remote database access protocol. In particular, MTP1 defines the physical
characteristics of the signalling link and the type of interface used in the network; MTP2 ensures
the delivery of all SS7 messages point-to-point and provides the tools necessary for reliable
transport of the messages over the network, while MTP3 routes messages to the proper
destinations using the point codes sent in the SS7 network and the configurations stored in the
routing tables.
A point code is a number that uniquely identifies a node in a SS7 network. It resembles an IP
address in the OSI model.
MTP2 and MTP3 also implement protocols for link, routing and traffic management. Link
management at MTP2 oversees the error levels at each link and sends messages advising of
links’ failed or restored status. In cooperation with link management, routing management
facilitates the re-routing of traffic around failed or congested nodes. When certain functions of a
node fail, traffic management notifies other signalling points about congestion or the failure and
only re-routes those signalling messages that are affected by the condition.
Once MTP layers ensure reliable signalling between adjacent nodes, SS7-specific protocols
define cross network communications such as call connections, disconnections and remote
function control. The ISDN User Part (ISUP) is the predominant protocol to provide connection-
oriented services in SS7 networks, to setup and teardown circuits for voice and circuit switched
V4.0 Page 16 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
data exchange. ISUP also offers advanced services like supplementary services for the circuits
carrying the transmission.
The Telephone User Part (TUP) is also able to handle call setup and teardown. It is compatible
with ISUP but it does not facilitate the support of advanced services; consequently it is being
phased out worldwide.
The Signalling Connection Control Part (SCCP) provides extended routing, flow control,
segmentation, connection-orientation, and error correction facilities in SS7 networks when
accessing network databases.
Although MTP provides routing capabilities based upon the point code, SCCP allows routing
using a point code and subsystem number or a Global Title (GT), which could be a dialled
sequence of a toll free 800-number, a calling card number or a mobile subscriber identification
number.
While a PC is used to address a particular node in the network, the Subsystem Number (SSN)
addresses a specific application available on that node. In addition, SCCP enables Global Title
translation, i.e. translation between a GT and a PC. Subsequently, SCCP implements a sort of
Network Address Translation (NAT) preventing outsiders from obtaining internal network point
codes. This function is typically carried out at the STP and can be used to control access to
network resources.
The Transaction Capabilities Application Part (TCAP) employs SCCP connectionless service to
transport non-circuit related information between signalling points.
TCAP implements standard Remote Operation Service Element (ROSE) services for
applications such as GSM Mobile Application Part (MAP) and CAMEL Application Part (CAP).
These applications provide services available from Home Location Registers (HLRs) and
Intelligent Networks (IN).
1. The Mobile Application Part (MAP) is a protocol which provides an application layer for
the various nodes in GSM and UMTS mobile core networks and GPRS core networks to
communicate with each other in order to provide services to mobile phone users.
2. The CAMEL Application Part (CAP) is a signalling protocol used in the Intelligent
Network (IN) architecture. CAP is a Remote Operations Service Element (ROSE) user
protocol.
3. The Intelligent Network Application Protocol (INAP) is a signalling protocol used in the
intelligent network architecture.
Running on SCCP, there are two additional layers named Radio Access Network Application
Part (RANAP [18]) and Base Station Subsystem Application Part (BSSAP, [19]). In particular,
RANAP is a protocol used on the Iu-CS interface which connects a Mobile Switching Centre
(MSC) to the UMTS Terrestrial Radio Access Network (UTRAN), while BSSAP is a protocol
V4.0 Page 17 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
which allows a MSC and a Base Station Controller (BSC) to communicate with each other using
signalling messages supported by the MTP and connection-oriented services of the SCCP.
For the SS7 network, the Message Transfer Part (MTP) protocols of the SS7 suite are replaced
by SIGTRAN protocols. Specifically, SIGTRAN protocols emulate the functions that are
provided by MTP2 and MTP3, as well as SCCP. This allows the higher layers of the SS7
protocol (ISUP, SCCP) to be transported over IP networks using Stream Control Transmission
Protocol (SCTP). SIGTRAN is commonly used where IP gradually replaces TDM circuits in the
signaling network.
According to Figure 3, SIGTRAN protocols define the procedures to provide reliable datagram
service and User layer Adaptation (UA) for SS7 and ISDN protocols over IP networks. This
protocol suite is made up of a new transport layer, named Stream Control Transmission
Protocol (SCTP), and a set of UA layers which mimic the services of the lower layers of SS7
and ISDN.
V4.0 Page 18 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
For the Message Transfer Part 3 (MTP3) User Adaptation (M3UA) [9] and the SCCP User
Adaptation (SUA) [11] (see section 2.4 for details), the SG performs this routing based on static
or dynamic Routing Keys (see description reported hereafter).
Figure 4 shows an example of how an SG might be provisioned with Routing Key, Routing
Context, AS, and Application Server Process (ASP) information. This figure contains a pair of
SGs that also act as STPs for SS7 traffic and share the same AS database. When a SG
receives a message, it tries to match it against its database. In this example, a message arrives
for DPC 1.1.1 at SG2. This message matches AS CHICAGO, so it is forwarded to ASP1.
For the MTP2 User Adaptation Layer (M2UA) and the ISDN Q.921-User Adaptation Layer (IUA)
(see section 2.4 for details), the SG uses an Interface Identifier value (i.e. a 32-bit integer value
or an ASCII string created using the physical slot and port where the SS7 link is connected to)
to determine the distribution of incoming messages. The Interface Identifier is unique between
V4.0 Page 19 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
the SG and the ASP. Unlike Routing Keys, there can be a many-to-one relationship between
Interface Identifiers and AS.
• A virtual switch element that handles all call processing for a unique range of PSTN
trunks, identified by an SS7 service information octet (SIO) / destination point code
(DPC) / originating point code (OPC) / circuit identification code (CIC) range.
• A virtual database element, handling all HLR transactions for a particular SS7
DPC/OPC/SCCP_SSN combination.
• An AS can contain a set of one or more unique ASPs, of which one or more is normally
actively processing traffic.
V4.0 Page 20 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
All sub-layers overlying these UA layers implement the user and application parts of the SS7.
V4.0 Page 21 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
The SIGTRAN stack is based on IP. Consequently, the first three layers of this stack correspond
exactly to layers 1-3 of the standard ISO/OSI model.
At layer 4 (Transport) the Internet Engineering Task Force (IETF) SIGTRAN Working Group
defined another protocol named SCTP overcoming the limits identified in UDP and TCP
protocols in real-time applications.
SCTP [16] is designed to transport PSTN/PLMN signalling messages and other real-time
applications over IP networks and is capable of broader applications. It is a reliable transport
protocol operating on top of a connectionless packet network such as IP and offers the following
services to its users:
V4.0 Page 22 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
The design of SCTP includes appropriate congestion avoidance behavior and resistance to
flooding and masquerade attacks.
SIGTRAN implements several user adaptation layers (e.g. layers used to encapsulate several
different signalling protocols for transport over an IP network using SCTP) which include the
following [32]:
The SUA-layer’s main tasks are to transfer SCCP user data between a SG and a MGC (client-
server model) and to map between SCCP addresses and IP addresses in the SG. However,
because of SUA´s inability to transport ISUP messages, 3GPP has chosen to use M3UA as the
standard signalling protocol in the central parts of the UMTS network while using SUA as a
complement for nodes with databases, e.g. home location registers (HLRs).
2.4.3 SS7 Message Transfer Part 3 (MTP3) User Adaptation Layer (M3UA)
This layer operates on a client-server basis, just as M2UA, to provide remote connection
between two SS7 layers in a SG and a MGC (IP node). However, in this case, the SG has a
MTP3 layer (and a point code) that communicates with the ISUP/SCCP layer of the MGC, see
Figure 8. Even in this case, the nodes are not aware of each other; the MTP3 in the SG does
V4.0 Page 23 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
not know that its client (ISUP or SCCP) is remote and similarly the ISUP/SCCP layer at the
MGC does not know that the SG´s MTP3 layer is not its own and there is a logical link between
the SCCP layer in the IP node and the MTP3 layer in the SG. This is another example of
backhauling.
As with M2UA, M3UA does not process signalling packets but it simply forwards them to their
destination. This means that the M3UA in the IP node does not have routing tables and does
not execute any other functions of the corresponding MTP3 layer. If M3UA is used in an all-IP
network with no pure SS7 nodes, it replaces the MTP3 layers of both the IP nodes and operates
in a point to point manner that is known as IP Signalling Point (IPSP) behaviour. M3UA is one of
the user adaptation layer protocols that removes most SS7 layers from the signalling points and
that changes the topology of the network to a more IP-like one. Thus, the system can better
make use of the more efficient IP-solutions and cheaper infrastructure. In an all-IP network,
M3UA is not restricted to the SS7 requirements of a maximum message size of 272 bytes, but
can use the larger bandwidth available via the IP network. The flexibility of M3UA and its ability
to better use the IP network and its advantages lead to it being chosen as the standard protocol
for UMTS networks.
V4.0 Page 24 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
M2UA is frequently used when there is a low density of physical SS7 links in some particular
part of the network, or if the SGs are at a great distance from each other. In this case
backhauling can connect several of these signalling nodes to one centralized network element,
thus allowing these distant nodes to share a single SG. Since this is done over the IP network, it
is much cheaper than SS7 links, hence M2UA is a cost saving alternative. Another advantage is
the fact that each SG, that connects a remote signalling point to a MGC, does not have a point
code. The point code is assigned to the MGC, which saves many SS7 PCs that would otherwise
have been required by each SG (as when using M2PA).
Figure 10 - Two Distant SS7 Network Islands are Connected over Internet through M2PA
(from [32])
V4.0 Page 25 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
M2PA can be used between two IP-signalling nodes in an IP-network, or between a SG and an
IP-signalling node, but is most common between two SGs, e.g. to interconnect two SS7 network
islands (PSTN A and PSTN B) through an IP network. Figure 10 shows the two distant SS7
networks that are combined together via a less expensive IP network. Since the SS7 links are
dedicated to signalling traffic only, the bandwidth is continuously assigned, hence infrequently
used SS7 links inefficiently use the bandwidth which is a scarce resource. The IP solution mixes
signalling traffic with other IP traffic and therefore reduces the costs of signalling, since a link
can be shared among many users. Since both SGs have an MTP3 layer they also have a point
code and a SS7 PC must be assigned to each SG. Because of the peer-to-peer feature of
M2PA, it is possible for the MTP3-peers to communicate directly. The user of M2PA is MTP3 in
both nodes, just as MTP3 is the user of MTP2 in the SS7 stack. This means that M2PA is
actually just a replacement for MTP2 and therefore has functions similar to MTP2.
Finally, because M2PA is a peer-to-peer arrangement between two IP-based SS7 Signalling
Points, there is no need for message distribution or routing.
V4.0 Page 26 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
The most relevant SS7 open source projects to mobile security are listed and elaborated on
below:
• OpenSS7 [25]
• libss7 [26] integrated into Asterix Project [28]
• Mobicents [27].
3.1 OpenSS7
This is an open-source development project to provide a robust and general public licence
(GPL) SS7, SIGTRAN, ISDN and VoIP stack for Linux and other UN*X operating systems. The
project was announced in the late ‘90s with the latest release dating back to 31st October 2008
and it seems it is no longer maintained.
OpenSS7 provides a largely complete implementation for the following SS7 and SIGTRAN
protocols:
V4.0 Page 27 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
• MTP1-MTP3
• SCCP
• ISUP,TCAP, BSSAP
• SCTP
• M3UA, M2UA, M2PA
• SUA, IUA
For the application protocols (e.g. MAP, INAP) based on the SS7/SIGTRAN lower protocols,
several other open source initiatives can be cited (e.g. GSM/MAP HLR GPRS, OpenSwitch,
Asterix PBX).
There are no particular software requirements for installing SS7 tools: it is sufficient to use a
Linux system running a 2.4.10+ kernel and a gcc compiler with an appropriate set of kernel
module tools. On the other hand, in terms of hardware, we have to distinguish between two
cases:
1. The availability of a SS7 link: in this case SS7 link interface cards are necessary.
2. The availability of standard IP Connections: in this case a legacy network interface card
combined with SIGTRAN stack can be used. The result is that in this way SS7 MTP and
SCCP can run on a Linux box which does not have any physical SS7 links attached to it
and multiple SS7 nodes can be set up to communicate with each other using just IP
connections.
In particular, OpenSS7 provides two drivers that provide an IP-based signalling link as follows:
The package is integrated in Asterix Open Source toolkit and consequently the source code is
available in the Asterisk source tree [28].
The solution makes use of zaptel channel driver to control incoming and outgoing calls via the
zaptel hardware.
Zaptel hardware are time division multiplexing (TDM) devices which share a common driver
suite called Zaptel/Dahdi Telephony Driver Suite. Most devices sold by Digium [29] are
members of the Zaptel/Dahdi family of hardware devices.
It supports only the ITU variant of SS7 implementing MTP2, MTP3 and ISUP protocols.
V4.0 Page 28 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
Two Asterisk configuration files have to be modified to setup the SS7 connection:
5. The configuration of zaptel device in zaptel. Configuration is similar as for ISDN PRI. The
physical interface parameters (number of E1s, synchronization, framing and coding,
etc.), and the channels used for user traffic and signalling shall be defined.
6. The configuration file zapata.conf where the signalling type, SS7 variant, number of
linksets, point codes (OPC, DPC) and traffic and signalling channels shall be defined.
Asterisk supports a wide range of video and Voice over IP protocols, including the Session
Initiation Protocol (SIP), the Media Gateway Control Protocol (MGCP), and H.323 but it does not
support SIGTRAN.
3.3 Mobicents
Mobicents [27] provides a runtime environment and comprehensive suite of tools for
development, deployment and management of services integrating voice, video and messaging
across a range of communications networks, as shown in Figure 12.
In particular, it provides an open source software solution implementing SS7 stack (MTP2,3,
ISUP, SCCP, TCAP, CAMEL, MAP protocols for a dedicated equipment) and partially SIGTRAN
with M3UA over IP and SCTP ([32], not in a multi-home scenario).
M2UA and M2PA are not yet supported because their implementation depends on community
contribution.
V4.0 Page 29 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
Figure 13 - Protocols that are already implemented, in progress and planned in SS7
3.4 Safeseven
Safe Seven [67] is an open source SS7 penetration testing tool built for SS7 assessment. It is
Java-based, runs on a standard Linux host and supports several type of SS7 attacks like:
V4.0 Page 30 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
3.5 SigPloit
SiGploit [69] is an open source penetration testing tool built to pentest and exploit vulnerabilities
in the signalling protocols used in mobile networks. SiGploit aims to cover all protocols used in
MNO interconnects i.e. SS7, GTP, Diameter and SIP for IMS and VoLTE infrastructures.
• Location tracking
• Call and SMS interception
• Billing frauds
V4.0 Page 31 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Membe
Official Document FS.07 - SS7 and SIGTRAN Network Security
This taxonomy is primarily inspired by several works available in published literature and in particular [42], [43] and [44] but it has
been integrated with some attack types strictly related to SS7/SIGTRAN networks.
V4.0 Page 32 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Membe
Official Document FS.07 - SS7 and SIGTRAN Network Security
V4.0 Page 33 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Membe
Official Document FS.07 - SS7 and SIGTRAN Network Security
V4.0 Page 34 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Membe
Official Document FS.07 - SS7 and SIGTRAN Network Security
A proposed taxonomy of possible effects of cyber-attacks is featured in Table 2. This taxonomy is primarily inspired by several works
available in the literature and in particular [42], but it has been integrated with some attack types strictly related to SS7/SIGTRAN
networks.
Impersonation IMP Pretending to be someone else by assuming that identity (e.g. MNO or a customer impersonation).
V4.0 Page 35 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Membe
Official Document FS.07 - SS7 and SIGTRAN Network Security
CSA OVASA CDD TDD IMP SU DSCB SSA CDM TDM DIS
PI X X X
MITM X X X X X X X
(D)DoS X
RA X X X
SP X X X X
EA X
PWDA X X
MIS X
FAK X
PHA X X X
IA X X X X X X X X X X
IG X X X X X X
ROA X X X
DA X X X X X X X X X
SPA/FL X X
TRACK X X
V4.0 Page 36 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
Figure 14 shows the possible entry points into a SS7 network which can be used/abused to
conduct attacks against the infrastructure.
The most common method for attackers to gain access to the SS7 network is via re-sold
access to interconnect agreements with operators that do not perform sufficient due
diligence or ongoing monitoring of their interconnect partners. In theory, external attacks
(coming from outside the network) can also be carried out from ISDN connections and/or
Internet connections (such as from GPRS Roaming Exchange, or GRX) or CLEC
(Competitive Local Exchange Carrier) connections.
The following sub-sections describe the possible attacks that can be conducted on the SS7
protocols from these identified entry points.
V4.0 Page 37 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
V4.0 Page 38 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
5.1.2.3 IVR (Interactive Voice Response) and VMS (Voice Mail Service) Access
Some ISUP-triggered services like voice mail and IVRs can be tricked as they sometimes
merely use the calling number for customer authentication and service authorization and
hence customer voice messages and services can be accessed by fraudsters. Some
voicemail systems can be set up so that they grant access to stored messages without a
password, relying solely on the caller identity presented.
The SCCP layer is mainly responsible for routing, including fields like Numbering Plan (NP),
Translation Type (TT) and Nature of Address (NA).
To protect the PLMN network equipment identities from exposure to external parties, partial
GTs and other internal routing parameters may be used.In this case only the PC of the
gateway STP is used along with dialled digits.. The gateway STP will then route the
message based on the GT digits provided, but even the gateway STP does not know the
final GTT. The final GTT is provided by an STP, usually adjacent to the HLR, that provides
the SSN and other GTs as part of the final GT. This eliminates the need to make routing
disclosures at the network edge, and also eliminates a lot of provisioning requirements in the
SS7 network.
The STP and the protocol both provide for this threat and use congestion control procedures
to prevent DoS from impacting the network. Link management within the SS7 protocol helps
control traffic at the individual link level (via MTP2) so when congestion does begin to occur,
the traffic can be managed accordingly.
Likewise, MTP3 provides traffic management and route management. Both of these
functions are defined within the SS7 protocol and are implemented at the STP to ensure
traffic can be routed around nodes that are congested, links that become congested, or
nodes that suddenly become unavailable.
At the SCCP layer, the SCCP Subsystem Management (SCMG) provides these functions at
the application layer, alerting the downstream nodes of congestion issues at the application
level. For example, should a HLR begin to become congested, the SCMG would take
measures to throttle lower priority traffic to prevent overload of the HLR.
This makes it highly unlikely that a DoS attack on the SS7 network will carry much impact,
given the task of the STP and the protocol itself. Nonetheless, it is something service
providers must be aware of and plan accordingly for as a precaution.
V4.0 Page 39 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
5.2.3 TCAP
TCAP is a protocol introduced to facilitate multiple concurrent dialogs between the same
sub-systems on the same machines, using Transaction IDs to differentiate these. It
transports MAP messages, used, for example, for SMS delivery.
Using the information gathered from this scanning, an attacker can perform other types of
attacks, for example denial of service, network element impersonation, fraud, abuse to
obtaining information about customers or internal infrastructure. These types of attacks are
referred to as TCAP Scan in Table 4.
In normal call flows, TCAP ID is an integer value used to identify a TCAP transaction and it
is generated by the sender when sending a request, and receiver reuses the same ID when
replying. This allows matching of requests and answers.
V4.0 Page 40 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
Multiple types of TCAP messages exist, each with a different effect on the TCAP session:
A vulnerable network element generates non random OTID and an attacker can predict the
current ID or the next one and injects TCAP traffic through the existing session.
The impact is either a loss of integrity due to malicious MAP injections on top of TCAP
sessions or a Denial of Service when aborting an existing TCAP.
Some SSN (e.g. 1, 4, 6, 7, 146, 147) should be opened only for authorized peers as they
represent dangerous entry points to the Signaling Network applications.
Using the information gathered from this scanning, an attacker can perform other types of
attacks, for example denial of service, network element impersonation, fraud, abuse to
obtaining information about customers or internal infrastructure.
5.2.4 TCAPsec
TCAPSec consists of a complete set of enhancements and extensions to facilitate security
protection for the TCAP protocol and it covers transport security in the TCAP protocol itself
and the security management procedures [52] and [53]. In particular, it was introduced to
ensure:
• Data integrity: is the property that data has not been altered in an unauthorized
manner
• Data origin authentication: is the corroboration that the source of data received is as
claimed.
• Anti-replay protection: is a special case of integrity protection. Its main service is to
protect against replay of self-contained packets that already have a cryptographic
integrity mechanism in place.
• Confidentiality (optional): is the property that information is not made available or
disclosed to unauthorized individuals, entities or processes.
V4.0 Page 41 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
The problem with this protocol is that it requires new components to be added to the network
such as an SS7 Security Gateway (SEG) with databases for security policy (SPD) and a
security association (SAD). The SEG secures the TCAP transactions with the help of the
Policy Database.
TCAPSec provides good protection against faking case (see section 5.4.9.2). It needs a lot
of interworking between operators and all operators need to use TCAPsec for it to be truly
effective.
V4.0 Page 42 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
The SMS gateway/Interworking MSC operator and the serving node (MSC or SGSN)
operator may agree to use the TCAP handshake as a countermeasure against SMS fraud
for messages exchanged between their networks (for detailed message flows see [20]).
A limited level of MAP message authenticity can be achieved by using a TCAP handshake
prior to the MAP payload exchange.
Figure 17 illustrates the use of the TCAP handshake for MAP SMS transfers in case of
Mobile Terminated SMS and Mobile Originated SMS [52].
If the serving network receives an “mt-forward-SM” MAP message which uses the
TC_Continue to transfer the MAP payload then it is guaranteed that the SCCP calling party
address of the (empty) TC_Begin message is authentic, otherwise the first TC-continue
V4.0 Page 43 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
message would be sent to the falsified address. The correct message flow is guaranteed by
the TCAP transaction capabilities (use of Transaction ID).
Unfortunately, there are some ways in which a fraudulent SMS Gateway operator (called the
originator in bullets (a) and (b)) may try to circumvent the implicit SCCP address
authentication provided by the TCAP handshake.
If TCAP handshake is to be used, the following measure should be taken within the network
of the serving node in order to counteract the spoofing possibilities of a malicious mt-
Forward-SM originator.
• MEAS-1: The receiving network shall verify if the received SMS-GMSC address (as
SM-RP-OA in the third message) may be used from the SCCP Calling Party Address.
Some operators use a single SMS GMSC address for a range of SCCP Calling Party
Addresses and this will need to be taken into consideration.
If TCAP handshake is to be used, at least one of the following measures should be taken
within the network of the serving node in order to counteract the spoofing possibilities of a
malicious mt-Forward-SM originator.
• MEAS-2a: The receiving node shall use mechanisms to ensure that the destination
TCAP transaction ID which needs to be used within the third message is predictable
with a probability of less than 1 / 210 for a third party knowing all previous TCAP
transaction ID values.
• MEAS-2b: The receiving network shall wait n seconds before it processes the third
message (TC-continue (mtforwardSM with payload)). This should ensure that the
TC_abort from the spoofed network is processed at the destination node earlier than
a TC_continue including a successfully guessed TCAP Transaction ID value.
The following grouping method may be used by an operator to gradually introduce the TCAP
handshake for mt-Forward-SM messages.
• Define an "operator group-1" as a trusted operator group that uses the TCAP
handshake
• Define an "operator group-2" as an untrusted operator group that does not use the
TCAP handshake.
As specified by TS 29.002 [20], this requires that the SMS Gateway operators belonging to
group-1 shall either use application context 2 or 3 for mt-Forward-SM. The management of
the two groups requires that the serving network shall implement a policy table of SCCP
Calling Party Addresses for which a TCAP handshake is required.
V4.0 Page 44 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
If the above described grouping method is used, then the following measure shall be taken
at the serving network in order to counteract the spoofing possibilities of a malicious mt-
Forward-SM originator that tries to circumvent the policy table checks.
• MEAS-3: The serving network shall verify that the SCCP Calling Party Address of a
first message with a payload (i.e. not using the TCAP handshake) is not from an
SMS-GMSC-address as SM-RP-OA that uses the TCAP handshake. The benefit
gained for operators that belong to group-1 is that spoofing of their SMS-GMSC-
addresses is practically difficult if the policy table has been administered accurately.
If the serving network sends a mo-forward-SM MAP message which uses the TC_Continue
to transfer the MAP payload then it is guaranteed that the SCCP calling party address of the
(empty) TC_Begin message is authentic, otherwise the first TC-continue message would be
sent to the falsified address. The correct message flow is guaranteed by the TCAP
transaction capabilities (use of Transaction ID).
Unfortunately, there are some ways in which a fraudulent serving (MSC or SGSN) operator
(called the originator in bullets (a) and (b)) may try to circumvent the implicit SCCP address
authentication provided by the TCAP handshake.
If TCAP handshake is to be used, the following measure may be taken within the network of
the SMS Interworking MSC in order to counteract the spoofing possibilities of a malicious
mo-Forward-SM originator.
• MEAS-1: The receiving node (i.e. SMS interworking MSC) may query the HLR to
verify if the received SCCP Calling Party Address of the mo-forward-SM is from the
V4.0 Page 45 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
same network which is currently serving the subscriber (MSISDN contained in SM-
RP-OA in the third message).
If the TCAP handshake is to be used, then at least one of MEAS-2a and MEAS-2b
previously defined for Mobile Terminated SMS should also be applied.
The following grouping method may be used for an operator to gradually introduce the TCAP
handshake for mo-Forward-SM messages:
• Define an 'operator group-1' as a trusted operator group that uses the TCAP
handshake
• Define an 'operator group-2' as an un-trusted operator group that does not use the
TCAP handshake.
As specified by TS 29.002 [20], this requires that the MSC operators belonging to group-1
shall either use application context 2 or 3 for mo-Forward-SM. The management of the two
groups requires that the network of the SMS interworking MSC shall implement a policy
table of originating SCCP-addresses for which a TCAP handshake is required.
If the above described grouping method is used, then the following measure should be taken
at the network of the SMS interworking MSC in order to counteract the spoofing possibilities
of a malicious mo-Forward-SM originator that tries to circumvent the policy table checks.
• MEAS-3: The SMS Interworking MSC shall verify that the SCCP Calling Party
address of a first message with a payload (i.e. not using the TCAP handshake) is not
from an address that shall use the TCAP handshake.
The benefit gained for operators that belong to group-1 is that mo-Forward-SM spoofing for
their subscribers, while roaming within group-1, becomes practically very difficult if the policy
table has been administered accurately.
MAPsec has been proposed to cover the aforementioned items covered by TCAPsec, and
works in a similar manner in the MAP layer. Most importantly, it may also be used to cipher
MAP messages to overcome security breaches but, practically, it is not yet used.
Consequently, several types of attacks can be performed by maliciously sending SS7 MAP
messages, mainly from an international interconnection point (for more information see [54],
[55], [56], [66] and [67]).
Some attack examples described below are based on some MAP message abuse when
proper countermeasures aren’t adopted.
V4.0 Page 46 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
• SendAuthenticationInformation (SAI):
This message is used by the VLR or SGSN to retrieve, for a given MSISDN / IMSI,
authentication information from the HLR like the Ciphering Key (Kc). If no screening
policy is implemented on the HLR to limit response to only trusted peers, then
malicious SAI can be used to retrieve authentication parameters.
• SendIdentification (SI):
This message is used between a VLR and a previous VLR (as an inter-VLR
procedure) to retrieve IMSI and authentication data for a subscriber registering afresh
in that VLR. It requires the TMSI of the queried subscriber and returns one or more
Authentication set(s).
• SendParameters (SP):
This message is used as an inter-VLR procedure to hand over control of subscriber’s
connection in a home network context. It is also specified to be used to signal to a
HLR to update location, and to exchange authentication information between a
VLR/SGSN and HLR. It requires the IMSI or TMSI of the queried subscriber and
return Authentication set(s).
V4.0 Page 47 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
• SendRoutingInfo (SRI):
This message is invoked by the Gateway MSC to perform an interrogation to the HLR
in order to route a call towards the called MS. When sending a SS7 MAP SRI request
towards the HLR, this one returns the private customer's number IMSI, VMSC GT
where the subscriber is attached and other information.
• ProvideSubscriberInfo (PSI):
This message is used by HLR to request information (e.g. subscriber state and
location) from the VLR or SGSN at any time. One attack has an information gathering
phase where a SendRoutingInfo for SMS (SRIforSMS) is sent and the result is used
to obtain the CellID using the PSI command.
• SendIMSI:
This service is used by a VLR in order to fetch the IMSI of a subscriber in case of
some operation & maintenance procedure where subscriber data are needed in the
Visited PLMN and MSISDN is the only subscriber's identity known.
• SendRoutingInfo (SRI):
When sending a SS7 MAP SRI request towards the HLR, this one returns the private
customer's number IMSI.
• UpdateLocation (UL):
This message is used by the VLR to update the subscriber location information stored
in the HLR (VLR number and the MSC address). When sending an UL request
towards the HLR, and the correctness and trustworthiness of this information (VLR
V4.0 Page 48 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
number and/or MSC address) are not verified, a mobile subscriber can become
unreachable.
• CancelLocation (CL):
The message is used by HLR towards the VLR/SGSN to delete a subscriber record
from the VLR/SGSN. It may be invoked automatically when a MS moves from one
VLR/SGSN area to another, to remove the subscriber record from the old
VLR/SGSN, or by the HLR operator to enforce a location updating from the
VLR/SGSN to the HLR e.g. on withdrawal of a subscription.
• InsertSubscriberData (ISD):
This message is used by an HLR to update a VLR/SGSN with certain subscriber data
(for example after changes of the subscription of one or more supplementary
services, basic services or data, or changes in the Operator Determined Barring and
so on, or by setting a compromised CAMEL node to retrieve the subscriber profile).
When sending this SS7 MAP request towards the VLR/SGSN and the trustworthiness
of the message is not verified, a mobile subscriber may become unable to use some
services. If CAMEL v.3 is used, inserting fake gsmSCF GT information would also
allow DoS of a targeted user’s mobile data connection, because the SGSN that the
subscriber is attached to contacts a compromised gsmSCF which returns back, for
example, a fake APN.
• DeleteSubscriberData (DSD):
This message is used by a HLR to remove certain subscriber data from a VLR or
SGSN if the subscription of one or more supplementary services or basic services is
withdrawn. This service is also used by a HLR to remove GPRS subscription data
from an SGSN.
• AnyTimeModification (ATM):
This message is used by the gsmSCF, to modify subscription information of the HLR
at any time. This service is also used by the Presence Network Agent to activate or
deactivate reporting of mobility management events (associated with a presentity)
from the VLR or SGSN. This service is also used by external Short Message
Gateway (IP-SM-GW) for updating the IP-SM-GW Number stored in the HLR. When
sending a SS7 MAP request towards the HLR and the trustworthiness of the
message is not verified, a subscriber could become unreachable.
• ProvideRoamingNumber (PRN):
This message is used between the HLR and VLR. The service is invoked by the HLR
to request a VLR to send back a roaming number to enable the HLR to instruct the
GMSC to route an incoming call to the called MS. When sending a SS7 MAP request
towards the VLR/MSC and the trustworthiness of the message is not verified, a MAP
PRN flood can prevent customers from making new calls and the targeted MSC to
receive new calls.
V4.0 Page 49 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
• AlertServiceCentre:
This message is used when the HLR notices that the Service Centre(s) shall be
alerted in the following case: when HLR detects that a subscriber, whose MSISDN is
in the Message Waiting Data file, is active or the MS has memory available. The
message is sent by the HLR to the interworking MSC.
• RemoteUserFree:
This message is used by the HLR to report to the VLR that a subscriber B is now idle
and that a subscriber A can be notified.
• RegisterSS:
This message is used by the MSC towards the VLR and by the VLR towards the HLR
to register data related to a supplementary service. The VLR will relay the message
to the HLR. The message indicates the supplementary service which the mobile
subscriber wants to register. The service is a confirmed service.
• Reset:
This message is used by the HLR, after a restart, to indicate to a list of VLRs or
SGSNs that a failure occurred. This message is not confirmed. This message
contains the HLR number (HLR GT) and optionally the list of HLR Ids (HLR Id List). If
this list is present in the indication, the VLR or SGSN may base the retrieval of
subscribers to be restored on their IMSI: the subscribers affected by the reset are
those whose IMSI leading digits are equal to one of these numbers. If the parameter
is absent, subscribers to be restored are those for which the OriginatingEntityNumber
received at location updating time matches the equivalent parameter of the Reset
Indication.
• ForwardCheckSSIndication:
This message may be used by a HLR as an implementation option, to indicate to a
mobile subscriber that supplementary services parameters may have been altered,
e.g. due to a restart. If received from the HLR, the VLR shall forward this indication to
the MSC, which in turn forwards it to the MS. The HLR only sends this indication after
successful completion of the subscriber data retrieval from HLR to VLR that ran
embedded in a MAP_UPDATE_LOCATION procedure.
• ActivateTraceMode:
The HLR uses activateTraceMode to activate trace (subscriber tracking) mode for a
particular subscriber (IMSI); the OSS requests activateTraceMode. The VLR waits for
that particular MS to become active, at which time it sends a request to its MSC to
trace the MS.
• ProvideRoamingNumber (PRN):
When sending this SS7 MAP request towards the VLR/MSC and the trustworthiness
of the message is not verified, a C7 network overload can be caused.
V4.0 Page 50 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
• InsertSubscriberData (ISD):
When sending this SS7 MAP request towards the VLR and the trustworthiness of the
message is not verified, a C7 network overload can be caused.
• ISTCommand:
When sending this SS7 MAP request towards the MSC and the trustworthiness of the
message is not verified, a C7 network overload can be caused.
• AnyTimeSubscriptionInterrogation:
This message is invoked by the gsmSCF, to request subscription information (e.g.
call forwarding supplementary service data or CSI) from the HLR at any time. When
sending this SS7 MAP request towards the HLR and the trustworthiness of the
message is not verified, a C7 network overload can be caused.
Some of these attacks have an information gathering phase to be able to launch the actual
attack. In that phase the SendRoutingInfo for SMS (SRIforSMS), for example, is used.
• InsertSubscriberData
When sending this SS7 MAP request towards the VLR and the trustworthiness of the
message is not verified, the barred services of a mobile subscriber can be enabled
causing a charging avoidance for the subscriber..
• ProcessUnstructuredSSRequest:
This message is used between the MSC and the VLR and between the VLR and the
HLR to relay information in order to allow/enable unstructured supplementary service
operation. If the trustworthiness of that message is not verified, then unauthorized
modifications to pre-paid accounts or money transfer could be performed.
• AnyTimeModification:
This message can be used to modify subscription information of subscriber in the
HLR at any time. When sending this SS7 MAP request towards the HLR and the
trustworthiness of the message is not verified, the barred services of a mobile
subscriber can be enabled causing a charging avoidance for the subscriber.
• NoteSubscriberDataModified:
This service is used by the HLR to inform the gsmSCF that subscriber data have
been modified (e.g. Ext Forwarding information-for-CSE, Ext Call barring, information-
for-CSE, ODB Info, CAMEL subscription info).
• DeleteSubscriberData:
When sending this SS7 MAP request towards the VLR and the trustworthiness of the
message is not verified, charging avoidance for the subscriber can be caused.
One attack utilizes an UpdateLocation (UL) message to spoof an MSC and then launch the
actual redirection attack.
V4.0 Page 51 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
• UpdateLocation:
When sending a SS7 MAP request towards the HLR, and if the correctness and
trustworthiness of this information (VLR number and/or MSC address) are not
verified, mobile subscriber traffic/call/SMS can be intercepted using a compromised
MSC sending or receiving further messages e.g. ProvideSubscriberInfo (PSI),
ProvideRoamingNumber (PRN) and ForwardSM-MT (FSM).
• AnyTimeModification:
This service is also used by external Short Message Gateway (IP-SM-GW) for
updating the IP-SM-GW Number stored in the HLR. When sending a SS7 MAP
request towards the HLR and the correctness and trustworthiness of this information
(e.g. IP-SM-GW number) are not verified, mobile subscriber SMS can be intercepted.
• InsertSubscriberData (ISD):
This message is used between the HLR and VLR to modify the subscriber’s profile
into the serving VLR. The insert of compromised CAMEL information (i.e. a fake
gsmSCF GT) would lead the gsmSSF to interrogate a fake gsmSCF and allow mobile
originated call interception, call redirection. If CAMEL v.3 is used, inserting a fake
gsmSCF GT would also allow interception of a targeted user’s mobile data
connection, because the SGSN that the subscriber is attached to contacts a
compromised gsmSCF which returns back a malicious APN string. The SGSN
resolves this APN to the corresponding malicious GGSN, and establishes a GTP
tunnel to the malicious GGSN. All IP user traffic is routed via this path and the
attacker would be able to monitor and (and potentially manipulate) this traffic.
User data traffic interception based on CAMEL v3 usage targets a specific user and
the satisfaction of some pre-conditions is required to make the attack successful. In
particular, user data traffic interception requires the APN resolution to be
compromised in some way. This compromised resolution of the APN could occur
when:
• The malicious APN is resolved from a trusted roaming partner DNS that has
provisioned the malicious APN (for example if it had been agreed by a roaming
partner);
• The eDNS servers used for the APN resolution have been compromised;
• The network was able to resolve it in some other way.
Of course, if the attacker is able to hack entries in the eDNS used for APN resolution,
they could directly change the record related to the victim’s APN, but in that case:
• they would need to know which APN the victim is enabled to use;
• the attack would not target just the victim but all users using the hacked APN.
V4.0 Page 52 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
• SetReportingState:
This message is used by the HLR towards the VLR to set the reporting state for a
requested service for example to request to report call results and events.
• AnyTimeSubscriptionInterrogation:
This message is invoked by the gsmSCF, to request subscription information (e.g.
call forwarding supplementary service data or CSI) from the HLR at any time. When
sending a SS7 MAP request towards the HLR, this one returns information about the
user subscriptions (e.g. Call Forwarding Data, Call Barring Data, ODB data, call
forwarding supplementary service data)
V4.0 Page 53 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
In the case of faking, the first part is done exactly as described above. However, the second
part is changed so that the source address in the MAP message <Forward Short Message>
is changed, often to someone else’s SMS-C address. The manipulation of the SMS-C
address causes any inter-PLMN SMS accounting to be incorrect. The faking of the source
address in the SCCP called party Global Title and the Service Centre Address in the MAP
message <Forward Short Message> is impossible without considerable efforts by the
technical staff running the SMS-C. In other words, it does not happen either by accident,
faulty configuration data or as the result of raw text messages received from the Internet. It
happens because in most cases it requires a software patch on the SMS-C. It is fair to say
that the “Faking Case” can only be caused by deliberate activities by a spam-generating
PLMN, a spam-sponsoring PLMN, or a spam-generating SMS-C operator acting
collaboratively with a PLMN.
V4.0 Page 54 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
5.3.8.4 Flooding
A large number of messages are sent to one or more destinations with the purpose to slow
down the operator network or to jam one or more mobile terminals. Messages may be valid
or invalid. It can be combined with spoofing or spamming.
5.3.8.5 GT Scanning
Refers to sending SMS MO to all Global Title addresses from one mobile operator in order to
find unsecured SMS-C (SMS-C that are not controlling the A number). Multiple SMS
Forward SM Submits are received, generally from the same MSISDN with the Called SCCP
Address and SMS-C Address incremented on each attempt. The easiest of these scans to
spot are sequential in nature scanning 10,000 GT at a time. There can be no valid reason for
such scanning of networks other than locating unsecured SMS-C. With simpler computer
integration with mobiles and SMS emulation software readily available, this type of activity is
likely to increase.
V4.0 Page 55 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
Figure 22 - GT Scanning
V4.0 Page 56 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
targeted customer is put in an abnormal MWI state where he is unable to receive any
subsequent SMS (since he is considered by the HLR as temporarily absent), unless he
changes MSC/VLR or receives priority SMS.
In section 8.1 some practical guidelines are reported to support an operator in putting in
place controls and filtering rules for different categories of MAP messages, depending on the
objectives and the legitimate usage of the messages.
V4.0 Page 57 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
6.1 Overview
MNOs can now be interconnected to each other over IP infrastructures because it is cheaper
and more efficient than traditional SS7 links by means of new protocols based on IP layer
like SIGTRAN and VOIP (e.g.as shown in Figure 23).
With the introduction of these new protocols the following aspects should be considered:
• Different teams of people with different skills have to work together e.g. IT and
telecom operations teams need to collaborate to protect;
• New open technologies e.g. open stack, open software (as described in section 3)
are understood by a much larger constituency of potential hacker than was the case
with SS7;
These have the potential to open the gates of the traditional walled gardens and expose the
mobile networks to new security threats.
Very often firewalls do not block or analyse or do not log or deny SCTP traffic and traditional
intrusion detection systems (IDSs) do not monitor, for example, SCTP traffic. Consequently,
even simple attacks like scanning can be undetectable on some networks.
Thus the implementation of some security measures is essential to prevent malicious attacks
against SIGTRAN networks.
The major difficulties to implement security in SIGTRAN rests on the fact that all the involved
points should implement security correctly. So, according to [33], secure tunnels like IPSEC
or Transport Level Security (TLS) tunnels are recommended between SIGTRAN nodes in
order to provide the equivalent of an isolated link such as that used in a traditional SS7
network.
V4.0 Page 58 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
Figure 24 shows the entry points for a SIGTRAN network that could be exploited to carry out
attacks against this infrastructure.
• SIGTRAN ASPs within MGC may be violated by authorized peers and abused by
hackers;
• SCTP protocols may be targeted by attackers which have violated authorized
peers, IP multimedia phones or have used insecure configurations (for example
public IP addressing for network equipment).
• Point 1 and Point 2: SIP & H323 protocols can be abused by hackers which can inject
illicit signalling information violating, for example, IP phones.
Sections 6.3.1to 6.3.7briefly describe the vulnerabilities and the attacks which can be
conducted against SIGTRAN stack layers using the entry points reported in Figure 24. A
brief outline of some SIGTRAN security features is first provided below.
6.2.1 IP Layer
IPSEC tunnels could be used to prevent spoofing, tampering, reply, passive and active
attacks at the IP layer. The usage of IPSEC could raise some issues when SCTP multi-
V4.0 Page 59 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
homing is implemented. In this case an SCTP endpoint could handle more than one IP (for
example in a high availability scenario) and consequently more than one IPSEC tunnel
should be set up.
V4.0 Page 60 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
In order to carry out a successful attack, the attacker must know in advance the IP address
and the port used by the victim. The IP address can be retrieved by scanning, but the port, if
not already known, must be guessed by brute forcing 216 possible values. This guessing is
V4.0 Page 61 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
not as difficult as it may appear because ports are often used sequentially. In addition, multi-
homing has to be configured.
To limit the risk of this attack, it is recommended to implement the expanded version of
HEARTBEATS mechanism and to ensure the unconfirmed state is supported as specified by
[34]. In addition clients shall select their port numbers randomly. This type of attack is
referred to as “ADDR. CAMP” in Table 4.
This attack however should not be feasible in a SIGTRAN network used for telephony
signalling services because network nodes should be configured with static IP addresses.
Consequently, in a SIGTRAN network it can be assumed that the transport addresses
belong to the association endpoints until the end of the association lifetime and that the
endpoints which have to communicate know each other’s address sets in advance. The
countermeasures to limit this threat are to add a new pair of two 32-bit nonce used to
represent the real tags with the association and use of the authentication mechanism for
chunks specified in RFC4895 [40]. This type of attack is referred to as “ASS.HIJAC.v1” in
Table 4.
V4.0 Page 62 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
V4.0 Page 63 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
All of these protocols are recommended to be transported on SCTP, which provides certain
transport related security features described above, but SCTP is unable to natively
guarantee authentication of peers, non-repudiation, integrity and confidentiality of the user
data. Consequently, IPSEC or TLS need to be used to ensure these requirements and their
implementations follow the recommendations [33].
These systems (e.g. ASP, VoIP gateways, PBX) can use a public Internet interface (e.g.
management interface, web interfaces, unsecure extension modules and so on) which offers
potential hackers an additional avenue of attack to breach SS7/SIGTRAN networks.
As with any system connected to the public Internet, it should be assumed that at some time,
the SMS system would be the target of a malicious attack. Whether the attack is caused by a
group of hackers seeking simply to disrupt the system or is sponsored by a group of
individuals attempting to spy on and mislead competitors, the SMS system must be
protected from outside attacks. As with any complex system composed of multiple parts,
there are numerous vulnerabilities that should be examined thoroughly in an effort to predict
upcoming attacks and defend against them as they occur.
Apart from these particular systems, other security threats can be identified considering that
a mobile node is basically a device composed of hardware (e.g. chip, processors, memory,
network cards) and software (e.g. operating system, drivers, applications, services,
protocols) and each node can be managed and configured locally and/or remotely. All these
features can expose the node to several potential vulnerabilities which can be exploited to
launch attacks if they have not been correctly implemented.
For example, over the years, several vulnerabilities to remote exploitation have been
identified in the signalling points and these systems could also be violated by means of
traditional hacking techniques like:
• Scanning to fingerprint the systems (e.g. operating system version, installed patches,
available services and so on).
• Password brute forcing to guess system passwords and gain the control of the
system or to violate user data and traffic.
V4.0 Page 64 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
• HTTP hijacking to violate http service (e.g. used for administrative interfaces) like:
XSS, SQL injection, Path traversal and so on.
• Message Fuzzing (e.g. sending out malformed packets) to discover unknown
vulnerabilities to be exploited for gaining the control of the system and access to the
mobile network.
• Eavesdropping.
• Violating/Hijacking remote management protocols (e.g. Telnet, SNMP).
• Man-in-the-middle attacks, a kind of active eavesdropping in which the attacker
makes independent connections with the victims and relays messages between
them.
V4.0 Page 65 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate
Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
This section is not intended to be exhaustive and the goal is to provide useful information to a MNO to understand the main risks to which it
could be exposed and how to reduce them.
The main hypothesises on which the data presented in the tables is based are:
• If the network equipment is reachable from an outside network it can be considered as a possible target for attackers;
• Insider and physical attacks are not considered.
Table 4 shows the classification of some possible attacks towards SS7/SIGTRAN networks identified in sections 5 and 6 according to the
taxonomy described in section 4. This is a high level mapping and does not pretend to be exhaustive.
Protocol
Section
SPA/FL
TRACK
/ Layer
PWDA
MITM
ROA
PHA
FAK
DoS
MIS
RA
DA
EA
SP
IG
IA
PI
V4.0 Page 66 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate
Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
Protocol
Section
SPA/FL
TRACK
/ Layer
PWDA
MITM
ROA
PHA
FAK
DoS
MIS
RA
DA
EA
SP
IG
IA
PI
HLR Lookup SS7 MAP 5.4.3 X X
Subscriber DoS SS7 MAP 5.4.4 X X
SS7 Overload SS7 MAP 5.4.5 X
Illegitimate Charge SS7 MAP 5.4.6 X X
Subscriber Active SS7 MAP 5.4.7
X X
Interception
Subscriber Data Retrieval SS7 MAP 5.4.8 X
SMS Attacks SS7 MAP 5.4.9 X X X X X
Address Camping SIGTRAN 6.3.1 X X
Association Hijacking v.1 SIGTRAN 6.3.2 X X X
Association Hijacking v.2 SIGTRAN 6.3.3 X X X
Bombing/Amplification SIGTRAN 6.3.4
X X
Attack
SCTP Scan SIGTRAN 6.3.6 X
SS7 5.3.1.1
TCAP Scan X X
TCAP 5.3.1.3
SS7 5.3.1.2
TCAP Traffic Injection X
TCAP
The attacks featured in Table 4, once completed successfully, can lead to the following range of impacts on the MNO:
V4.0 Page 67 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate
Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
Protocol
Section
OVASA
/ Layer
DSCB
CDM
TDM
CDD
CSA
TDD
SSA
IMP
DIS
SU
Fake Calling Number SS7 ISUP 5.1.2 X X X X
(Non-SMS) Message Flooding SS7 SCCP 5.2.1 X
Network Equipment impersonation SS7 SCCP 5.2.2 X X X
Cryptographic Material Retrieval SS7 MAP 5.4.1 X X X
Subscriber Location Retrieval SS7 MAP 5.4.2 X X
HLR Lookup SS7 MAP 5.4.3 X
Subscriber DoS SS7 MAP 5.4.4 X
SS7 Overload SS7 MAP 5.4.5 X
Illegitimate Charge SS7 MAP 5.4.6 X X X X
Subscriber Active Interception SS7 MAP 5.4.7 X X
Subscriber Data Retrieval SS7 MAP 5.4.8 X X
SMS Attacks SS7 MAP 5.4.9 X X X
Address Camping SIGTRAN 6.3.1 X X
Association Hijacking v.1 SIGTRAN 6.3.2 X X
Association Hijacking v.2 SIGTRAN 6.3.3 X X
Bombing/Amplification Attack SIGTRAN 6.3.4 X X
SCTP Scan SIGTRAN 6.3.6 X
SS7 TCAP 5.3.1
TCAP Scan X
5.3.3
TCAP Traffic Injection SS7 TCAP 5.3.2 X X X X
V4.0 Page 68 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
• Table 6 identifies some mitigation strategies for the attacks described in sections 5 and
6.
• The following subsections provide guidelines on implementation of a screening policy for
MAP messages, and some references to countermeasures for SMS abuse.
This section does not provide any detailed descriptions of countermeasures for IP attacks.
Bombing /
All external IP SCTP Firewalling, Traffic
Amplification SCTP INIT, INIT-ACK
enabled devices Rate Limiting, Anti spoofing
Attack
Access control modules (i.e.
Fake Calling IGW, VMS, IVR, all IVR with external network
ISUP messages
Number customers access should be password
protected)
SendRoutingInfo,SendRouti
SMS Firewalling, MAP
ngInfoforSMS,
HLR Lookup HLR screening policies (see
SendRoutingInfo for LCS,
section 8.1)
SendIMSI
(Non-SMS) SS7 Firewalling, MAP
Message All SS7 nodes All SCCP messages screening policies (see
Flooding section 8.1)
All external SCTP Firewalling, IDS,
SCTP Scan SIGTRAN SCTP INIT Access Control List based on
enabled devices source IP
SendAuthenticationInfo, SS7 Firewalling, MAP
Cryptographic
HLR/AUC SendIdentification, screening policy (see section
material retrieval SendParameters 8.1)
V4.0 Page 69 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
V4.0 Page 70 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
It is important to implement this rule to avoid undermining the efficacy of the MAP filtering
criteria, listed in the following sections.
For the MAP messages listed in sections 8.2.2 and 8.2.3, plausibility checks may be required to
detect if spoofed addresses are used associated SS7 attacks.
This section does not specifically address SMS related messages abuse – see [3], [4] and [6]
for detailed guidance on that topic.
As reported in section 5, MAP messages can be abused to perform different kinds of attacks. To
identify and block unauthorised MAP messages, the first recommendation is to monitor SS7
network messages being received from international nodes not belonging to an allowed roaming
partner and not related to the delivery of SMS. This will allow operators to determine whether
suspicious messages are coming in, and from which other operators – after which follow-up
investigation and action can be taken.
V4.0 Page 71 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
An alternative approach is to ensure that the routing tables for inbound messages from a
partner’s network limit the access for that network. In today’s networks, interconnect routing is
left open to any and all SS7 messages. By limiting the access being granted to the partner, you
eliminate the need to track black lists, which in themselves have become extremely difficult to
manage.
To reduce the risks of the attacks described in 5.4 and Table 6, a mobile operator should try to
filter out incoming sensitive SS7-MAP messages from nodes that have no legitimate reason to
be sending them, leaving only messages from reasonably trusted nodes. Sections 8.2.1 to 8.2.3
describe three categories [62] of SS7-MAP messages and associated screening
recommendations.
These screening recommendations should limit the attacks listed in section 5.4 and Table 6 (i.e.
Cryptographic Material Retrieval, Subscriber Location Retrieval, HLR Lookup, Subscriber Active
Interception and Subscriber Data Retrieval), which requires that an attacker uses his actual
CallingPartyAddress to retrieve network or subscriber information, i.e. not a spoofed
CallingPartyAddress like in other type of attacks where is not needed to receive a response to
the invoked MAP message.
8.2.1 Category 1
The following messages should normally only be received from within the same network, and
not on interconnect links from other networks, unless there is an explicit agreement to do so:
• SendRoutingInfo
• SendRoutingInfo for GPRS
• SendRoutingInfo for LCS
• SendIMSI
• AnyTimeInterrogation (see NOTE 1)
• AnyTimeSubscriberInterrogation
• AnyTimeModification
• SendIdentification
• CheckIMEI
• SendParameters (see NOTE 2)
• FailureReport
• ResumeCallHandling
• NoteSubscriberDataModified
• Unknown PDU (i.e. Any GSM-MAP packet with an Unallocated/Unknown Operation
Code)
V4.0 Page 72 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
NOTE 1 AnyTimeInterrogation should be blocked when coming from the outside of the
home network and when the SCCP Calling Party Address does not belong tp
any 3rd party LBS partners.
This list includes examples of the MAP messages belonging to this category; a complete list of
messages can be found in [1].
The screening policy recommendation for this category of MAP messages is to block them
when coming from the outside of the home network. However, it is recommended that operators
first monitor (as described in [1]) before blocking and check if they have any legitimate reasons
and/or commercial agreements which require them to receive such a MAP messages from
certain operators.
8.2.2 Category 2
The following messages should normally only be received in relation to an inbound roaming
(visiting) subscriber from that subscriber’s own home network:
• InsertSubscriberData
• DeleteSubscriberData
• Reset
• ForwardCheckSSIndication
• ProvideSubscriberInfo
• ProvideSubscriberLocation
• NoteSubscriberDataModified
• ActivateTraceMode
• ProvideRoamingNumber
• SetReportingState
• RemoteUserFree
• ISTCommand
• AlertServiceCentre
• CancelLocation
• BeginSubscriberActivity
• SendParameters (see NOTE)
• DeactivateTraceMode
• UnstructuredSSNotify
V4.0 Page 73 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
NOTE SendParameters for the purposes of signalling to a HLR to update location, and
exchanging authentication information between a visited VLR/SGSN and HLR
falls under this second category of filtering. In particular this message should be
permitted when coming from the outside of the home network, directed towards
HLRs and the SCCP Calling Party Address belongs to a whitelisted set of MAP
v1 operators that are known to use it (This information should be added to IR.21
Mobile Application Part Section).
This list includes examples of the MAP messages belonging to this category; a complete list of
messages can be found in [1].
The screening policy recommendation for this category of MAP messages is to block them if
either of the following criteria are met:
• The MAP messages are coming from the outside of the home network and the SCCP
Calling Party Address does not belong to a roaming partner or a specific whitelist of GT
(e.g. see note for SendParameter)
• The SCCP CallingPartyAddress and the IMSI within the MAP messages do not belong to
the same operator (i.e. there is a mismatch in terms of MCC and MNC)
Also for messages belonging to this category, it is recommended that operators, before
blocking, first monitor as described in [1].
8.2.3 Category 3
The following messages should normally only be received in relation to an outbound roaming
subscriber from the visited network that the subscriber is currently roaming in:
• RegisterSS
• UpdateLocation
• UpdateGPRSLocation
• ForwardSM
• ProcessUnstructuredSS
• PurgeMS
• RegisterSS
• EraseSS
• ActivateSS
• DeactivateSS
• InterrogateSS
• RestoreData
• SendAuthenticationInfo
• NoteMMEvent
• SendParameters
This list includes examples of the MAP messages belonging to this category; a complete list of
messages can be found in [1].
V4.0 Page 74 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
The screening policy recommendation for this category of MAP messages is to block them if
either of the following criteria are met:
• The MAP messages are coming from the outside of the home network and the SCCP
Calling Party address does not belong to a roaming partner
• The SCCP Calling Party Address and the GTs when present in the MAP layer of the
message do not belong to the same network.
• The SCCP CallingPartyAddress does not match the network where the subscriber is
currently located.
This last filtering rules could be more complex to implement because the mobile operator may
need to determine the current location of the subscriber and to verify it against the Calling Party
Address of the received message.
Also for messages belonging to this category, it is recommended that operators, before
blocking, first monitor as described in [1].
Gateway screening capabilities and GT routing at the STP will allow an operator to selectively
choose which networks are allowed access to its internal network, as well as what level of
access they are allowed (i.e. ISUP only, ISUP and SCCP, SCCP only, CgPA/CdPA, SSN, etc.).
Additional MAP screening at the STP provides additional control to the mobile operator over
what specific MAP operation codes are permitted to enter the network.
Not all network equipment will necessarily support all of these filtering operations today,
therefore a dedicated appliance with the necessary filtering capabilities could be required.
Consequently mobile operators may need to talk to SS7 firewall vendors about products
(current or future) that can provide these filtering capabilities.
Mobile operators are also strongly advised and encouraged to consult with their STP vendors
regarding their ability to support and provide the required filtering capabilities.
In all cases it is strongly recommended to try out filtering rules in monitoring mode first, before
actually blocking, as described in [1]; this will help to identify any other legitimate use cases that
may need to be whitelisted.
V4.0 Page 75 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
9 Conclusions
This document has sought to assess security threats related to SS7/SIGTRAN networks, by
identifying vulnerabilities and corresponding countermeasures and mitigation techniques. In
addition,a taxonomy of attacks and their impacts is also provided.
A review of the current open SS7 source projects is also provided. The maturity and quality of
some of them, in terms of number of protocol stack levels and features implemented, is quite
high even if their usage is not so widespread. Consequently, the risk of their usage to
compromise a mobile network can be considered low at present, but should not be dismissed.
A “Network Incident Report” template based on the taxonomy is also provided in Annex A for
mobile operators to report network signalling security incidents in a consistent manner within
GSMA.
V4.0 Page 76 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
Incident Report
V4.0 Page 77 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
• To describe additional attacks and classify other messages not yet included in clause 8.2
• To consider if additional countermeasures are necessary to cover other scenarios related
to the messages already classified in this document.
The structure described in the following section B.1 will be adopted as a reference template to
describe each attack scenario.
The MAP Check_IMEI message is abused to conduct this attack. In legitimate use, the
Check_IMEI message is sent by an MSC towards an EIR before allowing the mobile device to
register on the network. The Check_IMEI message normally contains only an IMEI. However,
an extension to the message exists which also supports inclusion of the IMSI in addition to the
IMEI within the message parameters, for legitimate use to unblacklist a device if it is recovered
by the owner.
The IMEI parameter is used by the EIR to search in the database the presence of that IMEI in
the three different lists: blacklist, greylist or whitelist. The MAP_CHECK_IMEI_ACK message is
returned by EIR to MSC, containing the equipment status and specifying in which list the IMEI is
found. Depending on this, the MSC takes an appropriate decision about whether to allow
registration of the mobile device or not.
V4.0 Page 78 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
The extended version of this message (a proprietary implementation that is publicly known but
not specified in standard documents) can be misused by an attacker to remove stolen devices
from the EIR blacklist and to increase their black market value.
• know the IMSI that was associated with the device (IMEI) while blocking or last used by
the victim (the original SIM is not necessary)
• know the Global Title (GT) of the EIR
• know the MSC GT (depending on operator configuration it might be not necessary)
• enable feature and IMSI check options in the message
• enable Extended IMEI Check (for operators using the feature to easily whitelist phones,
that check might be already enabled)
• have access to the SS7 network
Initially, the IMEI is checked to know the list it belongs to. If it is found on the black list, an
additional check of the IMSI is made. If there is a match between IMSI provisioned with IMEI in
the EIR database (this is the IMSI-IMEI pair in the EIR before the victim blocks his stolen
device) with the IMSI found in MAP_CHECK_IMEI message, then this overrides the blacklist
condition. The mobile device will no longer be blacklisted. This kind of override is used in normal
network operation to whitelist phones that were accidentally blacklisted or were found again
having been originally lost and blacklisted.
Add ”Check_IMEI” to the filter list of network internal messages to prevent this kind of attack.
Another countermeasure is to not allow dynamic changes (by using MAP messages) of the EIR
blacklist.
V4.0 Page 79 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
• Know the GT of the HLR of the home operator of the targeted user’s IMSI
• Know the GT of the VLR where the targeted user’s IMSI is currently attached
• Know the targeted user’s IMSI
• Have access to the SS7 network
The attacker sends the ISD message towards the VLR where the targeted user’s IMSI is
currently registered. The parameters in the message are configured to enable barred
services.The VLR generally does not wait for the TCAP end transaction and enables the
requested services.
In this case, another countermeasure is needed. A possible measure is for a VLR to execute the
changes requested by a command (e.g. Insert_Subscriber_Data) only when the TCAP
transaction has been completed, NOT when receiving the TCAP begin. If for performance
reasons it is necessary to perform the change before waiting for the TCAP end, the VLR should
support the capability to reverse the change in case the TCAP transaction does not end
correctly. However, this measure would be ineffective if the attacker is able to also complete the
TCAP transaction with a spoofed TC-end.
V4.0 Page 80 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
• Know a valid IMSI (it can be done via “5.3.3 Retrieval of Mobile Subscriber Identity (e.g.
IMSI)”) or a random IMSI
• Own a GT to complete the LocationUpdate transaction and receive further MAP
messages.
• Own number ranges.
• Have access to the SS7 network
• Filter incoming messages for IMSI retrieval (although the attack can be on random IMSI).
• Filter incoming LocationUpdate messages to only allow messages from valid partners.
V4.0 Page 81 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
• Know the targeted IMSI (it can be done via the methods described in section 5.3.3 or at
random)
• Know the GT of the VLR serving the targeted IMSI (via the methods described in section
5.3.2)
• Know the GT of the HLR of the targeted IMSI
• Own a node that can act as gsmSCF
• Own number ranges
• Have access to the SS7 network
Also, CAMEL phases need to be configured at the MSC/VLR level for the IMSI range of the
targeted IMSI.
Upon receipt of a mobile originated call, the serving MSC will invoke the gsmSSF which will
interrogate the fake gsmSCF. The fake gsmSCF can then redirect the call at its convenience
(e.g. to a premium rate number) and forward the call to its initial destination.
• Ensure the VLR updates the IMSI’s profile with new information upon receipt of the TC-
End, not at the TC-Begin.
• Ensure the gsmSCF GT contained in the InsertSubscriberData belongs to the same
HPMN as the GT HLR. However, some CAMEL services are provided with gsmSCF GT
different than the HPMN’s.
V4.0 Page 82 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
• Know the valid IMSI (as per section 5.3.3 of the targeted subscriber)
• Own an MSISDN to receive the forwarded call
• Own a GT to spoof as an MSC/VLR to originate the MAP message(s) and to reconnect
the call to the targeted subscriber
• Have access to the SS7 network
When the targeted subscriber receives any incoming call, the call will subsequently be
forwarded to the attacker’s forwarded-to MSISDN. The attacker may reconnect the call to the
targeted subscriber using the incoming call’s caller ID so as not to raise any suspicion. The
incoming call will be intercepted via this man-in-the-middle attack.
V4.0 Page 83 of 84
GSM Association Confidential - Full, Rapporteur, Associate and Affiliate Members
Official Document FS.07 - SS7 and SIGTRAN Network Security
It is our intention to provide a quality product for your use. If you find any errors or omissions,
please contact us with your comments. You may notify us at [email protected]
V4.0 Page 84 of 84