Page 11 - Technical report on SS7 vulnerabilities and mitigation measures for digital financial services transactions
P. 11

Technical report on SS7 vulnerabilities


                                                 and mitigation measures for

                              digital financial services transactions











           1 INTRODUCTION

           The world of Digital Financial Services (DFS) is based   document helps DFS providers understand the telecom
           mostly on telecom, since in most countries where DFS is   vulnerability situation and create mitigation strategies
           popular, most of the end-users do not have reliable and   to safeguard their clients.
           accessible means to connect to the internet, DFS has
           adopted telecom as its main bearer. Due to the dom-
           inance of feature phones among users in developing   2  IMPACT OF TELECOM VULNERABILITIES
           economies, which comprise the majority of DFS end-   ON DFS
           users, the communication channels in which the end-
           user communicates with the DFS provider are mostly   Telecom vulnerabilities enable criminals to perform var-
           Unstructured Supplementary Service Data (USSD),    ious attacks that result in fraud to steal digital money;
           Short Messaging Service (SMS) and Sim Tool Kit (STK).   many of these attacks involve the attacker masquerad-
           Moreover, today the signalling network is not isolated,   ing as the DFS provider to fraud the end-user or the
           and this allows an intruder to exploit its flaws and inter-  attacker masquerading as the end-user to fraud the
           cept calls and SMSs, bypass billing, steal money from   DFS provider. In all these cases, the attacker uses tele-
           mobile accounts, or affect mobile network communica-  com vulnerabilities to pass authentication and perform
           tions even in developed countries.                 actions on compromised accounts. For example:
             USSD and SMS as means of communication have
           long been known as susceptible to attack and have   2.1 Over the counter cash fraud
           many published vulnerabilities. Exploiting these vul-  In  this  example,  a fraudster  walks  up to a  DFS  agent
           nerabilities enables attackers to commit fraud and   (for example a seven-eleven branch) and requests cash
           steal funds from unsuspecting victims, who in in most   withdrawal from his account. The fraudster provides the
           cases are unaware their account is being compromised   victim’s account number to the agent, when the agent
           or hacked.                                         initiates the transaction, an SMS verification code is sent
             This document surveys telecom vulnerabilities and   to the victim, however, this verification SMS is inter-
           their impact on digital financial services, both on the   cepted by the fraudster, and used to complete the fraud
           end user’s side and the service provider’s side. This   and steal the money.




                                            Technical report on SS7 vulnerabilities and mitigation measures for digital financial services transactions • 9
   6   7   8   9   10   11   12   13   14   15   16