Page 18 - Technical report on SS7 vulnerabilities and mitigation measures for digital financial services transactions
P. 18

Since there is no identification in the USSD message,   The SIM recycle scenario is as follows:
           and the user is used to having these messages from the   •  Person A is issued a prepaid SIM card and opens a
           network, trust is achieved, and the user divulges their   DFS account using the associated phone number.
           account number and PIN. From there on, the attacker
           logs into the account and transfers the funds out.  •  After a few months of usage, Person A stops top-
                                                                ping-up the prepaid SIM card, meanwhile, Person A
           9.3 Denial of service attacks                        still has a positive balance on this DFS account asso-
           Using SS7 an attacker can cause Denial of Service (DoS)   ciated with the phone number.
           for selected subscribers or cause a network wide out-  •  After a dormancy period usually (1-6 months) of no
           age. There are various ways to create a DoS attack, for   usage and topping-up the SIM, the network operator
           example: sending an Update Location message with an   cancels the SIM and will no longer be active, effec-
           out-of-network serving address will block all incoming   tively disconnecting Person A from the DFS account
           calls and SMS from reaching the subscriber; deleting a   (which may still have funds).
           subscriber  record  from  the  serving  VLR   will  cause  a
                                               8
           DoS for a given subscriber until the record is re-inserted   •  Person B is issued a new prepaid SIM card by the net-
           to the VLR. Performing each attack in scale (automat-  work operator which has Person A’s phone number
           ically for a range of IMSIs) can cause a network wide   (that’s the recycle action)
           outage. However, in most cases, since these SS7 DoS   •  Person B can now access Person A’s DFS account
           attacks are not affecting the radio network, performing   and use whichever funds remained in the A’s account.
           an outgoing transaction such as placing a call or send-
           ing an SMS will reverse the effects of the DoS almost
           immediately.
                                                              10  MITIGATION STRATEGIES FOR MOBILE
                                                                 OPERATORS
           9.4 SIM card swap
           Another way to takeover accounts is by performing a   The SS7 attack surface is the domain of the mobile
           “SIM swap”.  An example of this attack is the case that   operator, global telecom organizations such as ITU and
           the attacker social engineers the mobile carrier to issue   GSMA have noticed the problem and issued guidelines
           them a SIM card belonging to the victim, by imper-  for mobile operators to mitigate these attacks, these
           sonating the victim at a point of service, and claiming   guidelines are covered in several documents. The GSMA
           that they have lost the original SIM card. If successful,   RIFS sub-group authored a range of SS7 and Diameter
           they have obtained a cloned SIM. Once in possession   signalling security related documents in response to the
           of the cloned SIM, the attacker accesses the DFS pro-  attacks described above, which tackle different aspects
           vider’s USSD menu and resets the PIN of the account.   of the signalling security problem. Those documents are
           The attacker uses the cloned SIM to receive the OTP   GSMA internal and accessible to members only, there-
           SMS and confirms the new PIN. From there the attacker   fore, no exact reference is given and companies that
           has essentially taken over, can log in to the account and   have access can find those documents in the GSMA
           transfers the funds out.
                                                              internal  tool  easily  with  the  given  information  below.
           For Example: Airtel Money account wiped clean by the   We will provide here a snapshot on what industrial stan-
           same tricksters.  They called him on the pretext that   dards exist and describe on high-level what they offer in
                         9
           they wanted to assist him with sim card registration and   form of practical mitigation.
           upgrade to fourth generation (4G) technology. In the   GSMA members can access these documents here:
           course of the conversation, they asked him to dial *102#,   https://www.gsma.com/newsroom/gsmadocuments/
           the sim swap code. The next thing he realized he could   technical-documents/
           not receive or make calls and his Airtel Money account
           was drained.                                       10.1 FS.11: SS7 interconnect security monitoring
                                                              guidelines
           9.5 SIM card recycle                               This document describes how to monitor SS7 traffic for
           SIM card recycle is not an SS7 attack, but rather a lack   potential attacks. The first step in improving signalling
           of due care and due diligence by the DFS provider that   related security is to evaluate, what state the network
           gives an unauthorized person access to funds belong-  is in. The main question is, is it under attack, what kind
           ing to other people.                               of attacks. In this document, mobile operators can find
                                                              strategies on how to effectively monitor traffic, how
                                                              long, how to classify incoming MAP messages that are
                                                              arriving on the interconnection interface. It lists mitiga-









           16 • Technical report on SS7 vulnerabilities and mitigation measures for digital financial services transactions
   13   14   15   16   17   18   19   20   21   22   23