Page 22 - Technical report on SS7 vulnerabilities and mitigation measures for digital financial services transactions
P. 22

bases will allow velocity checks to be undertaken by   12.7 Regulatory activities
             the bank/PSP that will check and flag whether SIM   Regulators with remit over DFS may establish proce-
             swap request for a number linked to the true account   dures and principles for detecting, preventing, report-
             owner are suspiciously close in time to a request at   ing, and mitigating SS7 and related attacks. They may
             the bank/PSP for adding a new (possibly fraudulent)   also establish procedures that licensees may need
             payment beneficiary.                             implement to prevent SIM swaps.
                                                                Regulatory coordination between these regulators is
           12.5 Detecting, preventing and mitigating SIM card   key, so as to assign specific and joint roles and responsi-
           recycle                                            bilities. This should take the form of a Memorandum Of
           Once there is inactivity in a DFS account, start monitor-  Understanding (MOU) between the parties. An extract
           ing the IMSI associated with the account phone number,   from a model MOU between a telecommunications reg-
           once the SIM is deactivated the mobile operator will not   ulator and a central bank that contains language outlin-
           reply correctly to these queries (one query a day is suf-  ing these responsibilities is shown in Annex B.
           ficient).                                            The MOU includes inter alia the need to assign indi-
           When the SIM is recycled, the mobile operator will   vidual and shared technical responsibilities relating
           report a new IMSI for the account phone number, the   to infrastructure and related security issues that may
           DFS provider should block the account until the identity   impact the DFS ecosystem to each of these regulators,
           if the new person holding the SIM card is verified as the   including reporting lines and actions relating to intru-
           account holder.                                    sions. The telecommunications regulator in particular
                                                              should also undertake continuous testing in conjunction
           12.6 Embedding data within the user’s phone for    with its licensees to detect IMSI catchers. A joint work-
           authentication                                     ing committee between these two regulators that meets
           DFS providers can work with device manufacturers and   monthly to discuss DFS-related issues and any security
           MNOs to embed a hard to spoof identifier within the   threats or incidents is also envisaged in the MOU.
           device software, this identifier (which should be crypto-   An IMSI validation gateway can be used to validate
           graphic to prevent spoofing) needs to be integrated in   to DFSPs and banks that the real, registered customer is
           all communications between the DFS provider and the   using the system via USSD. 
           user’s phone to authenticate the user and phone.

           FIGURE 12:  An IMSI validation gateway














                                    SIM and PhonePhoneMand PPhone
                                      validation
                                                           VLR                     USSD Gateway
                                                           MSC                        SMSC
                                                                                   WAP Gateway
                                             BSS                                 Customer Validation
                    Local Cell Tower
                                                           HLR                       Gateway
                                                           AuC
                                                                      IMEI
                                                                                   Encrypted
                                                                                     channel
                                   Subscriber validated to
                                     be on-net and valid
                                                                                      Mobile Banking

                                                                                      Customer validated




                                                                                             Telecom Operator

           20 • Technical report on SS7 vulnerabilities and mitigation measures for digital financial services transactions
   17   18   19   20   21   22   23   24   25   26   27