Page 23 - Technical report on SS7 vulnerabilities and mitigation measures for digital financial services transactions
P. 23

13 CONCLUSIONS AND RECOMMENDATIONS                   aware  that  there  are  available  solutions  to  mitigate
                                                                these risks.
           It can be concluded that:
                                                              b.  Regulation and legal framework to include mea-
           a.  The DFS providers, telecom operators and the tele-  sures  for signalling security and reporting of such
             com regulators are mostly unaware of the mitigation   incidents—work towards financial and telecom reg-
             strategies that they can employ to detect and pre-  ulators passing regulation to make it mandatory for
             vent SS7 attacks.                                  DFS providers and telcos to implement countermea-
                                                                sures and to provide reports on any security-related
           b.  The  implementation  of mitigation  measures  is low   breaches and incidents.
             mainly due lack of adequate regulation and prohibi-
             tive cost (on the telecom side).                 c.  Telecom regulators to establish baseline security
                                                                measures for each category (3G/4G/5G)—Telecom
           c.  Attacks exploiting SS7 vulnerabilities to steal funds   regulators are encouraged to establish baseline secu-
             are easy to perform and not the sole property of gov-  rity measures for each category (3G/4G/5G) which
             ernment agencies.
                                                                should be implemented by telecom operators to
           d. Mitigation countermeasures both for DFS providers   ensure  a more secure interconnection environment.
             and for mobile operators are readily available com-  d.  Regulatory coordination—A bilateral Memorandum
             mercial  products;  given  the  proper  regulation,  the   of Understanding (MOU) related DFS should be in
             DFS  providers  and  telecoms  can  implement  such   place between the telecommunications regulator and
             mitigation countermeasures.
                                                                the central bank. The MOU should include modalities
           e.  Because DFS contracts today place all the respon-  around the creation of a Joint Working Committee on
             sibility for fraud on the end-user, and the DFS pro-  DFS security and risk-related matters. A sample MOU
             viders are not required to indemnify the end-users in   is included at Annex B as a template that can be con-
             case of fraud, there is no incentive for DFS providers   sidered.
             to invest any resources into solving this problem.
                                                              e.  Industry-regulator  coordination—Forums should
           f.  The same apply for telecom operators, since the   be created where all commercial actors in the DFS
             financial damage due to financial fraud stops at the   ecosystem meet or interact regularly in a neutral
             DFS provider, the telecom is not liable for any dam-  environment with DFS-focused regulators where
             age, thus suffers no losses. Hence has no incentive to   security-related issues can be freely discussed with-
             invest resources to solve this problem.            out providing any sensitive or competitive informa-
                                                                tion.
           g. Telecommunication authorities and central banks
             generally do not meet or interact regularly enough,   f.  Intra-Industry coordination—Forums should be
             or at all, to have contemporaneous insights into   created where all commercial  actors in the  DFS
             DFS-related security threats and intrusions.       ecosystem meet or interact regularly in a neutral
                                                                environment where security-related issues can be
           h.  DFS ecosystem participants and regulators do not   freely discussed without providing any sensitive or
             meet or interact regularly enough, or at all, in a neu-  competitive  information  or undertaking potentially
             tral, collegial environment to be able to share and   collusive actions.
             have  contemporaneous insights into DFS-related
             security threats and intrusions.                 g.  Incentivize the industry—create incentive programs
                                                                with industry to promote the development of
           In order to address the above-mentioned issues, the   countermeasures in the telco-DFS anti-fraud field.
           Working Group recommends the following measures:
                                                              h.  Incentivize the operators and providers—create reg-
           a.  Education for telecom and financial services regula-  ulation that passes the financial damage from DFS
             tors on SS7 vulnerabilities and impact to DFS—tele-  fraud to the DFS providers and to the telcos, creating
             com and financial regulators around the world needs   a financial incentive for action on their part.
             to be aware of these risks and most importantly be


















                                           Technical report on SS7 vulnerabilities and mitigation measures for digital financial services transactions • 21
   18   19   20   21   22   23   24   25   26   27   28