Page 46 - Digital Financial Services security assurance framework
P. 46

1�   Customer - mobile device                      f.  If the application allows for the negotiation of
                                                                 weak cipher suites, the application can be subject
            a.  Exposure of sensitive customer information due   to downgrade attacks to older versions that con-
               to the customer sharing the device with others, or   tain potentially weak ciphers. If session keys are
               having it lost, stolen, or seized or by an adversary   not periodically renegotiated, the accumulation of
               shoulder surfing user credentials.                enciphered material can make the key vulnerable
            b.  Unauthorized access to the device by an attack-  to attack.
               er guessing the PIN or password on the device or   g. Unauthorized access to lost or stolen mobile
               otherwise defeating the authentication mecha-     device.
               nisms - if they are set up - on the mobile device.  h.  Mobile application tampering.
            c.  Tampering with the device in order to compromise
               the security of the underlying platform, for exam-  3�  Customer - DFS agent
               ple, installing malware on the underlying storage
               or extracting secrets from the device’s memory   a.  Customers can be vulnerable to SIM swap attacks,
               through its manipulation.                         where the attacker represents themselves to the
            d. Altering the call settings by an unauthorized mali-  agent as the customer in order to gain a new SIM
               cious attacker to set call and SMS forwarding, this   card that provides access to the DFS account.
               enables attacker get access to DFS information   b.  Similar vulnerabilities can be exposed against
               sent through messages, like OTP.                  companion cards linked to DFS accounts if insuffi-
                                                                 cient authentication of the customer’s credentials
            2�  Mobile device - mobile application               is performed by the agent or if the agent is collud-
                                                                 ing with the adversary.
            a.  Code vulnerabilities within the mobile application
               can be leveraged by attackers who gain access to   4�  Mobile device - Base station
               the mobile device, e.g., through over-applications.
               This can result in a compromise of customer data,   a.  Legacy GSM  networks  where  DFS  applications
               loss of privacy, and loss of integrity.           are primarily using SMS or USSD or IVR rely on
            b.  Compromise of the underlying mobile platform     security provided by the network is based on GSM
               can introduce viruses, trojans, worms, ransom-    networks encryption algorithms such as A5/1 and
               ware, and other malware/rootkits that can allow   A5/2. These algorithms have been demonstrated
               for the compromise of customer information,       to be vulnerable. Recent work has demonstrated
               or make the user more susceptible to phishing     that similar approaches can be used to compro-
               attempts  to  gain  credentials  for  the  application,   mise the A5/3 cipher. In some systems, the A5/0
               allowing the attacker to gain unauthorized access   algorithm is specified, which provides null encryp-
               to the customer account.                          tion and hence no protection of data confidenti-
            c.  Insufficient access controls within the application,   ality, leading to the ability for an attacker to exfil-
               e.g., an authentication mechanism required before   trate sensitive information over the air interface.
               sensitive operations occur (e.g., registration, pay-  Regardless  of  the  underlying  transport network
               ment transfer) based on assumptions about trust   security threats STK and https do provide end to
               can lead to application compromise and conse-     end encryption.
               quent exfiltration of customer data or unautho-  b.  Legacy networks  relying  on GSM encryption
               rized money transfer.                             (STK, USSD and IVR) are also subject to “man-
            d. A lack of logging/audit capabilities within the app,   in-the-middle” attacks from rogue base stations
               and the lack of storing such log data in a protected   that are placed by an attacker, maliciously claim-
               part of the device storage, can prevent guarantees   ing to be legitimate provider towers  (i.e., a  fake
               of non-repudiation and leave the user vulnerable   base station, often called an “IMSI-catcher”) and
               to not being able to prove that they were attacked.  decrypting communication before re-sending it
            e.  A lack of or misuse of encryption within the appli-  into the mobile carrier’s network. Such a scheme
               cation such that it is written in an insecure manner   can allow the attacker to gain full access to all
               to application logs, or stored in databases with no   communicated information, including transaction
               or weak encryption can also lead to an adversary   and financial data.
               exposing this information.





           44    Digital Financial Services Security Assurance Framework
   41   42   43   44   45   46   47   48   49   50   51