User location tracking attacks for LTE networks using
the Interworking Functionality
Silke Holtmanns2 Siddharth Rao1 Ian Oliver2
1Aalto University, Finland 2Bell Labs - Nokia Networks, Finland
IFIP Networking 2016
17th-19th May 2016
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 1 / 37
Overview
1 SS7 based attacks
SS7 background
SS7 attacks recap
2 LTE/ Diameter based attacks
Motivation
Interworking Functions (IWF)
LTE IMSI disclosure attack
Location disclosure
3 Countermeasures
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 2 / 37
Part 1: SS7 attacks
SS7 background
and
Location tracking attacks
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 3 / 37
Signalling System no. 7 (SS7)
A 4 decade old protocol mainly used in the era of 2G/GSM and
before.
However, 2G is still the most widely used mobile generation.
Built for trusted partner network and use/access to outsiders were
denied.
However now, almost anyone can use the telco backbone (having
money, hacking skills or strong political power).
Protocol foundation to enable roaming.
Short Message and Supplementary services.
Toll free numbers and tele-voting.
Enhanced Message Service (EMS) and Local Number Portability
(LNP).
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 4 / 37
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 5 / 37
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 6 / 37
SS7 Location based attacks
Locating Mobile Phones: First revealed in .2008 by Tobias Engel.
An attacker can locate the victim by just having phone number and
SS7 access.
Exploiting the loopholes of an outdated system i.e Signalling System
protocol.
Lack of cryptographic protection.
Since then, different types of SS7 attacks have been demonstrated by
several security researchers.
Locate-Track-Manipulate: In 2014, Engel presented more concrete
attack which can continuously track besides locating the victim more
accurately than the previous attack.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 7 / 37
Cellular identifiers
MSISDN - Mobile Station International Subscriber Directory
Number, the phone number.
IMSI - International Mobile Subscriber Identity, uniquely identifies a
SIM.
GT - Global Title, uniquely* identify the network elements.
Host name or Global IP address : GT :: Internet : Telecom
IMEI - International Mobile Equipment Identity, uniquely identifies
the cellphone.
Cell ID - uniquely identifies a base station within a location area.
Cell ID + LAC → uniquely identifies a base station within a network.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 8 / 37
Network elements
HLR - Home Location Register, a central database of cellphone
subscribers.
MSC/VLR - Mobile Switching Centre/Visitor Location Register,
keeps track of location and other details of the users in its region.
SMSC - Short Message Service Centre (SMSC, handles SMS service
by storing and forwarding the messages.
gsmSCF - GSM Service control Function, responsible for handling
the subscriber billing.
GMLC - responsible for emergency and commercial location-based
services. Mainly used in the emergency calls (911) location scenarios.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 9 / 37
GSM network architecture
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 10 / 37
Attack using call set up messages
Figure : Location disclosure attack using call set up messages [2]
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 11 / 37
Attack using SMS protocol messages
Figure : Location disclosure attack using SMS protocol messages [2]
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 12 / 37
Accuracy of the tracked location
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 13 / 37
Attack using billing platform related messages (1)
Figure : Location disclosure attack using billing platform related messages [3]
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 14 / 37
Attack using billing platform related messages (2)
Figure : Location disclosure attack using billing platform related messages [3]
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 15 / 37
Attack using emergency service related messages
Figure : Location disclosure attack using emergency service related messages [3]
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 16 / 37
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 17 / 37
Part 2: LTE/Diameter attacks
LTE
and
Diameter attacks
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 18 / 37
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 19 / 37
Motivation
Most MNO upgrade their network gradually to avoid service
interruption and optimize ROI of infrastructure.
Inhomogeneous set-up =⇒ interesting attack vectors.
For interoperability with partners, edge nodes have the ability to
translate between Diameter ⇐⇒ SS7.
Attack translation
We wanted an easy way to port SS7 attacks to Diameter.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 20 / 37
Ideal Diameter Network
Figure : Diameter roaming architecture between two newer networks.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 21 / 37
Inhomogeneous Network
Figure : Different networks with different protocol support.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 22 / 37
Interworking functions
Technical specification TS 29.305 [4] and non-binding report TR
29.805 [5].
Describes how Diameter and SS7-MAP messages should be translated
to each other i.e. Attribute Value Pairs (AVP) mapping.
General idea:
Attacker pretends to be an old type network or node.
It forces IPSec secured LTE Diameter network or nodes into using the
less secured SS7-MAP.
Craft SS7-like attack messages and IWF will take care of the rest.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 23 / 37
Phase 1: Obtaining IMSI (1)
Attacker claims to be an IWF node
Typical multi-domain support scenario for roaming and routing
incoming SMS.
MAP commands have to be translated to Diameter specific commands
by the receiving IWF node.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 24 / 37
Phase 1: Obtaining IMSI(2)
The IWF copies IMSI of the victim from username AVP from SRA to SRI
SM ACK.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 25 / 37
Mapping of parameters from SRI SM to SRR
Attacker’s side
MSISDN of the victim
His own Calling Party Address (cgPA).
The spoofed Service Center Address(SCA).
SM-RP-PRI flag - allows the attacker to get information from the
HSS even if the victim is not being served in that network.
SM-Delivery-Not-Intended flag (optional).
Conversion into SRR
IWF maps the above SS7 MAP parameters into respective AVPs of
Diameter SRR.
Called Party Address (cdPA) AVP is populated before sending to HSS.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 26 / 37
Mapping of parameters from SRA to SRI SM ACK
locationInfoWithLMSI sub-parameter AVP:
networkNode-Number contains MME address.
IMSI of the victim.
IWF also sends MAP Information Service Center message to the
attacker to confirm the completion of the requested information
delivery. But this can be ignored.
Please note:
There exists several other methods of IMSI retrieval as well e.g. 4G IMSI
catchers, WLAN access point and EAP-AKA protocol. But they need the
attacker to be in the same vicinity of the target/victim.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 27 / 37
Phase 2: Location disclosure attack
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 28 / 37
Mapping of ISD to IDR
Attacker’s side
Attacker poses as an IWF across the interconnection and sends ISD
message to the targeted network’s IWF. He uses the previously
retrieved IMSI and serving node (MME) information.
Requested Information parameter includes:
sub-parameters Active Location Retrieval requested and Location
Information in EPS supported.
Allows the attacker to get fine-grained information about the victim
e.g. subscriber state, IMEI, software version.
Conversion into IDR
Target IWF sets the IDR-flag value to 3 → indicates that the location
information is requested.
IDR message is then directed to MME.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 29 / 37
Mapping of IDA to ISD Ack
Depending on the information requested:
EPS Location Information AVP → contains Cell ID.
EPS User State AVP → victim’s state.
Attack using MAP Provide Subscriber Information (PSI) works in
similar fashion.
The IMEI number and Software version retrieved are hardware specific
information of the victim, which can be used for further targeted
attacks.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 30 / 37
LTE Location disclosure attacks summary
SS7 attack vector IWF Attack? Reason
MAP SRI No Very few operators connect
HSS directly to DEA or inter-
connection.
MAP SRI SM Yes Location upto granularity of
MME.
MAP ATI No IWF cannot directly map ATI
commands.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 31 / 37
LTE Location disclosure attacks summary (2)
MAP PSI Yes EPS Location Info i.e. cell
ID, subscriber state, IMEI,
software version and encryp-
tion keys.
Emergency calls (PSL) No IWF cannot directly map PSL
commands.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 32 / 37
Countermeasures
Effective SS7 filter/firewall to verify whether a message is:
Operator network internal or from the interconnection
Communicated within the global title range of the partner.
Sent to/from the MS of an outbound roaming subscriber.
Whitelist the partners and the protocols used by them.
Implement NDS/IP security over the Diameter Edge Agents.
AVP specific filtering.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 33 / 37
Conclusion
Even if LTE offers very good security on air interface, the Diameter is
as less secure as SS7 when it comes to location disclosure attacks.
LTE attacks =⇒ It is possible to port SS7 attacks to Diameter
network using Interworking functions.
IMSI disclosure; location tracking upto MME as well as cellID level;
IMEI and OS software version disclosure.
Countermeasures include adhering to security standards (NDS/IP)
and adopting efficient filtering mechanisms.
Review of Diameter protocol
“Privacy in LTE networks” to appear in The 9th EAI International
Conference on Mobile Multimedia Communications, (IW5GS 2016).
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 34 / 37
References I
S. P. Rao, S. Holtmanns, I. Oliver, and T. Aura. (To appear)
We know where you are! Utilising the telecoms core network for user tracking.1
The 8th International Conference on Cyber Conflict (CyCon 2016).
Tobias Engel (2008)
Locating mobile phones using signalling system 7
25th Chaos communication congress, 2008.
Tobias Engel (2014)
SS7: Locate. track. manipulate
31st Chaos communication congress, 2014.
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 35 / 37
References II
TS 29.305
InterWorking Function (IWF) between MAP based and Diameter based interfaces
3rd Generation Partnership Project (3GPP)
TR 29.805
InterWorking Function (IWF) between MAP based and Diameter based interfaces,
3rd Generation Partnership Project (3GPP)
1
A survey article combining all SS7 location attacks
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 36 / 37
Thank you!
Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 37 / 37
Ad

More Related Content

What's hot (20)

PDF
Lte kpi accessability
1 slide6.8K views
PDF
Lte ue initial attach & detach from networkx
2 slides20.8K views
PPTX
Volte troubleshooting
24 slides2.1K views
PDF
Best practices-lte-call-flow-guide
15 slides122K views
PPTX
VoLTE Charging and Clearing Explained
31 slides8.4K views
PPTX
LTE Optimization-KPIs.pptx
31 slides3.4K views
PPTX
Srvcc overview
13 slides3.2K views
PDF
LTE KPI
21 slides28.5K views
PDF
Advanced: 5G Service Based Architecture (SBA)
61 slides59.4K views
PDF
Cs fallback feature
39 slides1.5K views
PPT
3 g call flow
8 slides24.3K views
PDF
Insights on the Configuration and Performances of SOME/IP Service Discovery
23 slides3.4K views
PPT
Initial LTE call Setup Flow
4 slides31.4K views
PDF
Features and Parameters Slides.pdf
24 slides493 views
PDF
【English version】3GPP 5G Standalone Access Registration Call flow_Rev3.00_202...
110 slides1.8K views
PDF
5 g core overview
22 slides2K views
PDF
Introducing to LAC-CI
37 slides12.6K views
PDF
Calling VoWiFi... The Next Mobile Operator Service is here...
45 slides46.4K views
PDF
clustering protocol in WSN:LEACH
13 slides4.3K views
PDF
02_LTE_KPI architecture.pdf
104 slides854 views
Lte kpi accessability
1 slide6.8K views
Lte ue initial attach & detach from networkx
2 slides20.8K views
Volte troubleshooting
24 slides2.1K views
Best practices-lte-call-flow-guide
15 slides122K views
VoLTE Charging and Clearing Explained
31 slides8.4K views
LTE Optimization-KPIs.pptx
31 slides3.4K views
Srvcc overview
13 slides3.2K views
LTE KPI
21 slides28.5K views
Advanced: 5G Service Based Architecture (SBA)
61 slides59.4K views
Cs fallback feature
39 slides1.5K views
3 g call flow
8 slides24.3K views
Insights on the Configuration and Performances of SOME/IP Service Discovery
23 slides3.4K views
Initial LTE call Setup Flow
4 slides31.4K views
Features and Parameters Slides.pdf
24 slides493 views
【English version】3GPP 5G Standalone Access Registration Call flow_Rev3.00_202...
110 slides1.8K views
5 g core overview
22 slides2K views
Introducing to LAC-CI
37 slides12.6K views
Calling VoWiFi... The Next Mobile Operator Service is here...
45 slides46.4K views
clustering protocol in WSN:LEACH
13 slides4.3K views
02_LTE_KPI architecture.pdf
104 slides854 views

Viewers also liked (20)

PPTX
PDN Overview
25 slides1.4K views
PDF
LTE Key Technologies
39 slides5.8K views
PDF
Lte rrc-connection-setup-messaging
10 slides2.4K views
PDF
3 gpp lte-rlc
40 slides1.2K views
PDF
AIRCOM LTE Webinar 1 - Network Architecture
35 slides14.5K views
PPTX
20121129 lte basic procedures (2)
31 slides2.4K views
PDF
LTE Redirection attacks: Zhang Shan
31 slides49.9K views
PDF
LTE EPC Technology Essentials
157 slides27.8K views
PPTX
TRACK C: PDN (Power Delivery Network)/ Ronen Stilkol
3 slides1.8K views
PDF
LTE Architecture and LTE Attach
25 slides53.4K views
PPTX
EPS presentation
11 slides873 views
PDF
LTE Procedures
21 slides4.2K views
PDF
Quick attach summaryl
35 slides1.2K views
PDF
S1ap lte-attach-eps-bearer-setup
6 slides2.8K views
PDF
Netmanias.2012.09.03 [en] emm_procedure_1._initial_attach_(part_1)
10 slides2K views
PDF
ANSYS RedHawk-CPA: New Paradigm for Faster Chip-Package Convergence
17 slides5K views
DOC
c1 & c2 values
3 slides6.1K views
PDF
Simplified Call Flow Signaling: Registration - The Attach Procedure
18 slides9.7K views
PDF
Anirudh resume 2_19
1 slide945 views
PDF
LTE Air Interface
38 slides9.7K views
PDN Overview
25 slides1.4K views
LTE Key Technologies
39 slides5.8K views
Lte rrc-connection-setup-messaging
10 slides2.4K views
3 gpp lte-rlc
40 slides1.2K views
AIRCOM LTE Webinar 1 - Network Architecture
35 slides14.5K views
20121129 lte basic procedures (2)
31 slides2.4K views
LTE Redirection attacks: Zhang Shan
31 slides49.9K views
LTE EPC Technology Essentials
157 slides27.8K views
TRACK C: PDN (Power Delivery Network)/ Ronen Stilkol
3 slides1.8K views
LTE Architecture and LTE Attach
25 slides53.4K views
EPS presentation
11 slides873 views
LTE Procedures
21 slides4.2K views
Quick attach summaryl
35 slides1.2K views
S1ap lte-attach-eps-bearer-setup
6 slides2.8K views
Netmanias.2012.09.03 [en] emm_procedure_1._initial_attach_(part_1)
10 slides2K views
ANSYS RedHawk-CPA: New Paradigm for Faster Chip-Package Convergence
17 slides5K views
c1 & c2 values
3 slides6.1K views
Simplified Call Flow Signaling: Registration - The Attach Procedure
18 slides9.7K views
Anirudh resume 2_19
1 slide945 views
LTE Air Interface
38 slides9.7K views
Ad

Similar to User location tracking attacks for LTE networks using the Interworking Functionality (IWF) (20)

PDF
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
15 slides245 views
PDF
SS7 Vulnerabilities
15 slides3K views
DOCX
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
31 slides9 views
DOCX
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
49 slides27 views
DOCX
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
31 slides22 views
PDF
Telecom Security in the Era of 5G and IoT
25 slides681 views
PDF
Security Issues in Next Generation IP and Migration Networks
6 slides206 views
PDF
D017131318
6 slides136 views
DOCX
Wireless Security and Mobile DevicesChapter 12Princi.docx
57 slides34 views
PDF
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
11 slides10 views
PDF
Providing end to-end secure
11 slides227 views
PPTX
Telecom incidents investigation: daily work behind the scenes
44 slides179 views
PDF
[CLASS 2014] Palestra Técnica - Delfin Rodillas
36 slides861 views
PDF
Signaling security essentials. Ready, steady, 5G!
50 slides664 views
PDF
sb-securing-4g-5g-infrastructure-and-services-with-fortinet.pdf
10 slides20 views
PDF
Exploring LTE security and protocol exploits with open source software and lo...
50 slides2.1K views
PDF
Ruckus wp wifi-into-core
5 slides77 views
PDF
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
127 slides4K views
PDF
Low-cost wireless mesh communications based on openWRT and voice over interne...
8 slides93 views
PPT
Dmg tem2011-0718-05 madina--cto ns mobility pp
13 slides1K views
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
15 slides245 views
SS7 Vulnerabilities
15 slides3K views
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
31 slides9 views
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
49 slides27 views
AbstractVoice over Internet Protocol (VoIP) is an advanced t.docx
31 slides22 views
Telecom Security in the Era of 5G and IoT
25 slides681 views
Security Issues in Next Generation IP and Migration Networks
6 slides206 views
D017131318
6 slides136 views
Wireless Security and Mobile DevicesChapter 12Princi.docx
57 slides34 views
PROVIDING END-TO-END SECURE COMMUNICATIONSIN GSM NETWORKS
11 slides10 views
Providing end to-end secure
11 slides227 views
Telecom incidents investigation: daily work behind the scenes
44 slides179 views
[CLASS 2014] Palestra Técnica - Delfin Rodillas
36 slides861 views
Signaling security essentials. Ready, steady, 5G!
50 slides664 views
sb-securing-4g-5g-infrastructure-and-services-with-fortinet.pdf
10 slides20 views
Exploring LTE security and protocol exploits with open source software and lo...
50 slides2.1K views
Ruckus wp wifi-into-core
5 slides77 views
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
127 slides4K views
Low-cost wireless mesh communications based on openWRT and voice over interne...
8 slides93 views
Dmg tem2011-0718-05 madina--cto ns mobility pp
13 slides1K views
Ad

Recently uploaded (20)

DOCX
Basics of Cloud Computing - Cloud Ecosystem
39 slides137 views
PDF
4 layer Arch & Reference Arch of IoT.pdf
22 slides73 views
PPTX
TEXTILE technology diploma scope and career opportunities
32 slides72 views
DOCX
search engine optimization ppt fir known well about this
330 slides738 views
PDF
Architecture types and enterprise applications.pdf
21 slides177 views
PDF
Developing a website for English-speaking practice to English as a foreign la...
12 slides162 views
PDF
Five Habits of High-Impact Board Members
31 slides193 views
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
62 slides137 views
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
122 slides160 views
PDF
sbt 2.0: go big (Scala Days 2025 edition)
47 slides209 views
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
9 slides86 views
PDF
Flame analysis and combustion estimation using large language and vision assi...
10 slides97 views
PDF
The influence of sentiment analysis in enhancing early warning system model f...
10 slides113 views
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
82 slides378 views
PPTX
Microsoft Excel 365/2024 Beginner's training
20 slides128 views
PDF
STKI Israel Market Study 2025 version august
476 slides603 views
PDF
A review of recent deep learning applications in wood surface defect identifi...
12 slides162 views
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
12 slides93 views
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
128 slides283 views
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
11 slides214 views
Basics of Cloud Computing - Cloud Ecosystem
39 slides137 views
4 layer Arch & Reference Arch of IoT.pdf
22 slides73 views
TEXTILE technology diploma scope and career opportunities
32 slides72 views
search engine optimization ppt fir known well about this
330 slides738 views
Architecture types and enterprise applications.pdf
21 slides177 views
Developing a website for English-speaking practice to English as a foreign la...
12 slides162 views
Five Habits of High-Impact Board Members
31 slides193 views
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
62 slides137 views
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
122 slides160 views
sbt 2.0: go big (Scala Days 2025 edition)
47 slides209 views
A proposed approach for plagiarism detection in Myanmar Unicode text
9 slides86 views
Flame analysis and combustion estimation using large language and vision assi...
10 slides97 views
The influence of sentiment analysis in enhancing early warning system model f...
10 slides113 views
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
82 slides378 views
Microsoft Excel 365/2024 Beginner's training
20 slides128 views
STKI Israel Market Study 2025 version august
476 slides603 views
A review of recent deep learning applications in wood surface defect identifi...
12 slides162 views
Credit Without Borders: AI and Financial Inclusion in Bangladesh
12 slides93 views
Final SEM Unit 1 for mit wpu at pune .pptx
128 slides283 views
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
11 slides214 views

User location tracking attacks for LTE networks using the Interworking Functionality (IWF)

  • 1. User location tracking attacks for LTE networks using the Interworking Functionality Silke Holtmanns2 Siddharth Rao1 Ian Oliver2 1Aalto University, Finland 2Bell Labs - Nokia Networks, Finland IFIP Networking 2016 17th-19th May 2016 Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 1 / 37
  • 2. Overview 1 SS7 based attacks SS7 background SS7 attacks recap 2 LTE/ Diameter based attacks Motivation Interworking Functions (IWF) LTE IMSI disclosure attack Location disclosure 3 Countermeasures Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 2 / 37
  • 3. Part 1: SS7 attacks SS7 background and Location tracking attacks Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 3 / 37
  • 4. Signalling System no. 7 (SS7) A 4 decade old protocol mainly used in the era of 2G/GSM and before. However, 2G is still the most widely used mobile generation. Built for trusted partner network and use/access to outsiders were denied. However now, almost anyone can use the telco backbone (having money, hacking skills or strong political power). Protocol foundation to enable roaming. Short Message and Supplementary services. Toll free numbers and tele-voting. Enhanced Message Service (EMS) and Local Number Portability (LNP). Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 4 / 37
  • 5. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 5 / 37
  • 6. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 6 / 37
  • 7. SS7 Location based attacks Locating Mobile Phones: First revealed in .2008 by Tobias Engel. An attacker can locate the victim by just having phone number and SS7 access. Exploiting the loopholes of an outdated system i.e Signalling System protocol. Lack of cryptographic protection. Since then, different types of SS7 attacks have been demonstrated by several security researchers. Locate-Track-Manipulate: In 2014, Engel presented more concrete attack which can continuously track besides locating the victim more accurately than the previous attack. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 7 / 37
  • 8. Cellular identifiers MSISDN - Mobile Station International Subscriber Directory Number, the phone number. IMSI - International Mobile Subscriber Identity, uniquely identifies a SIM. GT - Global Title, uniquely* identify the network elements. Host name or Global IP address : GT :: Internet : Telecom IMEI - International Mobile Equipment Identity, uniquely identifies the cellphone. Cell ID - uniquely identifies a base station within a location area. Cell ID + LAC → uniquely identifies a base station within a network. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 8 / 37
  • 9. Network elements HLR - Home Location Register, a central database of cellphone subscribers. MSC/VLR - Mobile Switching Centre/Visitor Location Register, keeps track of location and other details of the users in its region. SMSC - Short Message Service Centre (SMSC, handles SMS service by storing and forwarding the messages. gsmSCF - GSM Service control Function, responsible for handling the subscriber billing. GMLC - responsible for emergency and commercial location-based services. Mainly used in the emergency calls (911) location scenarios. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 9 / 37
  • 10. GSM network architecture Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 10 / 37
  • 11. Attack using call set up messages Figure : Location disclosure attack using call set up messages [2] Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 11 / 37
  • 12. Attack using SMS protocol messages Figure : Location disclosure attack using SMS protocol messages [2] Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 12 / 37
  • 13. Accuracy of the tracked location Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 13 / 37
  • 14. Attack using billing platform related messages (1) Figure : Location disclosure attack using billing platform related messages [3] Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 14 / 37
  • 15. Attack using billing platform related messages (2) Figure : Location disclosure attack using billing platform related messages [3] Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 15 / 37
  • 16. Attack using emergency service related messages Figure : Location disclosure attack using emergency service related messages [3] Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 16 / 37
  • 17. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 17 / 37
  • 18. Part 2: LTE/Diameter attacks LTE and Diameter attacks Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 18 / 37
  • 19. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 19 / 37
  • 20. Motivation Most MNO upgrade their network gradually to avoid service interruption and optimize ROI of infrastructure. Inhomogeneous set-up =⇒ interesting attack vectors. For interoperability with partners, edge nodes have the ability to translate between Diameter ⇐⇒ SS7. Attack translation We wanted an easy way to port SS7 attacks to Diameter. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 20 / 37
  • 21. Ideal Diameter Network Figure : Diameter roaming architecture between two newer networks. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 21 / 37
  • 22. Inhomogeneous Network Figure : Different networks with different protocol support. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 22 / 37
  • 23. Interworking functions Technical specification TS 29.305 [4] and non-binding report TR 29.805 [5]. Describes how Diameter and SS7-MAP messages should be translated to each other i.e. Attribute Value Pairs (AVP) mapping. General idea: Attacker pretends to be an old type network or node. It forces IPSec secured LTE Diameter network or nodes into using the less secured SS7-MAP. Craft SS7-like attack messages and IWF will take care of the rest. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 23 / 37
  • 24. Phase 1: Obtaining IMSI (1) Attacker claims to be an IWF node Typical multi-domain support scenario for roaming and routing incoming SMS. MAP commands have to be translated to Diameter specific commands by the receiving IWF node. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 24 / 37
  • 25. Phase 1: Obtaining IMSI(2) The IWF copies IMSI of the victim from username AVP from SRA to SRI SM ACK. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 25 / 37
  • 26. Mapping of parameters from SRI SM to SRR Attacker’s side MSISDN of the victim His own Calling Party Address (cgPA). The spoofed Service Center Address(SCA). SM-RP-PRI flag - allows the attacker to get information from the HSS even if the victim is not being served in that network. SM-Delivery-Not-Intended flag (optional). Conversion into SRR IWF maps the above SS7 MAP parameters into respective AVPs of Diameter SRR. Called Party Address (cdPA) AVP is populated before sending to HSS. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 26 / 37
  • 27. Mapping of parameters from SRA to SRI SM ACK locationInfoWithLMSI sub-parameter AVP: networkNode-Number contains MME address. IMSI of the victim. IWF also sends MAP Information Service Center message to the attacker to confirm the completion of the requested information delivery. But this can be ignored. Please note: There exists several other methods of IMSI retrieval as well e.g. 4G IMSI catchers, WLAN access point and EAP-AKA protocol. But they need the attacker to be in the same vicinity of the target/victim. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 27 / 37
  • 28. Phase 2: Location disclosure attack Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 28 / 37
  • 29. Mapping of ISD to IDR Attacker’s side Attacker poses as an IWF across the interconnection and sends ISD message to the targeted network’s IWF. He uses the previously retrieved IMSI and serving node (MME) information. Requested Information parameter includes: sub-parameters Active Location Retrieval requested and Location Information in EPS supported. Allows the attacker to get fine-grained information about the victim e.g. subscriber state, IMEI, software version. Conversion into IDR Target IWF sets the IDR-flag value to 3 → indicates that the location information is requested. IDR message is then directed to MME. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 29 / 37
  • 30. Mapping of IDA to ISD Ack Depending on the information requested: EPS Location Information AVP → contains Cell ID. EPS User State AVP → victim’s state. Attack using MAP Provide Subscriber Information (PSI) works in similar fashion. The IMEI number and Software version retrieved are hardware specific information of the victim, which can be used for further targeted attacks. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 30 / 37
  • 31. LTE Location disclosure attacks summary SS7 attack vector IWF Attack? Reason MAP SRI No Very few operators connect HSS directly to DEA or inter- connection. MAP SRI SM Yes Location upto granularity of MME. MAP ATI No IWF cannot directly map ATI commands. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 31 / 37
  • 32. LTE Location disclosure attacks summary (2) MAP PSI Yes EPS Location Info i.e. cell ID, subscriber state, IMEI, software version and encryp- tion keys. Emergency calls (PSL) No IWF cannot directly map PSL commands. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 32 / 37
  • 33. Countermeasures Effective SS7 filter/firewall to verify whether a message is: Operator network internal or from the interconnection Communicated within the global title range of the partner. Sent to/from the MS of an outbound roaming subscriber. Whitelist the partners and the protocols used by them. Implement NDS/IP security over the Diameter Edge Agents. AVP specific filtering. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 33 / 37
  • 34. Conclusion Even if LTE offers very good security on air interface, the Diameter is as less secure as SS7 when it comes to location disclosure attacks. LTE attacks =⇒ It is possible to port SS7 attacks to Diameter network using Interworking functions. IMSI disclosure; location tracking upto MME as well as cellID level; IMEI and OS software version disclosure. Countermeasures include adhering to security standards (NDS/IP) and adopting efficient filtering mechanisms. Review of Diameter protocol “Privacy in LTE networks” to appear in The 9th EAI International Conference on Mobile Multimedia Communications, (IW5GS 2016). Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 34 / 37
  • 35. References I S. P. Rao, S. Holtmanns, I. Oliver, and T. Aura. (To appear) We know where you are! Utilising the telecoms core network for user tracking.1 The 8th International Conference on Cyber Conflict (CyCon 2016). Tobias Engel (2008) Locating mobile phones using signalling system 7 25th Chaos communication congress, 2008. Tobias Engel (2014) SS7: Locate. track. manipulate 31st Chaos communication congress, 2014. Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 35 / 37
  • 36. References II TS 29.305 InterWorking Function (IWF) between MAP based and Diameter based interfaces 3rd Generation Partnership Project (3GPP) TR 29.805 InterWorking Function (IWF) between MAP based and Diameter based interfaces, 3rd Generation Partnership Project (3GPP) 1 A survey article combining all SS7 location attacks Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 36 / 37
  • 37. Thank you! Sid Rao (Aalto/Nokia) LTE location tracking using IWF IFIP Networking 2016 37 / 37