Ss7 vulnerabilities and attack exposure



Yüklə 5,08 Mb.
Pdf görüntüsü
səhifə3/14
tarix25.01.2023
ölçüsü5,08 Mb.
#99321
1   2   3   4   5   6   7   8   9   ...   14
SS7 Vulnerability 2017 A4.ENG .0003.03


Participant portrait
Mobile operators from Europe and the Middle East took part in the 2016–2017 
research� 
Half of the operators had a subscriber base of more than 40 million� Most small 
companies (no more than 10 million customers) were mobile virtual network oper-
ators based on larger telecommunications corporations�
Figure 2� Operators by subscriber base size
20–40 million
40–70 million
Over 70 million
Up to 10 million
10–20 million
46.7%
13.3%
40%
2016
44.4%
11.1%
22.2%
22.2%
2017
25%
12.5%
25%
25%
12.5%
2015
5


Statistics on basic threats
We highlight the following threats that can be posed by attackers exploiting secu-
rity flaws in mobile networks:

Subscriber information disclosure

Network information disclosure

Subscriber traffic interception

Fraud

Denial of service
Each listed threat represents reputational and financial risks for the operator� Fraud, 
traffic interception, and denial of service affect subscribers directly and may lead to 
significant financial losses, privacy violation, and availability disruption�
Subscriber information disclosure means leakage of IMSI, disclosure of location or 
other data, such as account balance or profile details� Network information disclo-
sure is fraught with leakage of SS7 network configuration data� 
Certain methods of subscriber traffic interception allow an intruder to tap or redi-
rect terminating and originating calls and intercept user SMS messages�
Fraud attacks can be performed against both operators and subscribers� For ex-
ample, if an intruder changes a payment plan for roamers or bypasses the billing 
system, it will cause damage to the operator� While transferring money from a sub-
scriber's account and redirecting calls to premium rate numbers or upgrading to a 
paid subscription will most certainly harm subscribers� 
In our research, we consider a denial of service against individual subscribers only, 
because few operators would allow testing of network elements that lead to mo-
bile network malfunctioning� Malfunction can spread if intruders have a subscriber 
base or the resources to bruteforce IMSIs�
The level of awareness of operators about SS7 security is growing, which is why 
they have started to implement protection techniques� In 2015, each network was 
prone to every type of threat� But in the last two years, positive trends have been 
seen in network security�
Table 1� Vulnerable networks by threat type
2015
2016
2017
Subscriber information disclosure
100%
100%
100%
Network information disclosure
100%
92%
63%
Subscriber traffic interception
100%
100%
89%
Fraud
100%
85%
78%
Subscriber denial of service
100%
100%
100%
The risk of network information leakage, fraud, and subscriber traffic interception 
has dropped� However, each network was still prone to vulnerabilities that allow 
access to information about subscribers or denial of service� 
Below are successful attack attempts performed by our specialists during security 
analysis�
As seen from the figure, operators prioritize measures that decrease the risk of net-
work and subscriber information disclosure, because these data are the basis for a 
number of further attacks� As compared to 2015, the number of successful attacks 
aimed at network information disclosure decreased almost threefold� As for sub-
scriber data, successful attacks halved� Actually, it is not that hard to defend against 
such attacks, and the information security market offers ready-made protection 
solutions� Still, 100 percent of networks are vulnerable to them, which points to the 
inefficiency of current solutions�
Mobile operators now take 
SS7 security issues more 
seriously and implement 
protection techniques
SS7 VULNERABILITIES
AND ATTACK EXPOSURE REPORT
6


Figure 3� Successful attacks by threat types
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
2015
2017
2016
Network information disclosure
Subscriber information disclosure
49%
42%
18%
90%
53%
50%
Fraud
69%
59%
63%
Subscriber denial of service
80%
74%
68%
Subscriber traffic interception
75%
71%
73%
The number of successful attacks using other types of threats are changed insig-
nificantly� The reason is that implementation of traffic filtering and blocking sys-
tems cannot compensate for SS7 architecture flaws� To minimize them, another 
approach is required�
The following flaws allow various attacks:

Yüklə 5,08 Mb.

Dostları ilə paylaş:
1   2   3   4   5   6   7   8   9   ...   14




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©genderi.org 2024
rəhbərliyinə müraciət

    Ana səhifə