Ss7 vulnerabilities and attack exposure


partners by sending fake USSD requests using the ProcessUnstructuredSSRequest



Yüklə 5,08 Mb.
Pdf görüntüsü
səhifə7/14
tarix25.01.2023
ölçüsü5,08 Mb.
#99321
1   2   3   4   5   6   7   8   9   10   ...   14
SS7 Vulnerability 2017 A4.ENG .0003.03


partners by sending fake USSD requests using the ProcessUnstructuredSSRequest 
method� UnstructedSSNotify is used to send notifications to subscribers from vari-
ous services and the operator� An attacker can send a fake notification on behalf of 
a trusted service containing instructions for the subscriber: send an SMS message 
to a paid number to subscribe to a service, call a fake bank number because of 
suspicious transactions, or follow a link to update an application�
SMS message manipulation
Phishing or ad messages can be sent on behalf of arbitrary subscribers or services 
using MT-ForwardSM and MO-ForwardSM methods� MT-ForwardSM is designed 
for delivering incoming messages and can be used by attackers to generate forged 
incoming SMS messages� Unauthorized usage of MO-ForwardSM allows sending 
messages from subscribers and at their expense� In 2017, all networks under se-
curity analysis were exposed to vulnerabilities related to insufficient monitoring of 
signaling traffic and allowing fake messages to be sent�
Subscriber profile changing
A subscriber's profile stores data about the billing platform and service subscrip-
tions� To bypass a billing system in real time, it is necessary to delete the subscrib-
er's O-CSI subscription, which is used to make originating calls, or to substitute the 
billing system address� In order to prevent non-fare calls, O-CSI parameters imply 
that the call must be terminated if the billing platform is unavailable� However, this 
parameter can be changed so that the call continues without addressing the plat-
form� As a result, the legitimate platform does not receive information about calls 
and they are not billed�
Attacks using InsertSubscriberData and DeleteSubscriberData were successful in 
more than 80 percent of cases, while attacks using AnyTimeModification failed�
Figure 13� Forged USSD requests (percentage of successful attacks)
2015
2017
2016
0%
Money transfer
USSD spoofing
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
64%
72%
67%
71%
All networks allow sending 
fake SMS messages on 
behalf of subscribers or 
trusted services
Figure 14� Subscriber profile modification (percentage of successful attacks)
2015
2017
2016
0%
Subscriber profile modification
Payment category change
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
54%
44%
50%
50%
41%
57%
SS7 VULNERABILITIES
AND ATTACK EXPOSURE REPORT
14


Denial of service
Denial of service attacks against individual subscribers were possible in each net-
work� Detected vulnerabilities are related to protocol architecture (the lack of such 
checks as a subscriber's belonging to the network and actual location) and allow 
attacks via the following methods:

Yüklə 5,08 Mb.

Dostları ilə paylaş:
1   2   3   4   5   6   7   8   9   10   ...   14




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©genderi.org 2024
rəhbərliyinə müraciət

    Ana səhifə