Webinar Mastering 4G - 5G Telecom Threat Intelligence
Webinar Mastering 4G - 5G Telecom Threat Intelligence
Telecom Threat
Intelligence
Igor Pigalitsyn - Telecom Security Researcher
Sergey Puzankov - Product Delivery Manager
Kirill Puzankov – Product Manager
Presenters
• 5 years in telecom security • 10 years in telecom security • Engaged in telecom security since
2013
• Author of the 5G SA Core • Product manager in SecurityGen
Security Research white paper • Research into SS7 security
• Exploring telco threats and vulnerabilities
• Telecom Security Researcher in vulnerabilities starting from SS7
SecurityGen up to 5G • Discovery of techniques to bypass
SS7 firewalls
• Responsible for 5G network • Growing solutions for protection
security research of mobile core networks as well • Contributed to non-commercial
as for providing visibility of the security organizations including
• Conducting telecom security network security posture GSMA and ITU-T
assessments for MNO for many
years • Presented as a speaker at
numerous security conferences.
1
MITRE ATT&CK framework
3
MITRE ATT&CK overview
01 Matrix
02 Platform
04 Groups
05 Software
06 Mitigations
What is MITRE FiGHT (5G Hierarchy of Threats)?
5
MITRE FiGHT use cases
6
MITRE FiGHT use cases
7
MITRE FiGHT updates
Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Collection Command and Exfiltration Impact Fraud
Movement Control
1 technique 2 techniques 7 techniques 3 techniques 4 techniques 2 techniques 9 techniques 5 techniques 14 techniques 4 techniques 16 techniques 1 technique 2 techniques 11 techniques 5 techniques
Gather Victim Host Internal resource Acquire Fake Cellular Base DNS Manipulation Layer 2 Redirection Registration of Implant Internal Escape to Host & Malicious Bypass home Supply Chain SIM Credential Network Function Escape to Host & Network Flow Controller Standard Exfiltration Over Exfiltration Over Jamming or Denial Abuse of Inter-
Information & search Infrastructure & Station or Access of Encrypted DNS malicious network Image & privileged routing Compromise & Theft Service Discovery Manipulation Application Layer Alternative Unencrypted/Obfu of Service & operator Interfaces
Point functions container VNF Protocol & Protocol & scated Non-C2
Programable UE Unauthorized Software DNS Manipulation Layer 2 Redirection Valid Accounts & Shared Resource& Rootkit &
Cloud Accounts Network Sniffing & Network Flow Controller Unauthorized vSwitch Automated Protocol
Traffic & Redirection of Alter Subscriber
devices access to Network Deployment of Encrypted DNS Manipulation access to Network Exfiltration & Duplication & traffic via user Profile
Exposure Function Tools & Exposure Function plane network
Stage Configurability of (NEF)
Supplyvia token
Chain Compromise gNodeB Radio Intelligent Valid Accounts & Local Accounts & Network Boundary Manipulate Virtual Container Accessing vSwitch (NEF)
RemoteviaServices
token & Memory Scraping function
Tunnel Endpoint ID Falsify
Capabilities & Fake Base Station Compromise & Service Supply Component Controller (RIC) Bridging & Network Function Administration Terminated VNF (TEID) uniqueness interconnect
or Access Point Chain Manipulation (VNF) Command & failure invoice
Exploit Public- X-App Cloud Accounts & Configuration
Malicious co- Credentials from Hardware Security Remote Services & Software Redirection of Device Database SIM cloning
Facing tenancy exploit of Password Stores & Module Key Deployment traffic via user Manipulation
Application & NFVI (Network Signing Tools & plane network
Exploit Semi-public rApps Pre-OS Boot & Unauthorized Slice)
Network Slice Adversary-in-the- Roaming and Malicious VNF function
Fraudulent AMF Network Boundary Manipulate Virtual Charging fraud via
Facing Application software in NFVI infrastructure Middle & Interconnection Instantiation registration for UE Bridging & Network Function NF control
resource hijacking in UDM (VNF)
Trusted MNO Roaming Spoof network Radio interface Shared resource Malicious VNF Configuration
Network Slice
Relationship & Partners slice identifier discovery Instantiation application
resource hijacking
Valid Accounts & Cloud Accounts & Weaken Integrity Radio Interface Non-SBI Network Sniffing & Network Sniffing & Radio interface Vandalism of Cabling and
Network junction boxes
Infrastructure
Network Interfaces Service Based Remote System Abuse of Inter- Radio Access
Interface Discovery & operator Interfaces Hardware
Impair Defenses & Bid down UE Network Service Subscriber Profile Obtain subscriber Edge servers
Scanning & Identifier identifier via NF
Discovery
Valid Accounts & Cloud Accounts & Subscriber Profile Intercept Home Spoof network Theft of Assets
83 covered
slice identifier signals observation allocation to deny
or degrade service
Locate UE 5G-GUTI reuse Self Location Trigger fraud alert
Measurement to deny service
16 requires verification
Core Network Shared Network DOS a UE via gNB
Function Signaling Function in slice or NF signaling
45 not covered
signals observation Relationship & Partners
Radio interface
Non-SBI
8
Service Based
Interface
5G attack Threat
Intelligence
Gather Victim Host Information: Internal
resource search
Post-Conditions
Name Description
IP addresses of core network functions
Discovered IP addresses
known
10
Obtain Capabilities: Tool
Implementation Examples
Name Description
There are many tools developed to test
Use of Open-source software & Testing
5G systems, same tools can be used
tools
for adversarial objective on a system
11
Trusted Relationship: MNO Roaming Partners
Pre-Conditions
Name Description
An adversary must already have compromised a trusted PLMN or
Compromised partner
one of their service providers, e.g. IPX, VAS, etc.
UE gNB UPF
12
Network Function Service Discovery
Pre-Conditions
Name Description
NRF is by design open to connections from other
Access to NRF network functions. Control of another NF in the
operator domain may be required.
Access to SCP SCP is compromised to hijack tokens.
13
Retrieve UE subscription data
Implementation Examples
Name Description
An AMF can extract subscription data (including NSSAIs)
for any given UE SUPI by asking the UDM (uses
Nudm_SDM_Get service
AMF retrieves subscription
(SDM=SubscriberDataManagement)). The UDM does not
data from UDM.
check that that AMF is the one serving the UE, i.e. the AMF
does not need to register itself first as serving the UE, via
the Nudm_UECM_Registration Request. Table 5.2.3.1-1 of [1]
14
Retrieve UE subscription data
Attacker as
NF UDM
GET /nudm-uecm/v1ueId}/registrations/amf-3gpp-access
200 Ok
15
Endpoint Denial of Service: DOS a UE via
gNB or NF signaling
Attacker as
NF AMF
POST Callback amf-3gpp-access
204 No Content
16
Experience.
Incident investigation cases
Problem
Clients complained their banking accounts were withdrawn. The banks claimed the user
credentials were entered correctly, including one-time passwords sent in SMS.
Operator asked us
- Find the way how the intruders were able to intercept SMS
- Identify how many subscribers were affected
- Estimate approximate amount of fraud
18
Investigation
19
Gather Victim Host Information
20
Acquire Infrastructure
21
Trusted Relationship
Mobile Operator
22
Bypass home routing
23
Subscriber Profile Identifier Discovery
Collecting subscriber IMSIs
24
Device Database Manipulation
Subscriber registration on the fake network
Mobile Operator
25
Redirection of traffic via user plane network
function
Money transfer request
1. Money transfer request via banking app (web or mobile)
Internet
Mobile Operator
26
Redirection of traffic via user plane network
function
OTP initiation
1. Money transfer request via banking app (web or mobile)
Internet
Mobile Operator
27
Redirection of traffic via user plane network
function
Subscriber location request
1. Money transfer request via banking app (web or mobile)
Internet
Mobile Operator
28
Redirection of traffic via user plane network
function
Fake location providing
1. Money transfer request via banking app (web or mobile)
Internet
Mobile Operator
4. SRI4SM(Fake Loc)
29
Redirection of traffic via user plane network function
OTP SMS redirection
1. Money transfer request via
banking app (web or mobile)
Internet
Mobile Operator
4. SRI4SM(Fake Loc)
5. OTP SMS
30
Redirection of traffic via user plane network function
Money transfer confirmation via OTP
1. Money transfer request via
banking app (web or mobile)
Internet
6. OTP
Mobile Operator
4. SRI4SM(Fake Loc)
5. OTP SMS
31
Redirection of traffic via user plane network function
Money transfered
1. Money transfer request via
banking app (web or mobile)
Internet
6. OTP
Mobile Operator
4. SRI4SM(Fake Loc)
7. Money transferred
5. OTP SMS
$$$
Reconnaissance Resource Development Initial Access Defense Evasion Collection Impact
32
Investigation. Findings
33
Catch an intruder before the Impact happens
Processing,
Analysis,
Integration
Info from:
Offensive testing
Security monitoring
Incident investigation TSG
Lab research
Industry collaboration Knowledgebase
34
Isolate
Block
Attacker as
NF UDM
GET /nudm-uecm/v1ueId}/registrations/amf-3gpp-access
200 Ok
35
Incident investigation case Bad guy
Block Isolate
36
Incident Investigation case
Subscriber registration on the fake network
Mobile Operator
37
Infra Ecosystem Clients
Training Blockage
Training isolation
SIEM/SOAR
Training alarms Training alarms
38
Conclusion
Detects dangerous signaling Provides a fast response through Continuously ensures access to
activity, such as unusual traffic integration with enforcement the latest Threat Intelligence and
patterns or attempts to exploit systems, helping to cut the kill verifies threats for prioritization of
control plane vulnerabilities. chain before any negative security activities.
impact occurs.
39
Questions
contact@secgen.com
www.secgen.com