SlideShare a Scribd company logo
3
Most read
6
Most read
11
Most read
1 © Nokia Solutions and Networks 2015
Check_IMEI Misusage
Siddharth Rao / Silke Holtmanns / Ian Oliver / Tuomas Aura
21-08-2015
Public
2 © Nokia Solutions and Networks 2015
Agenda
Public
• Background of SS7 attacks
• Normal Check_IMEI procedure
• Assumptions
• Attack scenario description
• Summary
3 © Nokia Solutions and Networks 2015
• Telecommunication systems are vulnerable.
• Recent attacks
• Locate
• Trace/intercept
• Manipulate
Frauds
Illegitimate activities
• Core network Protocol
• Signaling System #7
Public
Motivation
4 © Nokia Solutions and Networks 2015
• Protocol foundation to enable roaming.
• Call establishment , management and release.
• Short Message Services (SMS).
• Supplementary services.
• Toll free numbers.
• Tele-voting.
• Enhanced Message Services (EMS).
• Local Number Portability (LNP).
Signaling System #7
Public
5 © Nokia Solutions and Networks 2015 Public
SS7 Attacks timeline
6 © Nokia Solutions and Networks 2015 Public
SS7 Attacks impact
7 © Nokia Solutions and Networks 2015 Public
Unblocking stolen mobile devices using
SS7-MAP vulnerabilities
Exploiting the relationship between IMEI and IMSI for EIR access
- Siddharth Rao, Dr. Silke Holtmanns, Dr. Ian Oliver, Dr Tuomas Aura
8 © Nokia Solutions and Networks 2015 Public
Normal IMEI (device ID) Check procedure
9 © Nokia Solutions and Networks 2015 Public
CheckIMEI ASN Structure
Contains only IMEI.
10 © Nokia Solutions and Networks 2015
• Attacker has a stolen phone which is blacklisted and he knows the IMSI
(Subsriber id) which was associated with it while blocking or last use by the
victim. The attacker does not need to have the original SIM as it is sufficient
to have just the IMSI.
• Attacker has access to SS7 network.
• The Global Title (GT, “SS7 name of a node”) of the Equipment Identity
Register (EIR) is required.
• Mobile Switching Center (MSC) GT might be needed (depending on operator
configuration).
• Feature and IMSI check options are enabled.
Public
Assumptions
11 © Nokia Solutions and Networks 2015
Users loose their phones and find it again, easy ”recovery” in EIR
wanted
 MSC sends IMEI (device id) along with IMSI (subscriber id) during
MAP_CHECK_IMEI.
 Initially the IMEI is checked to know the list it belongs to. If it is found
on the black list, an additional check of IMSI is made. If there is a
match between IMSI provisioned with IMEI in the EIR database (This is
the IMSI-IMEI pair in the EIR before the victim blocks his stolen
device.) with the IMSI found in MAP_CHECK_IMEI message then this
overrides the blacklist condition.
 Phone no longer blacklisted.
Public
Feature
12 © Nokia Solutions and Networks 2015 Public
Attack Scenario
13 © Nokia Solutions and Networks 2015 Public
CheckIMEI ASN Structure
Contains IMEI and IMSI !!!!
14 © Nokia Solutions and Networks 2015
1. A CHECK_IMEI* is received with IMEI = 12345678901234, and IMSI =
495867256894125.
2. An individual IMEI match is found indicating that the IMEI is on the
Black List.
3. Normally required response would be Black Listed, however; because
an IMSI is present in the message, and the IMEI is on the Black List,
the IMSI is compared to the IMSI entry in the database for this IMEI.
4. In this case, the IMSI in the RTDB matches the IMSI in the query, thus
the Black Listed condition is cancelled/overridden.
5. EIR formulates a CHECK_IMEI* response with Equipment Status = 0
whiteListed.
Public
Example
15 © Nokia Solutions and Networks 2015
• Stolen phones would have much higher value, if they are not blacklisted and can be sold
via ebay or simlar means.
Why should somebody do this?
Public
Source: http://www.wired.com/2014/12/where-stolen-smart-phones-go/
• 1 in 10 smart-phone owners are the
victims of phone theft.
• In United States, 113 phones per minute
are stolen or lost.
 $7 million worth of smart phones on
a daily basis.
16 © Nokia Solutions and Networks 2015 Public
EIR Coverage
Source: Farrell, G. (2015). Preventing phone theft and robbery: the need for government action and international coordination. Crime Science, 4(1), 1-11.
17 © Nokia Solutions and Networks 2015
• Attack has not been observed in real networks.
• Research was done on protocol level and publicly available
information.
• Not all EIRs affected.
• Business case exist for the attack.
• Easy to add ”Check_IMEI*” to the filter list of network internal
messages to stop this kind of attack before it appears in real.
Public
Summary
18 © Nokia Solutions and Networks 2015
THANK YOU
Public
Contact: siddharth.rao@aalto.fi
19 © Nokia Solutions and Networks 2015 Public
20 © Nokia Solutions and Networks 2015 Public
Copyright and confidentiality
The contents of this document are proprietary and
confidential property of Nokia Solutions and Networks.
This document is provided subject to confidentiality
obligations of the applicable agreement(s).
This document is intended for use of Nokia Solutions
and Networks customers and collaborators only for the
purpose for which this document is submitted by Nokia
Solution and Networks. No part of this document may
be reproduced or made available to the public or to any
third party in any form or means without the prior
written permission of Nokia Solutions and Networks.
This document is to be used by properly trained
professional personnel. Any use of the contents in this
document is limited strictly to the use(s) specifically
created in the applicable agreement(s) under which the
document is submitted. The user of this document may
voluntarily provide suggestions, comments or other
feedback to Nokia Solutions and Networks in respect of
the contents of this document ("Feedback"). Such
Feedback may be used in Nokia Solutions and Networks
products and related specifications or other
documentation. Accordingly, if the user of this
document gives Nokia Solutions and Networks Feedback
on the contents of this document, Nokia Solutions and
Networks may freely use, disclose, reproduce, license,
distribute and otherwise commercialize the feedback in
any Nokia Solutions and Networks product, technology,
service, specification or other documentation.
Nokia Solutions and Networks operates a policy of
ongoing development. Nokia Solutions and Networks
reserves the right to make changes and improvements
to any of the products and/or services described in this
document or withdraw this document at any time
without prior notice.
The contents of this document are provided "as is".
Except as required by applicable law, no warranties of
any kind, either express or implied, including, but not
limited to, the implied warranties of merchantability and
fitness for a particular purpose, are made in relation to
the accuracy, reliability or contents of this document.
NOKIA SOLUTIONS AND NETWORKS SHALL NOT BE
RESPONSIBLE IN ANY EVENT FOR ERRORS IN THIS
DOCUMENT or for any loss of data or income or any
special, incidental, consequential, indirect or direct
damages howsoever caused, that might arise from the
use of this document or any contents of this document.
This document and the product(s) it describes are
protected by copyright according to the
applicable laws.
Nokia is a registered trademark of Nokia Corporation.
Other product and company names mentioned
herein may be trademarks or trade names of their
respective owners.
© Nokia Solutions and Networks 2015

More Related Content

PDF
NETCONF Call Home
PDF
NetBox as the Source of Truth for Cisco NSO Configurations
PDF
SRv6 Mobile User Plane : Initial POC and Implementation
PDF
Lte advanced conformance & standards
PDF
3GPP_Overall_Architecture_and_Specifications.pdf
PPTX
Diameter Presentation
PDF
LTE KPIs and Formulae
PPTX
IMS Registration Flow
NETCONF Call Home
NetBox as the Source of Truth for Cisco NSO Configurations
SRv6 Mobile User Plane : Initial POC and Implementation
Lte advanced conformance & standards
3GPP_Overall_Architecture_and_Specifications.pdf
Diameter Presentation
LTE KPIs and Formulae
IMS Registration Flow

What's hot (20)

PDF
D04.VoLTE SIP Call Flow – Mobile Originating (MO) & Terminating (MT).pdf
PDF
IPsec for IMS
PDF
GTP Overview
PPTX
VPLS Fundamental
PPTX
Internet Protocol Version 4
PPTX
ASA Firewall Interview- Questions & Answers
PPTX
F5 Solutions for Service Providers
PDF
Throughput Calculation for LTE TDD and FDD System
PPTX
A 30-minute Introduction to NETCONF and YANG
PDF
4G LTE full tutorial
PDF
5g introduction_NR
PPTX
Network automation
PDF
Neutron-to-Neutron: interconnecting multiple OpenStack deployments
PDF
Cisco Live Brksec 3032 - NGFW Clustering
PDF
Build an Edge-to-Cloud Solution with the MING Stack
PDF
802.11w Tutorial
PDF
Linux Networking Explained
PPTX
RHCSA EX200 - Summary
PDF
Using GTP on Linux with libgtpnl
PDF
Signalling in EPC/LTE
D04.VoLTE SIP Call Flow – Mobile Originating (MO) & Terminating (MT).pdf
IPsec for IMS
GTP Overview
VPLS Fundamental
Internet Protocol Version 4
ASA Firewall Interview- Questions & Answers
F5 Solutions for Service Providers
Throughput Calculation for LTE TDD and FDD System
A 30-minute Introduction to NETCONF and YANG
4G LTE full tutorial
5g introduction_NR
Network automation
Neutron-to-Neutron: interconnecting multiple OpenStack deployments
Cisco Live Brksec 3032 - NGFW Clustering
Build an Edge-to-Cloud Solution with the MING Stack
802.11w Tutorial
Linux Networking Explained
RHCSA EX200 - Summary
Using GTP on Linux with libgtpnl
Signalling in EPC/LTE
Ad

Similar to Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities (20)

PDF
The known unknowns of SS7 and beyond
PPTX
Mobisheild sales promotion presentation.
PDF
Telecom Security
PPTX
Cellcrypt - An Introduction to Secure Mobile Communications
PDF
7. CLT 2017 core NaaS RCM 21jun17
PDF
Summit 16: OPNFV: Moving to Support Real Time Applications
PDF
telebriefing-150415-ericssons-security-solutions
PDF
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...
PPTX
Coprat Futsal Angola Luanda 2024 , Formação
PPTX
mobile-phone-cloning-8886-hNyjka1.pptx
PDF
Mobile Theft Tracking Application
PPTX
Mobile App Security: How Secure is your Mobile App
PDF
V4I5201553
PPTX
Authentication service security
PPTX
Being A Socially Responsible Social Developer: Mobile App Security
PPTX
Mobile Phone Cloning
PPT
Mobile security
PDF
Mobile phone security
PPT
Gsm security
PPTX
mobile-phone-cloning-8886-hNyjka1.pptx
The known unknowns of SS7 and beyond
Mobisheild sales promotion presentation.
Telecom Security
Cellcrypt - An Introduction to Secure Mobile Communications
7. CLT 2017 core NaaS RCM 21jun17
Summit 16: OPNFV: Moving to Support Real Time Applications
telebriefing-150415-ericssons-security-solutions
OSIS18_IoT : Securisation du reseau des objets connectes, par Nicolas LE SAUZ...
Coprat Futsal Angola Luanda 2024 , Formação
mobile-phone-cloning-8886-hNyjka1.pptx
Mobile Theft Tracking Application
Mobile App Security: How Secure is your Mobile App
V4I5201553
Authentication service security
Being A Socially Responsible Social Developer: Mobile App Security
Mobile Phone Cloning
Mobile security
Mobile phone security
Gsm security
mobile-phone-cloning-8886-hNyjka1.pptx
Ad

Recently uploaded (20)

PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
MYSQL Presentation for SQL database connectivity
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
Big Data Technologies - Introduction.pptx
PDF
Empathic Computing: Creating Shared Understanding
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Approach and Philosophy of On baking technology
PDF
Getting Started with Data Integration: FME Form 101
PPTX
A Presentation on Artificial Intelligence
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Network Security Unit 5.pdf for BCA BBA.
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
MYSQL Presentation for SQL database connectivity
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Assigned Numbers - 2025 - Bluetooth® Document
Big Data Technologies - Introduction.pptx
Empathic Computing: Creating Shared Understanding
SOPHOS-XG Firewall Administrator PPT.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Accuracy of neural networks in brain wave diagnosis of schizophrenia
MIND Revenue Release Quarter 2 2025 Press Release
“AI and Expert System Decision Support & Business Intelligence Systems”
Approach and Philosophy of On baking technology
Getting Started with Data Integration: FME Form 101
A Presentation on Artificial Intelligence
Mobile App Security Testing_ A Comprehensive Guide.pdf
Spectral efficient network and resource selection model in 5G networks
Digital-Transformation-Roadmap-for-Companies.pptx

Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities

  • 1. 1 © Nokia Solutions and Networks 2015 Check_IMEI Misusage Siddharth Rao / Silke Holtmanns / Ian Oliver / Tuomas Aura 21-08-2015 Public
  • 2. 2 © Nokia Solutions and Networks 2015 Agenda Public • Background of SS7 attacks • Normal Check_IMEI procedure • Assumptions • Attack scenario description • Summary
  • 3. 3 © Nokia Solutions and Networks 2015 • Telecommunication systems are vulnerable. • Recent attacks • Locate • Trace/intercept • Manipulate Frauds Illegitimate activities • Core network Protocol • Signaling System #7 Public Motivation
  • 4. 4 © Nokia Solutions and Networks 2015 • Protocol foundation to enable roaming. • Call establishment , management and release. • Short Message Services (SMS). • Supplementary services. • Toll free numbers. • Tele-voting. • Enhanced Message Services (EMS). • Local Number Portability (LNP). Signaling System #7 Public
  • 5. 5 © Nokia Solutions and Networks 2015 Public SS7 Attacks timeline
  • 6. 6 © Nokia Solutions and Networks 2015 Public SS7 Attacks impact
  • 7. 7 © Nokia Solutions and Networks 2015 Public Unblocking stolen mobile devices using SS7-MAP vulnerabilities Exploiting the relationship between IMEI and IMSI for EIR access - Siddharth Rao, Dr. Silke Holtmanns, Dr. Ian Oliver, Dr Tuomas Aura
  • 8. 8 © Nokia Solutions and Networks 2015 Public Normal IMEI (device ID) Check procedure
  • 9. 9 © Nokia Solutions and Networks 2015 Public CheckIMEI ASN Structure Contains only IMEI.
  • 10. 10 © Nokia Solutions and Networks 2015 • Attacker has a stolen phone which is blacklisted and he knows the IMSI (Subsriber id) which was associated with it while blocking or last use by the victim. The attacker does not need to have the original SIM as it is sufficient to have just the IMSI. • Attacker has access to SS7 network. • The Global Title (GT, “SS7 name of a node”) of the Equipment Identity Register (EIR) is required. • Mobile Switching Center (MSC) GT might be needed (depending on operator configuration). • Feature and IMSI check options are enabled. Public Assumptions
  • 11. 11 © Nokia Solutions and Networks 2015 Users loose their phones and find it again, easy ”recovery” in EIR wanted  MSC sends IMEI (device id) along with IMSI (subscriber id) during MAP_CHECK_IMEI.  Initially the IMEI is checked to know the list it belongs to. If it is found on the black list, an additional check of IMSI is made. If there is a match between IMSI provisioned with IMEI in the EIR database (This is the IMSI-IMEI pair in the EIR before the victim blocks his stolen device.) with the IMSI found in MAP_CHECK_IMEI message then this overrides the blacklist condition.  Phone no longer blacklisted. Public Feature
  • 12. 12 © Nokia Solutions and Networks 2015 Public Attack Scenario
  • 13. 13 © Nokia Solutions and Networks 2015 Public CheckIMEI ASN Structure Contains IMEI and IMSI !!!!
  • 14. 14 © Nokia Solutions and Networks 2015 1. A CHECK_IMEI* is received with IMEI = 12345678901234, and IMSI = 495867256894125. 2. An individual IMEI match is found indicating that the IMEI is on the Black List. 3. Normally required response would be Black Listed, however; because an IMSI is present in the message, and the IMEI is on the Black List, the IMSI is compared to the IMSI entry in the database for this IMEI. 4. In this case, the IMSI in the RTDB matches the IMSI in the query, thus the Black Listed condition is cancelled/overridden. 5. EIR formulates a CHECK_IMEI* response with Equipment Status = 0 whiteListed. Public Example
  • 15. 15 © Nokia Solutions and Networks 2015 • Stolen phones would have much higher value, if they are not blacklisted and can be sold via ebay or simlar means. Why should somebody do this? Public Source: http://www.wired.com/2014/12/where-stolen-smart-phones-go/ • 1 in 10 smart-phone owners are the victims of phone theft. • In United States, 113 phones per minute are stolen or lost.  $7 million worth of smart phones on a daily basis.
  • 16. 16 © Nokia Solutions and Networks 2015 Public EIR Coverage Source: Farrell, G. (2015). Preventing phone theft and robbery: the need for government action and international coordination. Crime Science, 4(1), 1-11.
  • 17. 17 © Nokia Solutions and Networks 2015 • Attack has not been observed in real networks. • Research was done on protocol level and publicly available information. • Not all EIRs affected. • Business case exist for the attack. • Easy to add ”Check_IMEI*” to the filter list of network internal messages to stop this kind of attack before it appears in real. Public Summary
  • 18. 18 © Nokia Solutions and Networks 2015 THANK YOU Public Contact: siddharth.rao@aalto.fi
  • 19. 19 © Nokia Solutions and Networks 2015 Public
  • 20. 20 © Nokia Solutions and Networks 2015 Public Copyright and confidentiality The contents of this document are proprietary and confidential property of Nokia Solutions and Networks. This document is provided subject to confidentiality obligations of the applicable agreement(s). This document is intended for use of Nokia Solutions and Networks customers and collaborators only for the purpose for which this document is submitted by Nokia Solution and Networks. No part of this document may be reproduced or made available to the public or to any third party in any form or means without the prior written permission of Nokia Solutions and Networks. This document is to be used by properly trained professional personnel. Any use of the contents in this document is limited strictly to the use(s) specifically created in the applicable agreement(s) under which the document is submitted. The user of this document may voluntarily provide suggestions, comments or other feedback to Nokia Solutions and Networks in respect of the contents of this document ("Feedback"). Such Feedback may be used in Nokia Solutions and Networks products and related specifications or other documentation. Accordingly, if the user of this document gives Nokia Solutions and Networks Feedback on the contents of this document, Nokia Solutions and Networks may freely use, disclose, reproduce, license, distribute and otherwise commercialize the feedback in any Nokia Solutions and Networks product, technology, service, specification or other documentation. Nokia Solutions and Networks operates a policy of ongoing development. Nokia Solutions and Networks reserves the right to make changes and improvements to any of the products and/or services described in this document or withdraw this document at any time without prior notice. The contents of this document are provided "as is". Except as required by applicable law, no warranties of any kind, either express or implied, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose, are made in relation to the accuracy, reliability or contents of this document. NOKIA SOLUTIONS AND NETWORKS SHALL NOT BE RESPONSIBLE IN ANY EVENT FOR ERRORS IN THIS DOCUMENT or for any loss of data or income or any special, incidental, consequential, indirect or direct damages howsoever caused, that might arise from the use of this document or any contents of this document. This document and the product(s) it describes are protected by copyright according to the applicable laws. Nokia is a registered trademark of Nokia Corporation. Other product and company names mentioned herein may be trademarks or trade names of their respective owners. © Nokia Solutions and Networks 2015