LTE REDIRECTION
Forcing Targeted LTE Cellphone into Unsafe Network
Wanqiao Zhang
Unicorn Team – Communication security researcher
Haoqi Shan
Unicorn Team – Hardware/Wireless security researcher
Qihoo 360 Technology Co. Ltd.
LTE and IMSI catcher myths
• In Nov. 2015, BlackHat EU, Ravishankar Borgaonkar, and Altaf Shaik etc.
introduced the LTE IMSI catcher and DoS attack.
IMSI Catcher
Once a cellphone goes through
the fake network coverage area,
its IMSI will be reported to the
fake network.
DoS Attack
DoS message examples:
ü You are an illegal cellphone!
ü Here is NO network available. You
could shut down your 4G/3G/2G
modem.
Redirection Attack
Malicious LTE: “Hello
cellphone, come into my
GSM network…”
Demo
Fake LTE Network
Fake GSM Network USRPs
Demo Video
Risk
• If forced into fake network
• The cellphone will have no service (DoS).
• The fake GSM network can make malicious call and SMS.
• If forced into rogue network
• All the traffic (voice and data) can be eavesdropped.
A femtocell
controlled
by attacker
LTE Basic Procedure
• (Power on)
• Cell search, MIB, SIB1, SIB2 and other SIBs
• PRACH preamble
• RACH response
• RRC Connection Request
• RRC Connection Setup
• RRC Connection Setup Complete + NAS: Attach request + ESM:
PDN connectivity request
• RRC: DL info transfer + NAS: Authentication request
• RRC: UL info transfer + NAS: Authentication response
• RRC: DL info transfer + NAS: Security mode command
• RRC: UL info transfer + NAS: Security mode completer
• ……
Unauthorized area
Attack Space!
Procedure of IMSI Catcher
Firstly send a TAU
reject, then cellphone
will send Attach
Request, with its IMSI!
Procedure of DoS Attack
Attach Reject message
can bring reject cause.
Some special causes
result in NO service on
cellphone.
Procedure of Redirection Attack
RRC Release message
can bring the cell info
which it can let cellphone
re-direct to.
How to Build Fake LTE Network
• Computer + USRP
How to Build Fake LTE Network
• There are some popular open source LTE projects:
• Open Air Interface by Eurecom
• http://www.openairinterface.org/
• The most completed and open source LTE software
• Support connecting cellphone to Internet
• But have complicated software architecture
• OpenLTE by Ben Wojtowicz
• http://openlte.sourceforge.net/
• Haven’t achieved stable LTE data connection but functional enough for fake LTE network
• Beautiful code architecture
• More popular in security researchers
OpenLTE
OpenLTE Source Code (1/3)
In current OpenLTE release, the TAU request isn’t handled.
But TAU reject msg packing function is available.
So we could add some codes to handle TAU case and give appropriate TAU
reject cause.
Procedure of IMSI Catcher
Firstly send a TAU
reject, then cellphone
will send Attach
Request, with its IMSI!
OpenLTE Source Code (1/3)
Set the mme procedure as TAU REQUET
Call the TAU reject msg packing function
Refer to Attach reject function
OpenLTE Souce Code (2/3)
DoS attack can directly utilize the cause setting in Attach Reject message.
Procedure of DoS Attack
Attach Reject message
can bring reject cause.
Some special causes
result in NO service on
cellphone.
OpenLTE Source Code (3/3)
redirectCarrierInfo can be inserted into RRC Connection Release message.
OpenLTE Source Code (3/3)
Procedure of Redirection Attack
RRC Release message
can bring the cell info
which it can let cellphone
re-direct to.
Think from the other side
Attacker Defender
Why is RRC redirection message not encrypted?
Is This a New Problem?
• "Security Vulnerabilities in the E-RRC Control Plane",
3GPP TSG-RAN WG2/RAN WG3/SA WG3 joint meeting,
R3-060032, 9-13 January 2006
• This document introduced a ‘Forced handover’ attack:
An attacker with the ability to generate RRC signaling—that is, any of the forms of
compromise listed above—can initiate a reconfiguration procedure with the UE, directing
it to a cell or network chosen by the attacker. This could function as a denial of service (if
the target network cannot or will not offer the UE service) or to allow a chosen network to
“capture” UEs.
An attacker who already had full control of one system (perhaps due to weaker security on
another RAT) could direct other systems’ UEs to “their” network as a prelude to more
serious security attacks using the deeply compromised system. Used in this way, the ability
to force a handover serves to expand any form of attack to UEs on otherwise secure
systems, meaning that a single poorly secured network (in any RAT that interoperates with
the E-UTRAN) becomes a point of vulnerability not only for itself but for all other
networks in its coverage area.
3GPP’s Decision
• “Reply LS on assumptions for security procedures”, 3GPP TSG SA WG3
meeting #45, S3-060833, 31st Oct - 3rd Nov 2006
(1) RRC Integrity and ciphering will be started only once during the attach
procedure (i.e. after the AKA has been performed) and can not be de-
activated later.
(2) RRC Integrity and ciphering algorithm can only be changed in the case of
the eNodeB handover.
Why 3GPP Made Such Decision
• In special cases, e.g. earthquake, hot events
• Too many people try to access one base station then make this base station overloaded.
• To let network load balanced, this base station can ask the new coming cellphone to
redirect to another base station.
• If you don’t tell cellphones which
base station is light-loaded,
the cellphones will blindly
and inefficiently search one
by one, and then increase
the whole network load.
Overloaded
Base station
Overloaded
Base station
Overloaded
Base station
Light-loaded
Base station
Network Availability vs.. Privacy
• Global roaming
• Battery energy saving
• Load balance
• IMSI Catcher
• DoS Attack
• Redirection Attack
VS.
Basic requirement High level requirement
e.g. Wifi MAC addr tracking
Countermeasures (1/2)
• Cellphone manufacture – smart response
• Scheme 1: Don’t follow the redirection command, but auto-search other available base
station.
• Scheme 2: Follow the redirection command, but raise an alert to cellphone user: Warning!
You are downgraded to low security network.
Countermeasures (2/2)
• Standardization effort
• Fix the weak security of legacy network: GSM
• 3GPP TSG SA WG3 (Security) Meeting #83, S3-160702, 9-13 May
2016 Legacy Security Issues and Mitigation Proposals, Liaison
Statement from GSMA.
• Refuse one-way authentication
• Disabling compromised encryption in mobile
Acknowledgements
• Huawei
• Peter Wesley (Security expert)
• GUO Yi (3GPP RAN standardization expert)
• CHEN Jing (3GPP SA3 standardization expert)
• Qualcomm
• GE Renwei (security expert)
• Apple
• Apple product security team
Thank you!

More Related Content

PDF
2 g and 3g kpi improvement by parameter optimization (nsn, ericsson, huawei) ...
PDF
Ttalteoverview 100923032416 Phpapp01 (1)
PPT
Nokia gsm-kpi-analysis-based-on-daily-monitoring-basis-presentation
PPT
Using Propagation Delay in WCDMA RAN Optimization.ppt
PDF
Lte kpis, counters & amp; timers
PPT
2 g training optimization
PPT
01 lte radio_parameters_lte_overview_rl1
PPTX
2 g parameters_guidelines1
2 g and 3g kpi improvement by parameter optimization (nsn, ericsson, huawei) ...
Ttalteoverview 100923032416 Phpapp01 (1)
Nokia gsm-kpi-analysis-based-on-daily-monitoring-basis-presentation
Using Propagation Delay in WCDMA RAN Optimization.ppt
Lte kpis, counters & amp; timers
2 g training optimization
01 lte radio_parameters_lte_overview_rl1
2 g parameters_guidelines1

What's hot (20)

PDF
Notes for scft
PPT
Nokia kpi and_core_optimization
PPT
Lte most used command rev1
PPT
Huawei parameter strategy v1.4 1st dec
PPT
63077585 idle-mode-parameter-optimization
PDF
LTE Review - Load Balancing and Interfreq HO
DOC
Factors affecting lte throughput and calculation methodology
PPT
Ericsson optimization opti
DOCX
Layer 3 messages
PPSX
3G drive test procedure (SSV) by Md Joynal Abaden
PDF
SCFT-Training_v8.2-1
PPTX
LTE Optimization-KPIs.pptx
PDF
DT analysis how to analyze crossed feeder issue by dt
DOCX
Lte drive test parameters
PDF
Cs fallback feature
PDF
Neighbor guideline v1.0 rev
PDF
Lte drive test parameter introduction
PPT
Lte irat-troubleshooting-guide
PDF
2G Handover Details (Huawei)
PDF
Interworking wcdma to lte
Notes for scft
Nokia kpi and_core_optimization
Lte most used command rev1
Huawei parameter strategy v1.4 1st dec
63077585 idle-mode-parameter-optimization
LTE Review - Load Balancing and Interfreq HO
Factors affecting lte throughput and calculation methodology
Ericsson optimization opti
Layer 3 messages
3G drive test procedure (SSV) by Md Joynal Abaden
SCFT-Training_v8.2-1
LTE Optimization-KPIs.pptx
DT analysis how to analyze crossed feeder issue by dt
Lte drive test parameters
Cs fallback feature
Neighbor guideline v1.0 rev
Lte drive test parameter introduction
Lte irat-troubleshooting-guide
2G Handover Details (Huawei)
Interworking wcdma to lte
Ad

Viewers also liked (20)

PDF
Netmanias.2012.09.03 [en] emm_procedure_1._initial_attach_(part_1)
PDF
S1ap lte-attach-eps-bearer-setup
PDF
Quick attach summaryl
PPTX
TRACK C: PDN (Power Delivery Network)/ Ronen Stilkol
PPTX
20121129 lte basic procedures (2)
PDF
LTE EPC Technology Essentials
PPTX
EPS presentation
PDF
LTE Procedures
PDF
LTE Architecture and LTE Attach
PDF
3 gpp lte-rlc
PDF
Lte protocol-stack-mac-rlc-pdcp
PDF
Lte attach-messaging
PDF
AIRCOM LTE Webinar 1 - Network Architecture
PDF
Lte rrc-connection-setup-messaging
PDF
User location tracking attacks for LTE networks using the Interworking Functi...
DOC
c1 & c2 values
PDF
LTE Key Technologies
PDF
LTE Radio Layer 2 And Rrc Aspects
PDF
Simplified Call Flow Signaling: Registration - The Attach Procedure
PPTX
PDN Overview
Netmanias.2012.09.03 [en] emm_procedure_1._initial_attach_(part_1)
S1ap lte-attach-eps-bearer-setup
Quick attach summaryl
TRACK C: PDN (Power Delivery Network)/ Ronen Stilkol
20121129 lte basic procedures (2)
LTE EPC Technology Essentials
EPS presentation
LTE Procedures
LTE Architecture and LTE Attach
3 gpp lte-rlc
Lte protocol-stack-mac-rlc-pdcp
Lte attach-messaging
AIRCOM LTE Webinar 1 - Network Architecture
Lte rrc-connection-setup-messaging
User location tracking attacks for LTE networks using the Interworking Functi...
c1 & c2 values
LTE Key Technologies
LTE Radio Layer 2 And Rrc Aspects
Simplified Call Flow Signaling: Registration - The Attach Procedure
PDN Overview
Ad

Similar to LTE Redirection attacks: Zhang Shan (20)

DOCX
The mfn 3
PPT
4g security presentation
PPTX
Mobile computing – module 6
PPTX
Security threats and countermeasure in 3 g network
PDF
Lte in ten_minutes
PDF
Lte in ten_minutes
DOCX
Posting 1 Reply Required What concerns should be underst.docx
PPT
Lte and future frauds
DOC
A wireless intrusion detection system and a new attack model (synopsis)
PPTX
128-ch2.pptx
PDF
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
PDF
Exploring LTE security and protocol exploits with open source software and lo...
PDF
Computer network notes with company specific questions
PDF
Cryptography and network security.
PPTX
Securing Internet of Things
PDF
N0363079085
PPT
254460979-ishant abcd-098765432222-1.ppt
PDF
CNIT 128 Ch 2: Hacking the cellular network
PPT
Threats to Mobile Computing
PPTX
LookingAroundCorners-DAS Simplified-final- BICSI Sept 2015
The mfn 3
4g security presentation
Mobile computing – module 6
Security threats and countermeasure in 3 g network
Lte in ten_minutes
Lte in ten_minutes
Posting 1 Reply Required What concerns should be underst.docx
Lte and future frauds
A wireless intrusion detection system and a new attack model (synopsis)
128-ch2.pptx
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Exploring LTE security and protocol exploits with open source software and lo...
Computer network notes with company specific questions
Cryptography and network security.
Securing Internet of Things
N0363079085
254460979-ishant abcd-098765432222-1.ppt
CNIT 128 Ch 2: Hacking the cellular network
Threats to Mobile Computing
LookingAroundCorners-DAS Simplified-final- BICSI Sept 2015

Recently uploaded (20)

PPTX
Configure Apache Mutual Authentication
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PPT
Geologic Time for studying geology for geologist
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PDF
Architecture types and enterprise applications.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Five Habits of High-Impact Board Members
PPTX
2018-HIPAA-Renewal-Training for executives
PDF
STKI Israel Market Study 2025 version august
PDF
Flame analysis and combustion estimation using large language and vision assi...
PPTX
TEXTILE technology diploma scope and career opportunities
DOCX
search engine optimization ppt fir known well about this
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
Comparative analysis of machine learning models for fake news detection in so...
Configure Apache Mutual Authentication
UiPath Agentic Automation session 1: RPA to Agents
Taming the Chaos: How to Turn Unstructured Data into Decisions
A proposed approach for plagiarism detection in Myanmar Unicode text
Geologic Time for studying geology for geologist
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
Architecture types and enterprise applications.pdf
Zenith AI: Advanced Artificial Intelligence
Chapter 5: Probability Theory and Statistics
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Getting started with AI Agents and Multi-Agent Systems
Five Habits of High-Impact Board Members
2018-HIPAA-Renewal-Training for executives
STKI Israel Market Study 2025 version august
Flame analysis and combustion estimation using large language and vision assi...
TEXTILE technology diploma scope and career opportunities
search engine optimization ppt fir known well about this
Consumable AI The What, Why & How for Small Teams.pdf
Comparative analysis of machine learning models for fake news detection in so...

LTE Redirection attacks: Zhang Shan

  • 1. LTE REDIRECTION Forcing Targeted LTE Cellphone into Unsafe Network Wanqiao Zhang Unicorn Team – Communication security researcher Haoqi Shan Unicorn Team – Hardware/Wireless security researcher Qihoo 360 Technology Co. Ltd.
  • 2. LTE and IMSI catcher myths • In Nov. 2015, BlackHat EU, Ravishankar Borgaonkar, and Altaf Shaik etc. introduced the LTE IMSI catcher and DoS attack.
  • 3. IMSI Catcher Once a cellphone goes through the fake network coverage area, its IMSI will be reported to the fake network.
  • 4. DoS Attack DoS message examples: ü You are an illegal cellphone! ü Here is NO network available. You could shut down your 4G/3G/2G modem.
  • 5. Redirection Attack Malicious LTE: “Hello cellphone, come into my GSM network…”
  • 6. Demo Fake LTE Network Fake GSM Network USRPs
  • 8. Risk • If forced into fake network • The cellphone will have no service (DoS). • The fake GSM network can make malicious call and SMS. • If forced into rogue network • All the traffic (voice and data) can be eavesdropped. A femtocell controlled by attacker
  • 9. LTE Basic Procedure • (Power on) • Cell search, MIB, SIB1, SIB2 and other SIBs • PRACH preamble • RACH response • RRC Connection Request • RRC Connection Setup • RRC Connection Setup Complete + NAS: Attach request + ESM: PDN connectivity request • RRC: DL info transfer + NAS: Authentication request • RRC: UL info transfer + NAS: Authentication response • RRC: DL info transfer + NAS: Security mode command • RRC: UL info transfer + NAS: Security mode completer • …… Unauthorized area Attack Space!
  • 10. Procedure of IMSI Catcher Firstly send a TAU reject, then cellphone will send Attach Request, with its IMSI!
  • 11. Procedure of DoS Attack Attach Reject message can bring reject cause. Some special causes result in NO service on cellphone.
  • 12. Procedure of Redirection Attack RRC Release message can bring the cell info which it can let cellphone re-direct to.
  • 13. How to Build Fake LTE Network • Computer + USRP
  • 14. How to Build Fake LTE Network • There are some popular open source LTE projects: • Open Air Interface by Eurecom • http://www.openairinterface.org/ • The most completed and open source LTE software • Support connecting cellphone to Internet • But have complicated software architecture • OpenLTE by Ben Wojtowicz • http://openlte.sourceforge.net/ • Haven’t achieved stable LTE data connection but functional enough for fake LTE network • Beautiful code architecture • More popular in security researchers OpenLTE
  • 15. OpenLTE Source Code (1/3) In current OpenLTE release, the TAU request isn’t handled. But TAU reject msg packing function is available. So we could add some codes to handle TAU case and give appropriate TAU reject cause.
  • 16. Procedure of IMSI Catcher Firstly send a TAU reject, then cellphone will send Attach Request, with its IMSI!
  • 17. OpenLTE Source Code (1/3) Set the mme procedure as TAU REQUET Call the TAU reject msg packing function Refer to Attach reject function
  • 18. OpenLTE Souce Code (2/3) DoS attack can directly utilize the cause setting in Attach Reject message.
  • 19. Procedure of DoS Attack Attach Reject message can bring reject cause. Some special causes result in NO service on cellphone.
  • 20. OpenLTE Source Code (3/3) redirectCarrierInfo can be inserted into RRC Connection Release message.
  • 22. Procedure of Redirection Attack RRC Release message can bring the cell info which it can let cellphone re-direct to.
  • 23. Think from the other side Attacker Defender Why is RRC redirection message not encrypted?
  • 24. Is This a New Problem? • "Security Vulnerabilities in the E-RRC Control Plane", 3GPP TSG-RAN WG2/RAN WG3/SA WG3 joint meeting, R3-060032, 9-13 January 2006 • This document introduced a ‘Forced handover’ attack: An attacker with the ability to generate RRC signaling—that is, any of the forms of compromise listed above—can initiate a reconfiguration procedure with the UE, directing it to a cell or network chosen by the attacker. This could function as a denial of service (if the target network cannot or will not offer the UE service) or to allow a chosen network to “capture” UEs. An attacker who already had full control of one system (perhaps due to weaker security on another RAT) could direct other systems’ UEs to “their” network as a prelude to more serious security attacks using the deeply compromised system. Used in this way, the ability to force a handover serves to expand any form of attack to UEs on otherwise secure systems, meaning that a single poorly secured network (in any RAT that interoperates with the E-UTRAN) becomes a point of vulnerability not only for itself but for all other networks in its coverage area.
  • 25. 3GPP’s Decision • “Reply LS on assumptions for security procedures”, 3GPP TSG SA WG3 meeting #45, S3-060833, 31st Oct - 3rd Nov 2006 (1) RRC Integrity and ciphering will be started only once during the attach procedure (i.e. after the AKA has been performed) and can not be de- activated later. (2) RRC Integrity and ciphering algorithm can only be changed in the case of the eNodeB handover.
  • 26. Why 3GPP Made Such Decision • In special cases, e.g. earthquake, hot events • Too many people try to access one base station then make this base station overloaded. • To let network load balanced, this base station can ask the new coming cellphone to redirect to another base station. • If you don’t tell cellphones which base station is light-loaded, the cellphones will blindly and inefficiently search one by one, and then increase the whole network load. Overloaded Base station Overloaded Base station Overloaded Base station Light-loaded Base station
  • 27. Network Availability vs.. Privacy • Global roaming • Battery energy saving • Load balance • IMSI Catcher • DoS Attack • Redirection Attack VS. Basic requirement High level requirement e.g. Wifi MAC addr tracking
  • 28. Countermeasures (1/2) • Cellphone manufacture – smart response • Scheme 1: Don’t follow the redirection command, but auto-search other available base station. • Scheme 2: Follow the redirection command, but raise an alert to cellphone user: Warning! You are downgraded to low security network.
  • 29. Countermeasures (2/2) • Standardization effort • Fix the weak security of legacy network: GSM • 3GPP TSG SA WG3 (Security) Meeting #83, S3-160702, 9-13 May 2016 Legacy Security Issues and Mitigation Proposals, Liaison Statement from GSMA. • Refuse one-way authentication • Disabling compromised encryption in mobile
  • 30. Acknowledgements • Huawei • Peter Wesley (Security expert) • GUO Yi (3GPP RAN standardization expert) • CHEN Jing (3GPP SA3 standardization expert) • Qualcomm • GE Renwei (security expert) • Apple • Apple product security team