SlideShare a Scribd company logo
This week has brought to light, yet another stealth attack focused on the Telecom
sector. This time it is a notorious hacking group - the LightBasin. As per a detailed
investigation report by cybersecurity firm CrowdStrike this group has been
infiltrating telecommunications companies worldwide in a campaign targeted at
intelligence gathering and cyber espionage.
Active since 2016, this group deployed advanced persistent threat (APT) techniques
to gain access and covertly monitor telecommunications networks around the
world. This group of sophisticated threat actors targeted telcos by establishing
implants across Linux and Solaris systems, which run a critical infrastructure for the
sector. They sagaciously used custom tools and "in-depth knowledge" of
telecommunication network architecture to compromise network and harvest
data.
LightBasin: A Synchronised,
Sophisticated APT attack
across a cluster of MNOs
MNO 1 MNO 2
THE IDEA OF ATTACK STEP 1
Connect to the internet via GTP
ISOLATED
GRX
PGW PGW
Compromised
eDNS
eDNS
Internet
Command
server
GTP Connection established
on behalf on some subscriber
Get tasks from command
server once per day
secgen.com
Initial attack vector & tools: to breach and gain access
As per the industry report, LightBasin activity was detected in a recent CrowdStrike
Services investigation exercise. The adversaries had used a combination of
techniques to gain access and compromise telecom data. Ranging from simple
methods like logging into systems using the standard credentials of equipment
vendors to more complex external DNS compromises were used.
Example of eDNS usage on 4G Roaming
eDNS
PGW1 PGWn
MNO
GTB Connection
established
GRX
DNS Query
DNS Response (PGW Address)
External DNS, or eDNS for short, are
crucia to the roaming service and
since that must be exposed to the
roaming interfaces (GRX).
The hackers got initial network access via the DNS servers, which are part of the GPRS
(General Packet Radio Service) network. The attackers used very weak and default
passwords as part of the initial compromise. Then via compromised external DNS
servers of a telco, the hackers covertly connected to other compromised telcos
through their General Packet Radio Service (GPRS) networks. Upon establishing their
malware on a system – the hackers concealed their traffic within GPRS connections
via SSH. This technique helped the group operate stealthily and spread laterally without
being detected by the security monitoring tools.
secgen.com
Attacker get access to some eDNS server in isolated GRX network. Deploys implant with
backdoor functionality. This backdoor connects to the internet on behalf of mobile
subscriber using GTP protocol via PGW, then connects to command server and set up
reverse shell for 30 min per day.
Using this time window, malefactor can upload additional malic
ious software and set up schedule for attacks.
 
THE IDEA OF ATTACK STEP 2
Get tasks, download malicious software, etc
ISOLATED
GRX
PGW PGW
Compromised
eDNS
eDNS
Compromised eDNS can attack any node in GRX network, even while
not being connected to the internet
MNO 1 MNO 2
THE IDEA OF ATTACK STEP 3
Execute attack in isolated telecom network - GRX
Internet
PGW PGW
Compromised
eDNS eDNS
Receive tasks
Internet
Command
server
Close connections
to the internet
ISOLATED
GRX
Execute attacks in
isolated network
secgen.com
A few days back, Symantec had reported a previously unseen advanced persistent
threat (APT) group dubbed Harvester, which was linked to an information-stealing
campaign aimed at telecommunications, government, and information technology
sectors within South Asia. Here the hackers which were active since June 2021 had
used a custom implant called Graphon And now, the LightBasin attack. These series
of compromises and stealth attacks demonstrate how the telecom sector has
become a preferred target of malicious actors. In the coming times, with the adoption
of 5G technologies and the ensuing complex and interconnected ecosystems MNOs
will become even more vulnerable to security breaches. A Security-by-design
framework needs to be established to protect the core network and the connected
systems of MNOs.
Security: A crucial enabler for telecom operations
1. Implement Host/Function security (because not using default password is a
fundamental security requirement)– use firm password policy
2. Protect GRX network using edge FW and setting up adequate rules:
• No other protocols than required (GTP, DNS) should be allowed in any direction
• DNS servers shouldn't be a source of GTP data
• IP Whitelisting would be also recommended
3. Make an inventory of equipment accessible from the GRX network. Sometimes
some interfaces and even entire network segments are accessible from the GRX
network, which shouldn't be there
4. With inventory in place, make sure those assets are on the vulnerability
management program, have change control and routine integrity check
procedures and, if available, externalize management interventions to a SIEM
.
Security practices to protect the MNO environment
secgen.com
UK | Italy | Czech Republic | Brazil | Mexico
India | South Korea | Japan | Malaysia | UAE
Email: contact@secgen.com
Website: www.secgen.com
Founded in 2022, SecurityGen is a global
start-up focused on telecom security.
We deliver a solid security foundation to
drive secure telecom digital
transformations and ensure next-gen
enterprise intelligent connectivity.
About SecurityGen Connect With Us
SecurityGen provides a set of Security Assessments to assure your network
is protected from GRX attacks. These security services range from Interconnection
Security to the NFVi that hosts most of interconnection services nowadays.
We also provide Next Generation Firewalls and IDS for Signaling protocols SS7,
Diameter and GTP.
5. Implement GTP IDS (to have full visibility of your network and prevent attacks
through the GRX layer)
6. Consider GRX as a border, rather than a friendly interface between MNOs, and
proceed with securing also SS7 and Diameter

More Related Content

PDF
Network Security Roadmap have some perception of provided security
PDF
Unlock the Future: SecurityGen's 5G Standalone Solutions
PDF
Security Gen Ensures Robust Telecom Security with Comprehensive Assessments
PDF
Enhance Your Network Security with NGFW Firewall Solutions by SecurityGen
PPTX
5G mission diary: Houston, we have a problem
PDF
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
PDF
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
PDF
Unleashing the Power of Telecom Network Security.pdf
Network Security Roadmap have some perception of provided security
Unlock the Future: SecurityGen's 5G Standalone Solutions
Security Gen Ensures Robust Telecom Security with Comprehensive Assessments
Enhance Your Network Security with NGFW Firewall Solutions by SecurityGen
5G mission diary: Houston, we have a problem
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Unleashing the Power of Telecom Network Security.pdf

Similar to Unraveling GTP: Threads of Efficient Communication (20)

PDF
Strengthening Your Network Against Future Incidents with SecurityGen
PDF
NGFW - An Updated Overview
PDF
Elevating Network Security through NGFW Firewalls.pdf
PDF
Chrono Defend: Time-Traveling Safeguards through NGFW Firewall Innovation
PPTX
Ad hoc secuirty-vemula
PPTX
5691 computer network career
PDF
Navigating the Unseen Risks: Exploring 5G Vulnerabilities
PDF
Unveiling SecurityGen's Advanced 5G Security Services
PDF
Address 5G Vulnerabilities with SecurityGen's Expert Solution
PDF
Wireless Network Security_ A Modern Imperative for Digital Safety.pdf
PDF
SecurityGen's Signalling Security: A Shield for Uninterrupted Connectivity
PDF
Proactive Signalling Network Security with SecurityGen
PDF
Understanding SS7 Attacks and Their Implications.pdf
PDF
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
PDF
PDF
wns-unit-1-i-need-a-notes-that-has-to-be-useful-for-preparing-my-sem-examinat...
PDF
ClubHack Magazine issue 26 March 2012
PDF
Protocols for Wireless Sensor Networks and Its Security
PDF
Comprehensive survey of possible
PDF
Whitepaper - Software Defined Networking for the Telco Industry
Strengthening Your Network Against Future Incidents with SecurityGen
NGFW - An Updated Overview
Elevating Network Security through NGFW Firewalls.pdf
Chrono Defend: Time-Traveling Safeguards through NGFW Firewall Innovation
Ad hoc secuirty-vemula
5691 computer network career
Navigating the Unseen Risks: Exploring 5G Vulnerabilities
Unveiling SecurityGen's Advanced 5G Security Services
Address 5G Vulnerabilities with SecurityGen's Expert Solution
Wireless Network Security_ A Modern Imperative for Digital Safety.pdf
SecurityGen's Signalling Security: A Shield for Uninterrupted Connectivity
Proactive Signalling Network Security with SecurityGen
Understanding SS7 Attacks and Their Implications.pdf
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
wns-unit-1-i-need-a-notes-that-has-to-be-useful-for-preparing-my-sem-examinat...
ClubHack Magazine issue 26 March 2012
Protocols for Wireless Sensor Networks and Its Security
Comprehensive survey of possible
Whitepaper - Software Defined Networking for the Telco Industry
Ad

More from SecurityGen1 (20)

PDF
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
PDF
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity Solutions
PDF
SecurityGen's IDS/IPS Solutions for Proactive Threat Management
PDF
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
PDF
Unleashing SecurityGen's Intelligent Intrusion Detection System.pdf
PDF
Unleashing the Power of Breach and Attack Simulation with SecurityGen
PDF
SecurityGen's Pioneering Approach to 5G Security Services
PDF
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
PDF
Secure Your Network with Confidence Understanding - GTP Protocols by Security...
PDF
Empowering Telecom Resilience - SecurityGen's GSMA SS7 Security Unveiled.pdf
PDF
Elevate Safety with Security Gen: Unraveling the Power of Signaling Security
PDF
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
PDF
Mastering GTP Protocols: Your Roadmap to Success
PDF
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
PDF
SecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdf
PDF
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
PDF
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
PDF
Fortifying Telecom Networks: Exploring GSMA SS7 Security
PDF
Protecting Your Text Messages: SecurityGen's SMS Fraud Detection Solutions
PDF
A Deep Dive into the Anatomy of a Network Incident.pdf
Understanding the Risks: Exploring 5G Vulnerabilities with SecurityGen
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity Solutions
SecurityGen's IDS/IPS Solutions for Proactive Threat Management
Empower Your Defense: SecurityGen's Comprehensive Approach to DDoS Attack Pre...
Unleashing SecurityGen's Intelligent Intrusion Detection System.pdf
Unleashing the Power of Breach and Attack Simulation with SecurityGen
SecurityGen's Pioneering Approach to 5G Security Services
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
Secure Your Network with Confidence Understanding - GTP Protocols by Security...
Empowering Telecom Resilience - SecurityGen's GSMA SS7 Security Unveiled.pdf
Elevate Safety with Security Gen: Unraveling the Power of Signaling Security
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
Mastering GTP Protocols: Your Roadmap to Success
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
SecurityGen Sentinel - Your User-Friendly Guardian in Telecom Security.pdf
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
Guardians of Cybersecurity: A Deep Dive into IDS, IPS, and Firewall
Fortifying Telecom Networks: Exploring GSMA SS7 Security
Protecting Your Text Messages: SecurityGen's SMS Fraud Detection Solutions
A Deep Dive into the Anatomy of a Network Incident.pdf
Ad

Recently uploaded (20)

PPT
340036916-American-Literature-Literary-Period-Overview.ppt
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PDF
Reconciliation AND MEMORANDUM RECONCILATION
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
PPTX
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
PPT
Data mining for business intelligence ch04 sharda
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
PDF
Nidhal Samdaie CV - International Business Consultant
PPTX
HR Introduction Slide (1).pptx on hr intro
PDF
Types of control:Qualitative vs Quantitative
PDF
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PDF
MSPs in 10 Words - Created by US MSP Network
PDF
How to Get Funding for Your Trucking Business
PDF
Unit 1 Cost Accounting - Cost sheet
PDF
WRN_Investor_Presentation_August 2025.pdf
PDF
How to Get Business Funding for Small Business Fast
PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PDF
A Brief Introduction About Julia Allison
PDF
Chapter 5_Foreign Exchange Market in .pdf
340036916-American-Literature-Literary-Period-Overview.ppt
Belch_12e_PPT_Ch18_Accessible_university.pptx
Reconciliation AND MEMORANDUM RECONCILATION
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
Data mining for business intelligence ch04 sharda
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
Nidhal Samdaie CV - International Business Consultant
HR Introduction Slide (1).pptx on hr intro
Types of control:Qualitative vs Quantitative
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
Ôn tập tiếng anh trong kinh doanh nâng cao
MSPs in 10 Words - Created by US MSP Network
How to Get Funding for Your Trucking Business
Unit 1 Cost Accounting - Cost sheet
WRN_Investor_Presentation_August 2025.pdf
How to Get Business Funding for Small Business Fast
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
A Brief Introduction About Julia Allison
Chapter 5_Foreign Exchange Market in .pdf

Unraveling GTP: Threads of Efficient Communication

  • 1. This week has brought to light, yet another stealth attack focused on the Telecom sector. This time it is a notorious hacking group - the LightBasin. As per a detailed investigation report by cybersecurity firm CrowdStrike this group has been infiltrating telecommunications companies worldwide in a campaign targeted at intelligence gathering and cyber espionage. Active since 2016, this group deployed advanced persistent threat (APT) techniques to gain access and covertly monitor telecommunications networks around the world. This group of sophisticated threat actors targeted telcos by establishing implants across Linux and Solaris systems, which run a critical infrastructure for the sector. They sagaciously used custom tools and "in-depth knowledge" of telecommunication network architecture to compromise network and harvest data. LightBasin: A Synchronised, Sophisticated APT attack across a cluster of MNOs
  • 2. MNO 1 MNO 2 THE IDEA OF ATTACK STEP 1 Connect to the internet via GTP ISOLATED GRX PGW PGW Compromised eDNS eDNS Internet Command server GTP Connection established on behalf on some subscriber Get tasks from command server once per day secgen.com Initial attack vector & tools: to breach and gain access As per the industry report, LightBasin activity was detected in a recent CrowdStrike Services investigation exercise. The adversaries had used a combination of techniques to gain access and compromise telecom data. Ranging from simple methods like logging into systems using the standard credentials of equipment vendors to more complex external DNS compromises were used. Example of eDNS usage on 4G Roaming eDNS PGW1 PGWn MNO GTB Connection established GRX DNS Query DNS Response (PGW Address) External DNS, or eDNS for short, are crucia to the roaming service and since that must be exposed to the roaming interfaces (GRX). The hackers got initial network access via the DNS servers, which are part of the GPRS (General Packet Radio Service) network. The attackers used very weak and default passwords as part of the initial compromise. Then via compromised external DNS servers of a telco, the hackers covertly connected to other compromised telcos through their General Packet Radio Service (GPRS) networks. Upon establishing their malware on a system – the hackers concealed their traffic within GPRS connections via SSH. This technique helped the group operate stealthily and spread laterally without being detected by the security monitoring tools.
  • 3. secgen.com Attacker get access to some eDNS server in isolated GRX network. Deploys implant with backdoor functionality. This backdoor connects to the internet on behalf of mobile subscriber using GTP protocol via PGW, then connects to command server and set up reverse shell for 30 min per day. Using this time window, malefactor can upload additional malic ious software and set up schedule for attacks. THE IDEA OF ATTACK STEP 2 Get tasks, download malicious software, etc ISOLATED GRX PGW PGW Compromised eDNS eDNS Compromised eDNS can attack any node in GRX network, even while not being connected to the internet MNO 1 MNO 2 THE IDEA OF ATTACK STEP 3 Execute attack in isolated telecom network - GRX Internet PGW PGW Compromised eDNS eDNS Receive tasks Internet Command server Close connections to the internet ISOLATED GRX Execute attacks in isolated network
  • 4. secgen.com A few days back, Symantec had reported a previously unseen advanced persistent threat (APT) group dubbed Harvester, which was linked to an information-stealing campaign aimed at telecommunications, government, and information technology sectors within South Asia. Here the hackers which were active since June 2021 had used a custom implant called Graphon And now, the LightBasin attack. These series of compromises and stealth attacks demonstrate how the telecom sector has become a preferred target of malicious actors. In the coming times, with the adoption of 5G technologies and the ensuing complex and interconnected ecosystems MNOs will become even more vulnerable to security breaches. A Security-by-design framework needs to be established to protect the core network and the connected systems of MNOs. Security: A crucial enabler for telecom operations 1. Implement Host/Function security (because not using default password is a fundamental security requirement)– use firm password policy 2. Protect GRX network using edge FW and setting up adequate rules: • No other protocols than required (GTP, DNS) should be allowed in any direction • DNS servers shouldn't be a source of GTP data • IP Whitelisting would be also recommended 3. Make an inventory of equipment accessible from the GRX network. Sometimes some interfaces and even entire network segments are accessible from the GRX network, which shouldn't be there 4. With inventory in place, make sure those assets are on the vulnerability management program, have change control and routine integrity check procedures and, if available, externalize management interventions to a SIEM . Security practices to protect the MNO environment
  • 5. secgen.com UK | Italy | Czech Republic | Brazil | Mexico India | South Korea | Japan | Malaysia | UAE Email: contact@secgen.com Website: www.secgen.com Founded in 2022, SecurityGen is a global start-up focused on telecom security. We deliver a solid security foundation to drive secure telecom digital transformations and ensure next-gen enterprise intelligent connectivity. About SecurityGen Connect With Us SecurityGen provides a set of Security Assessments to assure your network is protected from GRX attacks. These security services range from Interconnection Security to the NFVi that hosts most of interconnection services nowadays. We also provide Next Generation Firewalls and IDS for Signaling protocols SS7, Diameter and GTP. 5. Implement GTP IDS (to have full visibility of your network and prevent attacks through the GRX layer) 6. Consider GRX as a border, rather than a friendly interface between MNOs, and proceed with securing also SS7 and Diameter