SlideShare a Scribd company logo
7
Most read
10
Most read
11
Most read
Detecting Cell-Site
Simulators
Bozhidar Bozhanov
About me
● Software engineer
● Minister of electronic governance of Bulgaria (2021-2022)
● Member of Bulgarian parliament
● https://techblog.bozho.net
● X: @bozhobg
Disclaimer
● No classified information in these slides
● I’ve obtained no information present in these slides just because I’m a
member of parliament
● The slides are entirely with my “expert hat” on
Interception
Methods for (legal) interception
● Interception interfaces (directly streaming calls and sms from telecoms)
● Spyware (Pegasus, Predator)
● Cell-site simulators, stingrays, IMSI-catchers
● Other SS7 vulnerabilities
Rumours
● Private interception companies use some of these technologies
● These technologies are used to wiretap activists, journalists and
opposition politicians
● Key leaks for 3G+ authentication
Cell-site simulators
Source: EFF
Wiretap Detector - detecting cell-site simulators
Wiretap Detector - detecting cell-site simulators
How does it work?
● Not much public information; whistleblowers and rumours
● Mobiles devices connect to the strongest signal
● No mandatory cell tower authentication
● 2G-downgrade
● Session key leaks through rouming (3G, 4G)
● Passive IMSI catchers (not actual fake towers)
● Active (fake towers)
How to protect ourselves?
● We can’t
● Stop 2G support on your phone (some phones support this)
● Detecting interception:
○ EFF Crocodile hunter (requires specialized hardware)
○ Android IMSI Catcher Detector (requires root, not present in the play store)
○ SnoopSnitch (requires root)
○ Wiretap Detector (https://github.com/Glamdring/wiretap-detector)
Wiretap Detector
● Mobile application with no root permission requited
● Built by volunteers, open source
● No guarantees for successful detection
● The app solves only the cell-site simulator approach (and doesn’t detect
spywhare, interception interfaces, etc.)
Detection methods
● Compares public IP with the announced IP ranges of the telecom
○ Gets ASN based on the initial IP
○ https://ip.guide (RIPE)
○ Countermeasure that could be used: the simulator can route requests to the right
telecom (if it supports multi-SIM)
● Detecting changes on the first 2 hops of traceroute
○ Countermeasure: removing the first hop(s)
● Detecting changes in the combinnation of (geocoordinates, cell identifier
● Countermeasures: Spoofing all cell IDs
● Countermeasures are possible, but they complicate things and may not
be implemented (yet) by cell-site simulators
TODO list
● Deploy on iOS
● Compare more cell details
● Compare with public cell databases
● Detecting attacks using fake roaming
● Centralized database with detections
Using Signal, Threema, Wire, etc.
increases privacy guarantees
Everyone is welcome to help
develop the project further
Thank you

More Related Content

PPTX
Catching IMSI Catchers
PPTX
Catching imsi catchers
PDF
2015.11.06. Luca Melette_Mobile threats evolution
PDF
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
PDF
Exploring LTE security and protocol exploits with open source software and lo...
PDF
Troopers NGI 2019 - Modmobtools and tricks
PPTX
Introduction to Mobile Forensics Part 1.pptx
PDF
Philippe Langlois - 3G and LTE insecurity from the radio to the core network ...
Catching IMSI Catchers
Catching imsi catchers
2015.11.06. Luca Melette_Mobile threats evolution
LTE protocol exploits – IMSI catchers, blocking devices and location leaks - ...
Exploring LTE security and protocol exploits with open source software and lo...
Troopers NGI 2019 - Modmobtools and tricks
Introduction to Mobile Forensics Part 1.pptx
Philippe Langlois - 3G and LTE insecurity from the radio to the core network ...

Similar to Wiretap Detector - detecting cell-site simulators (20)

PDF
Telecom security from ss7 to all ip all-open-v3-zeronights
PPTX
Wiretapping presentation and security.pptx
PDF
Luiz eduardo. introduction to mobile snitch
PPTX
PPTX
Cybersecurity Risks In the Mobile Environment
PDF
Defcon 22-robert-rowley-detecting-defending-against-surveill
PDF
SenseDroid
PDF
eu-19-Yazdanmehr-Mobile-Network-Hacking-IP-Edition-2.pdf
PDF
D2T2 - Bye Bye IMSI Catchers - Security Enhancements in 5g - Lin Huang.pdf
PDF
Over the Air 2011 Security Workshop
PDF
A million little tracking devices - Don Bailey
PPTX
128-ch2.pptx
PDF
iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
PDF
Hack.lu 2016 - 2G and 3G intercom hacking
PPTX
ANDROID SECURITY
PDF
D1 t1 t. yunusov k. nesterov - bootkit via sms
PDF
Cyber Security: Stalking Prey: An RF Hackers Perspective
PPTX
Hidden Active Cell Phone Detectorv
PDF
Info security - mobile approach
PPT
4471_mobile_device_security_handout.ppt
Telecom security from ss7 to all ip all-open-v3-zeronights
Wiretapping presentation and security.pptx
Luiz eduardo. introduction to mobile snitch
Cybersecurity Risks In the Mobile Environment
Defcon 22-robert-rowley-detecting-defending-against-surveill
SenseDroid
eu-19-Yazdanmehr-Mobile-Network-Hacking-IP-Edition-2.pdf
D2T2 - Bye Bye IMSI Catchers - Security Enhancements in 5g - Lin Huang.pdf
Over the Air 2011 Security Workshop
A million little tracking devices - Don Bailey
128-ch2.pptx
iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
Hack.lu 2016 - 2G and 3G intercom hacking
ANDROID SECURITY
D1 t1 t. yunusov k. nesterov - bootkit via sms
Cyber Security: Stalking Prey: An RF Hackers Perspective
Hidden Active Cell Phone Detectorv
Info security - mobile approach
4471_mobile_device_security_handout.ppt
Ad

More from Bozhidar Bozhanov (20)

PPTX
Откриване на фалшиви клетки за подслушване
PPTX
Антикорупционен софтуер
PDF
Nothing is secure.pdf
PPTX
Elasticsearch - Scalability and Multitenancy
PPTX
Encryption in the enterprise
PPTX
Blockchain overview - types, use-cases, security and usabilty
PPTX
Електронна държава
PPTX
Blockchain - what is it good for?
PPTX
Algorithmic and technological transparency
PPTX
Scaling horizontally on AWS
PDF
Alternatives for copyright protection online
PPTX
GDPR for developers
PPTX
Политики, основани на данни
PDF
Отворено законодателство
PPTX
Overview of Message Queues
PPTX
Electronic governance steps in the right direction?
PPTX
Сигурност на електронното управление
PPTX
Opensource government
PDF
Биометрична идентификация
PDF
Biometric identification
Откриване на фалшиви клетки за подслушване
Антикорупционен софтуер
Nothing is secure.pdf
Elasticsearch - Scalability and Multitenancy
Encryption in the enterprise
Blockchain overview - types, use-cases, security and usabilty
Електронна държава
Blockchain - what is it good for?
Algorithmic and technological transparency
Scaling horizontally on AWS
Alternatives for copyright protection online
GDPR for developers
Политики, основани на данни
Отворено законодателство
Overview of Message Queues
Electronic governance steps in the right direction?
Сигурност на електронното управление
Opensource government
Биометрична идентификация
Biometric identification
Ad

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
cuic standard and advanced reporting.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
KodekX | Application Modernization Development
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Empathic Computing: Creating Shared Understanding
Understanding_Digital_Forensics_Presentation.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
The AUB Centre for AI in Media Proposal.docx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Reach Out and Touch Someone: Haptics and Empathic Computing
cuic standard and advanced reporting.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Electronic commerce courselecture one. Pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Review of recent advances in non-invasive hemoglobin estimation
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
“AI and Expert System Decision Support & Business Intelligence Systems”
KodekX | Application Modernization Development
Diabetes mellitus diagnosis method based random forest with bat algorithm
Spectral efficient network and resource selection model in 5G networks
Bridging biosciences and deep learning for revolutionary discoveries: a compr...

Wiretap Detector - detecting cell-site simulators

  • 2. About me ● Software engineer ● Minister of electronic governance of Bulgaria (2021-2022) ● Member of Bulgarian parliament ● https://techblog.bozho.net ● X: @bozhobg
  • 3. Disclaimer ● No classified information in these slides ● I’ve obtained no information present in these slides just because I’m a member of parliament ● The slides are entirely with my “expert hat” on
  • 5. Methods for (legal) interception ● Interception interfaces (directly streaming calls and sms from telecoms) ● Spyware (Pegasus, Predator) ● Cell-site simulators, stingrays, IMSI-catchers ● Other SS7 vulnerabilities
  • 6. Rumours ● Private interception companies use some of these technologies ● These technologies are used to wiretap activists, journalists and opposition politicians ● Key leaks for 3G+ authentication
  • 10. How does it work? ● Not much public information; whistleblowers and rumours ● Mobiles devices connect to the strongest signal ● No mandatory cell tower authentication ● 2G-downgrade ● Session key leaks through rouming (3G, 4G) ● Passive IMSI catchers (not actual fake towers) ● Active (fake towers)
  • 11. How to protect ourselves? ● We can’t ● Stop 2G support on your phone (some phones support this) ● Detecting interception: ○ EFF Crocodile hunter (requires specialized hardware) ○ Android IMSI Catcher Detector (requires root, not present in the play store) ○ SnoopSnitch (requires root) ○ Wiretap Detector (https://github.com/Glamdring/wiretap-detector)
  • 12. Wiretap Detector ● Mobile application with no root permission requited ● Built by volunteers, open source ● No guarantees for successful detection ● The app solves only the cell-site simulator approach (and doesn’t detect spywhare, interception interfaces, etc.)
  • 13. Detection methods ● Compares public IP with the announced IP ranges of the telecom ○ Gets ASN based on the initial IP ○ https://ip.guide (RIPE) ○ Countermeasure that could be used: the simulator can route requests to the right telecom (if it supports multi-SIM) ● Detecting changes on the first 2 hops of traceroute ○ Countermeasure: removing the first hop(s) ● Detecting changes in the combinnation of (geocoordinates, cell identifier ● Countermeasures: Spoofing all cell IDs ● Countermeasures are possible, but they complicate things and may not be implemented (yet) by cell-site simulators
  • 14. TODO list ● Deploy on iOS ● Compare more cell details ● Compare with public cell databases ● Detecting attacks using fake roaming ● Centralized database with detections
  • 15. Using Signal, Threema, Wire, etc. increases privacy guarantees
  • 16. Everyone is welcome to help develop the project further