Mobile Network Operator Infrastructure Security Solution
Mobile Network Operator Infrastructure Security Solution
GTP-U
UDP
IP GTP-C GTP-U
UDP UDP GTP-C
IP IP UDP
IP
Signaling
User Data
MME PCRF
• Mobile
• IoT Devices S1-MME
• PC S11 Gx
Uu
UE eNB SGW PGW Internet
S1-U S5 SGi
HTTP HTTP HTTP HTTP
TCP TCP TCP TCP
IP IP IP IP
GTP-U GTP-U
UDP UDP
IP IP
malware
Exploit
S6a IPX S9
S8
Uu
UE eNB SGW PGW Internet
S1-U S5 SGi
S1-MME S11 Gx
VPLMN MME HSS PCRF
S6a
5 | © 2018, Palo Alto Networks. All Rights Reserved.
Agenda:
• LTE Architecture 101
• Security Challenges for MNO
• MNO Security Solutions
• Call to action
Security Activity among TelCo Operators
https://www.enisa.europa.eu/publications/signalling-security-in-telecom-ss7-diameter-5g
Total 103 CSP and The largest CSP (Carrier Service Provider)
sample was from the U.S. (48%), followed by Asia Pacific
(19%), Central/Eastern Europe (15%), Western Europe (7%),
Canada (6%), Central/South America (4%), and Africa (1%).
MEC cloud
content inspection to
gain insight into attacks Roaming
5G NR RAN
~2.3X
50%
Rise in Service Disruption
Due to Signaling Attacks from 2014 87%
40%
Signaling security between inter-
30%
operator networks (Roaming) will be
20% crucial in 5G
10%
0%
Less than 1 - 2 times 3 - 5 times More than
once per per month per month 10 tim e per
month month
2014 2019
3X
increase in malware targeting
59%
signaling-level disruptions once
101%
year-over-year growth in
IoT/mobile devices1 or more per month2 malicious android files3
Smokescreen attack,
Blackmail,
… … …
other motivation …
(Stage 2 and 4) (Stage 3)
C2 communication Download
Bots with C&C servers (Stage 1) DISCOVERY Malware/Payload
DDoS Scanning for vulnerable devices to device
Victim
V
B B V
V
B B V
… …
Bots IoT Devices
( Stage5) DDoS Attack from IoT devices
Infected IoT devices turn into new bots
13
scanning
How Attack Lifecycle Works and Impact to Mobile Network Infrastructure
Botnet
Infrastructure
Attacker
EVOLVED
PACKET CORE
eNodeB
X
vMME
X
vHSS
Connected Things
UE Attach Request
Update Location Request/
Response
UE Attach Request
Update Location Request/
Response
UE Attach Request.
. Update Location Request/
Response
.
15 | © 2018, Palo Alto Networks, Inc. Confidential and Proprietary. Internal Use Only .
Today’s Mobile Network Security Architecture
Stopping attacks from
the outside
All-IP 4G/5G Networks
(S)Gi
Interfaces
Radio Network
Mobile Users Interfaces Internet
(RAN) Mobile
Service Provider
Handsets/Tablets
Networks
Roaming
Interfaces
Roaming
IoT Devices WiFi Networks
(Trusted/Untrusted)
Industrial IoT
CGNAT ≠ Security
IPSec ≠ Security
WiFi Networks Layer 4 protection ≠ Security
1 2 3
L3/L4 Firewall Disparate systems and lack of coordinations Perimeter Security
(S)Gi
Interfaces
Radio Network
Mobile Users Interfaces Internet Application-Oriented
(RAN) Mobile
Threat Vectors
Service Provider
Networks
Signaling-Oriented
Roaming Threat Vectors
Interfaces
Signaling Oriented
Threat Vectors Roaming
IoT Devices WiFi Networks
WiFi Networks
1 2 3
Advanced threats & infected devices are Legacy, manual, & fragmented security Security gap is widening with complex and
evading & impacting mobile networks mechanisms are not able to keep up non-adaptable security architectures
Signaling-Oriented
Exfiltrate Sensitive Network Info (IMSI, Location, etc) Roaming Threat Vectors
Interfaces
Signaling Oriented
Threat Vectors Roaming
IoT Devices WiFi Networks
WiFi Networks
1 2 3
Advanced threats & infected devices are Legacy, manual, & fragmented security Security gap is widening with complex and
evading & impacting mobile networks mechanisms are not able to keep up non-adaptable security architectures
Example:
https://motherboard.vice.com/en_us/article/mbzvxv/criminals-hackers-ss7-uk-banks-metro-bank
19
Agenda:
• LTE Architecture 101
• Security Challenges for MNO
• MNO Security Solutions
• Call to action
Palo Alto Networks Security Framework
HSS PCRF
RAN Security
S6a
S6a
S6a IMS
MME Gx
S8 S8
HSS PCRF
S6a
S6a
S6a IMS
MME Gx
S1-MME
S11 S9 SGi
Mobile Users
S1-U S5
SGW PGW PDN /
Internet
S8 S8
S2b
Some Key Features –IoT Devices
S2a ePDG
MME
GTP-C (S11) and GTP-U (S1-U) Tunnels
S1-MME
S11
Mobile Users
S1-U
SGW PGW PDN / Internet
IoT Devices GTP monitoring and enforcement GTPv2-C, GTPv1-C and GTP-U protocol stateful
inspection
Protection against GTP attacks, vulnerabilities floods, IoT based DoS GTPv2-C, GTPv1-C and GTP-U protocol validations
and reconnaissance attempts
Reduce attack surface IMSI, IMSI-prefix, RAT filtering
Real-time IMSI, IMEI and IP correlation GTP-C and GTP-U inspection and correlations
Visibility into GTP-U tunnel per end user device GTP-U tunnel inspection and correlation with GTP-C
Handset and IoT protection Protection from malware, exploits, spyware, virus. Prevent
C2 traffic and overbilling detection
24 | © 2018, Palo Alto Networks. All Rights Reserved.
Roaming Security
Requirement
Home PLMN Protection against GTP attacks, vulnerabilities floods, IoT based DoS
and reconnaissance attempts
GTP monitoring and enforcement
PGW HSS EIR H-PCRF SS7
Reduce attack surface
S8 S6a S13 S9 SIGTRAN Real-time IMSI, IMEI and IP correlation
eNodeB
Safe Networking S6a S6a
Security Platform Gx S9
MME
X2 S1-MME
S11 GGSN / P-GW SGi
S6a
S5
S1-U Gi/SGi
RAN
Security Platform S-GW Gi/SGi
S8 Gp/S8
Security Platform
eNodeB
EPC
BH Roaming Security Platform
IPX/GRX
Note: Not all 3G and 4G interfaces are shown
GTP/SCTP Attack
Disclosure of Subscriber Sensitive Information
S11 via MME Gn
DNS
S10 Malicious GTP message mitigation
inside 1 rule
§ GTP Message Type Filters per Policy Rule
§ Selected message types and req<>resp direction
§ Only external messages from external interfaces
TEID guessing
Malicious DIAMETER message mitigation
GTP context request (needs GUTI)
send GTP-U and increment TEID
wrong TEID should send back error
send “context request S10” [130/131] § All remote DIAMETER nodes defined in Policy
if GUTI known will return IMSI
correct TEID should inject data can be used to focus other attacks § IP:PORT (Service Object/Group)
As scanning attempt not useful: § SCTP association stateful inspection
wrong TEID WILL NOT result in error
GTP context request (needs P-TMSI)
because wrong TEID PDU is discarded § DIAMETER protocol sanity check
send “SGSN context request” [50]
if (T)IMSI known will return crypto keys
§ DIAMETER Application ID match SCTP + MSG context
can be used to decrypt traffic/recording § Command Code + used AVPs match MSG context
inside 1 rule
SGW GGSN MME
§ IP:PORT (Service Object/Group)
§ GTP Protocol version
eNodeB
Safe Networking S6a S6a
Security Platform Gx S9
MME
X2 S1-MME
S11 GGSN / P-GW SGi
S6a
S5
S1-U Gi/SGi
RAN
Security Platform S-GW Gi/SGi
S8 Gp/S8
Security Platform
eNodeB
EPC
BH Roaming Security Platform
IPX/GRX
Note: Not all 3G and 4G interfaces are shown
… but how can anyone access the GRX/IPX network …?
Aftermath of the Belgacom / BICS incident … and the question what/who else is connected to GRX/IPX
S-GW P-GW
Home BH
PLMN
GRX/ IPX
Malicious
Network Node
S-GW P-GW
Home BH
PLMN
GRX/ IPX
Malicious
Network Node
Home BH
PLMN
Attach Request
Infected
Subscribers
1 Malicious
GRX/ IPX Network Node
1
Roaming Partner 1 Roaming Partner 2
HSS
OCS
PDN-GW
MMEContext Request Flood
Create PDP
EPC
H-PCRF
X
PDN-GW
Gi/SGi
Create PDP Context Request Flood PDN-GW L4 FW
34 | © 2018, Palo Alto Networks, Inc. Confidential and Proprietary. Internal Use Only
Use Case #3:
Securing GTP-U & Consequences of UEs Malware Penetration (S1-U, S8)
IMS
OSS OCS
DNS HSS PCRF
OFCS
eNodeB
Safe Networking S6a S6a
Security Platform Gx S9
MME
X2 S1-MME
S11 GGSN / P-GW SGi
S6a
S5
S1-U Gi/SGi
RAN
Security Platform S-GW Gi/SGi
S8 Gp/S8
Security Platform
eNodeB
EPC
BH Roaming Security Platform
IPX/GRX
Note: Not all 3G and 4G interfaces are shown
PACKET RELAYING (E.G. GTP-IN-GTP) GTP Attack
A
EPC Malicious Server
Malicious IP: 6.6.6.6
Subscriber Listens on port 1500
P-GW SGI FW NAT
GTP-U Tunnel of Subscriber A
BH
GTP-U Tunnel of Subscriber B
Lost Revenue /
Network Congestion
1. User install & configure APP 2. Operator DNS “not authoritative” 3. DNS server for .z84.in (example)
§ APP acts like VPN client § Forward “query” to authoritative server § Open DNS query
§ Encapsulate all traffic into DNS § This “query” passes FW § Unveil VPN packet from TXT record
§ Additional VPN “inside” DNS § This “query” normally bypasses Charging (obscure data payload/protocol)
§ Operator sees “regular DNS query” § Forward to “DNS-VPN” endpoint
40
5G-Ready NGFW Positioning for Mobile Network Operators
4G
LTE Mobile / IoT
Virtualized 5G core
5G Cellular IoT
NR Edge cloud
Advanced Security across the RAN, Roaming, EPC, Signaling, NB-IoT security
s Lower S9
Roaming Security Layers
HPMN Platform
VPMN
vPCRF
eNodeB ME Gx
S 1 -M S11
vSGSN/vMME
X2 S5
S1-U Gi/SGi
vS-GW vGGSN/vP-GW
eNodeB HSS
V-EPC
V-BH
Note: Not all 3G and 4G interfaces are shown
Seamless Assessment RAN/EPC Security - Tap
DIAMETER
SCTP
IP
Lower
Layers
RAN S6a
Security Platform HSS
eNodeB S1AP
SCTP
IP
Lower
Layers
X2 S1-MME
GGSN / P-GW
EPC Border Router,
S11 MME
could act as SecGW Gi/SGi
eNodeB
GTPv2-C
UDP S1-U S5
GTP-U
BH
IP
UDP S-GW MNO EPC
Lower IP
Layers
Lower
Layers