Page 10 - Security testing for USSD and STK based Digital Financial Services applications Security, Infrastructure and Trust Working Group
P. 10

The  use  of  USSD  and  STK,  especially  for  DFS,  has   of the transactions. This document describes the
            raised security concerns on the inherent  risks and   various attack scenarios that can be used to exploit
            vulnerabilities associated with using the channels   the USSD and STK vulnerabilities and proposes best
            that attackers may use to compromise the confiden-  practices for the MNO's, DFS providers, and users.
            tiality, integrity, availability of services, and privacy


            2  MAIN COMPONENTS OF A USSD, STK DFS ECOSYSTEM

            There are many interaction points between different   ly the exploited stakeholders but others within the
            parties within the DFS ecosystem based on USSD     ecosystem.
            and STK. Consequently, there are also numerous       Table 2-1 shows the critical elements of a DFS eco-
            ways in which attackers can leverage these inter-  system based on USSD and STK, the threats and vul-
            faces to attack the system, with successful exploits   nerabilities at these points, and the proposed tests
            often having consequences that affect not mere-    and attack scenarios.

            Table 2‑1 Elements of a DFS ecosystem


             Components     USSD and STK related threats and vulnerabilities     Tests/attack scenarios
             Mobile device  •  Unauthorized access to the mobile device/theft.    •  Remote USSD execution
                            •  Tampering with the device to compromise the security of the
                              underlying platform, for example, installing malware and device
                              routing.
                            •  Physically tampering with mobile device by placing additional
                              hardware that can be used as spyware.
             SIM card       •  SIM swap and SIM recycling                         •  SIM testing using SIM tester.
                            •  Simjacker attacks                                  •  STK testing using SIM trace.
                            •  Weak algorithms used on SIM cards; for example, COMP128 v1  •  SIM clone tests.
                              and v2 algorithms used by the SIM and Authentication Center to  •  IMSI  and  IMEI  validation  test-
                              generate the initial Signed RES is known to have been broken.  ing.
             Base station   •  Man-in-the-middle attacks: GSM network encryption algorithms  •  Interception using a rogue BTS.
                              such as A5/1 and A5/2 have been demonstrated to be vulnerable.  •  Traffic tracing and capturing
                              Legacy networks relying on GSM encryption are subject to "man-  at mobile network operator
                              in-the-middle" attacks from rogue base stations that are placed   gateways and nodes like MSC,
                              by an attacker, maliciously claiming to be legitimate provider   USSD, SMSC.
                              towers (i.e., a fake base station, often called an "IMSI-catcher")
                            •  Replay attacks: Weak algorithms enable the attacker to decrypt
                              communication  before  re-sending it  into  the mobile  carrier's
                              network. Such a scheme can allow the attacker to gain full
                              access to all communicated information, including transaction
                              and financial data.
                            •  Eavesdropping: The secret key Kc generated using Ki and RAND
                              values using the A5 algorithm can be broken, and the signal
                              between  the MS  and  BSS is  susceptible  to  eavesdropping  on
                              financial transactions.
                            •  Denial of service: The RAND value sent to the MS during ini-
                              tial authentication can be attacked and modified by the intruder
                              causing Denial of Service to DFS.

















            8    Security testing for USSD and STK based Digital Financial Services applications
   5   6   7   8   9   10   11   12   13   14   15