Page 22 - Security testing for USSD and STK based Digital Financial Services applications Security, Infrastructure and Trust Working Group
P. 22

4�1  Best practices to mitigate against retrieval of   details  before  a  SIM  swap/  SIM  replacement  is
            user data                                            performed.
                                                               iii. DFS and Payment Service Providers should be
            i. Use a TLS v1.2 or higher to secure the connection  able to detect real-time whenever a SIM card with
               between the SMSC GW, USSD GW, and the DFS         DFS services has swapped or replaced. And per-
               application server.                               form further verification before authorizing any
            ii. The mobile operator should ensure the use of     high-value transaction or account changes with
               secure radio encryption between users' devices    new SIM.
               and base stations.                              iv. MNO should design a mobile number recycling
            iii. Use session timeout on the client-side to limit  process that involves communicating with DFS
               altered requests/responses.                       providers  on  Mobile  Subscriber  Identification
            iv. Deploy USSD PIN masking whenever possible.       Numbers (MSIDN) churned or recycled. (In this
            v. Follow the development of technologies that       context: number recycling is when the MNO real-
               enables to secure mobile payment through the      locates a dormant/inactive Mobile Subscriber
               encryption  (and  subsequent  decryption  on the  Identification Number (MSISDN) to a new cus-
               MNO side) of USSD messages. With the emergence    tomer). When a SIM is recycled, the mobile oper-
               of new low-performance requirements, quantum      ator reports the new IMSI related to the account
               computing resistant encryption schemes. End-to-   phone number. The DFS provider should block the
               end encryption of USSD becomes a viable possi-    account until the identity of the new person hold-
               bility, even within existing 2G networks. The ITU-T  ing the SIM card is verified as the account holder.
               study group 11 which focuses on signaling require-  v.  The mobile operator should safeguard and secure-
               ments, protocols, test specifications is currently  ly store SIM data like IMSI and SIM secret key val-
               working on a technical report (to be published in  ues (KI values).
               03/2021) which will survey these technologies and
               suggest applications to be integrated into USSD
               signaling, both on the core-network side and the  4�3  Best practices to avoid remote USSD execution
               user equipment (within the SIM card).           on devices
            vi. Ensure there is an auditable process in place to
               review access to traces and logs on interfaces that  i. Android device owners should disable the ADB
               use inherently insecure protocols.                interface, and device vendors should not  ship
            vii. Avail the customers the option to opt-out of the  products with Android Debug Bridge enabled
               USSD or STK channels for financial transactions,  over a network.
               especially those that can access the DFS using an  ii. DFS users should be educated on the dangers of
               app.                                              connecting to public Wi-Fi networks and how to
            viii. Set transaction limits for customer with-      handle risks associated with app permissions. In
               drawals and transfers over the USSD channel,      particular, DFS users should be aware of the priva-
               per customer, per day for transactions as may be  cy implications when granting permissions to an
               required.                                         app on a device. If the permissions are too inva-
                                                                 sive, they should avoid downloading the app.
                                                               iii. Avoid using rooted devices for DFS transactions
            4�2  Best practices to mitigate SIM swap and SIM     and ensure that device software is updated reg-
            recycling risks 13                                   ularly. Regular updates safeguard the devices
                                                                 against malware and spyware.
            i. Device authentication is one way of improving
               endpoint security by tracking the IMEI's of the
               devices used to access mobile money. In this way,  4�4  Best practices to mitigate SIM exploitation
               an account that changes devices can be flagged.  using binary OTA
            ii. The user identity should be verified using a com-
               bination  of  something  they  are,  something  they  i. SMS filtering: Remote attackers rely on mobile
               have, or something they know. For example, with   networks to deliver binary SMS to and from vic-
               the presentation of a valid ID, biometric verifi-  tim phones. Mobile operators should implement
               cation, and knowledge about the DFS account       blocking the ability to send and receive binary





           20    Security testing for USSD and STK based Digital Financial Services applications
   17   18   19   20   21   22   23   24   25   26