Fake cell towers, also known as IMSI-catchers or rogue towers, are insidious devices that mimic the signals of legitimate towers to deceive mobile devices into connecting. Once hooked, attackers can intercept calls, data, track locations, and even inject malicious code. This emerging threat is fueled by the affordability of readily available hardware and the covert nature of their operation.
A wireless intrusion occurs when an unauthorized individual gains access to a wireless network. This can occur for various reasons, such as stealing data, intercepting communications, or disrupting network operations. Wireless intrusions are becoming increasingly common due to the growing number of interconnected wireless devices and the emergence of technologies like the Internet of Things (IoT) and 5G.
Our multiprotocol Wireless Threat Detection Framework can detect a wide range of wireless attacks, including:
Our multiprotocol Wireless Threat Detection Framework will eventually cover and support a wide range of wireless protocols, including:
In the future we envission also protecting in-vehicle RADAR systems from very sophisticated jamming and spoofing attacks.
While our solution will eventually cover most wireless protocols out there, detecting threats affecting cellular endpoints, including 3G, 4G, 5G, and cellular IoT, is the cornerstone of our innovation. Providing an advanced IDS solution for cellular endpoints is like “touching the untouchables”. Unlike in other wireless technologies such as Wi-Fi and Bluetooth, solutions for protecting cellular-enabled endpoints are totally overlooked. We believe this is due to the nature and sophistication of the attacks affecting those devices, which adds an extra layer of complexity to the development of such solutions.
Cellular networks face unique cybersecurity challenges due to their inherent design and functionality. Unlike traditional wired or WLAN networks, which are typically confined to a physical location, cellular networks are designed to provide ubiquitous connectivity, enabling users to connect from anywhere in the world. This mobility introduces several challenges for cybersecurity:
1. Dynamic Network Environment: Cellular networks constantly change as users move from one cell tower to another, creating a dynamic and ever-changing environment. This makes it difficult for traditional cybersecurity measures to keep up, as they are often based on static rules and predefined patterns.
2. Critical Network Procedures: Cellular networks rely on a complex set of network procedures to manage user mobility, authentication, and communication. These procedures, such as the Mobility Management Entity (MME) and the Radio Resource Control (RRC) protocol signalling, are essential for the network’s operation but also introduce potential security vulnerabilities.
3. Roaming Features: Cellular networks enable seamless connectivity across different network operators, allowing users to roam internationally or between different mobile carriers. While this roaming feature is convenient for users, it also introduces additional security risks, as it exposes devices to a wider range of potential threats.
4. Increased Reliance on Software: Cellular networks are increasingly relying on software-based solutions for network management, security, and applications. This increased reliance on software makes cellular networks more susceptible to software vulnerabilities and exploits.
5. Global Reach and Interconnectivity: Cellular networks have a global reach and are interconnected with other networks, including the internet. This global connectivity increases the attack surface and the potential for cross-network attacks.
Over-the-air code injection is a type of attack where an attacker injects malicious code into a device over the air. This can be done by exploiting vulnerabilities in the device’s firmware or software. Malicious code can be used to steal data, execute arbitrary commands, or take control of the device.
Attacks such as the Over The Air Baseband Exploit, aka OTAB exploit, is a critical vulnerability that affects the baseband firmware of 5G smartphones and cellular IoT devices. This vulnerability was first discovered in 2021 by KeenLab, a security research team at Tencent. It affects a wide range of devices from major manufacturers.
The OTAB exploit works by exploiting a vulnerability in the baseband firmware, which is responsible for managing the communication between the device’s modem and the cellular network. Attackers can exploit this vulnerability to gain remote code execution on the device, which means that they can execute arbitrary code on the device without the user’s knowledge or permission.
Any organization that uses wireless networks can be at risk of wireless intrusions. This includes businesses of all sizes, as well as government agencies, hospitals, and educational institutions.
Here are some specific examples of industries that are particularly vulnerable to wireless intrusions:
Critical Infrastructure: Critical infrastructure sectors such as energy, transportation, and utilities rely on wireless networks for their critical operations.
Healthcare: Hospitals rely on wireless networks to connect medical devices, patient records, and other critical systems.
Financial: Banks and other financial institutions use wireless networks to transmit sensitive financial data.
Manufacturing: Manufacturing plants use wireless networks to control robots and other industrial equipment.
Automotive Industry: Connected vehicles rely on wireless networks to communicate with each other and with infrastructure.
Industry 4.0: Smart factories and other industrial IoT applications rely on wireless networks to collect and analyze data.
Smart Cities: Smart cities use wireless networks to manage traffic, lighting, and other infrastructure.
OTA attacks can bypass network security measures and procedures, and gain direct access to the targeted device without leaving any traces. This makes it very difficult to identify and investigate the attack. As a result, the device owner may not even know that their device has been compromised.
OTA attacks can be used to target a wide range of devices, from smartphones, IoT devices, and connected vehicles, to industrial control systems and medical devices. This makes them a significant threat to organizations of all sizes.
The ease with which a malicious actor can create a fake cell depends on the actor’s resources and technical expertise. However, it is generally considered to be a relatively straightforward process, particularly for those with access to specialized equipment and software.
Creating fake base stations is a serious concern, as it has made it possible for malicious actors to intercept calls, and data traffic, track the location of unsuspecting users or devices, and even inject malicious code. The availability of relatively inexpensive hardware such as software-defined radios (SDRs) and the open source availability of cellular protocol stacks has made it easier than ever for anyone with the technical expertise to create these devices.
In addition, the fact that these devices are now available to private and criminal organizations, not to mention foreign agencies, through websites that are selling them and the dark web, has made it even more difficult to track and prevent their use.
Nation-states have long used cyberattacks as a tool for espionage and sabotage. However, the webanization of cybersecurity has made it possible for these attacks to be more sophisticated and damaging. Fake cells, offer a great tool to foreign actors of antagonistic or hostile countries to release covert and untraceable attacks for achieving a variety of goals including:
There are numerous examples of hackers using fake cells for criminal activities, particularly in the past five years. These include:
To achieve ubiquitous connectivity and seamless handovers between different cell towers, cellular networks transmit a significant amount of information that is not encrypted. To list some:
1. Radio Resource Control (RRC) Protocol: The RRC protocol is responsible for establishing and managing radio connections between cellular devices and network towers. It handles tasks such as paging, authentication, and handovers. While some RRC messages are encrypted, others remain unencrypted to facilitate rapid and efficient communication.
2. Mobility Management Entity (MME) Messages: The MME (aka. AMF in 5G-NR) is a critical network element responsible for managing user mobility and authentication. It communicates with cellular devices and other network components to ensure seamless handovers between cell towers. Some MME messages are encrypted, but others remain unencrypted to optimize performance.
3. Paging Mechanism: The paging mechanism is used to notify cellular devices when they are needed to receive data or establish a connection. The paging messages are typically unencrypted to reduce overhead and enable faster paging.
4. Roaming Features: Cellular networks support roaming, allowing users to connect to different network operators while traveling. This requires exchanging information between network operators, some of which may be unencrypted to facilitate quick and efficient handoffs.
Encryption is a powerful tool for protecting sensitive information, but it is not a foolproof solution. There are several reasons why encrypted communications may not be enough to safeguard against cyber threats.
No, we do not claim to offer a magic bullet for cyberattacks, there is no such thing. However, we firmly believe that our multiprotocol Wireless Threat Detection and Response System is an essential component of a comprehensive cybersecurity strategy. Given the sophistication of cyber threats in today’s hyper-connected world, and the increasing prevalence of 5G networks and the proliferation of IoT devices, it is imperative for organizations and nations to have an advanced security solution that can protect them from emerging threats. Our WIDS provides this critical layer of defense, enabling Organizations and Nations to thrive and prosper in today’s increasingly interconnected world.
Protecting the privacy and confidentiality of personal information is a top priority for us. We believe that privacy, confidentiality, and security are inextricably linked. We are developing innovative solutions to enable secure and confidential information sharing and processing in the post-quantum era. Contact us to learn more about our capabilities.
An Overview of the Keen Security Lab Baseband Chip Vulnerability
In a significant cybersecurity discovery in 2021, Keen Security Lab, a renowned security research group, unearthed a severe vulnerability within the baseband chips of various 5G smartphones. This vulnerability, which can potentially impact multiple Qualcomm chipset families, including Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IoT, and Snapdragon Mobile, stemmed from a lack of input validation in the modem firmware, the component responsible for managing cellular communication. Attackers could exploit this weakness by crafting malicious data packets that could be interpreted and executed by the baseband chip, leading to a wide range of detrimental consequences.
The vulnerability stemmed from a lack of input validation in the modem firmware, which is responsible for managing cellular communication. Attackers could exploit this weakness by crafting malicious data packets that could be interpreted and executed by the baseband chip. This could lead to a wide range of attacks, including:
The vulnerability affected several baseband chips from major manufacturers, including Qualcomm, MediaTek, Samsung, and Intel.
This vulnerability is part of a multi-stage attack, with the first stage being the most critical, involving the interruption of the communication channel via a “man-in-the-middle” or “replay” attack. What is particularly alarming is that, despite the uncertainty surrounding whether the vulnerability has been adequately patched, security researchers have concluded that:
Some related critical Common Vulnerabilities and Exposures (CVEs) include:
Intellectra is actively developing innovative solutions designed to identify and mitigate this type of attack at its earliest stage.
This undertaking presents a formidable challenge, as effectively detecting these attacks without compromising cellular service or generating excessive false positives is extremely demanding.