an empirical study of wireless carrier authentication for
play

An Empirical Study of Wireless Carrier Authentication for SIM - PowerPoint PPT Presentation

An Empirical Study of Wireless Carrier Authentication for SIM Swaps Kevin Lee kvnl@cs.princeton.edu Graduate Researcher Princeton University Joint work with Ben Kaiser, Jonathan Mayer, Arvind Narayanan Special thanks to Mihir Kshirsagar


  1. An Empirical Study of Wireless Carrier Authentication for SIM Swaps Kevin Lee kvnl@cs.princeton.edu Graduate Researcher Princeton University Joint work with Ben Kaiser, Jonathan Mayer, Arvind Narayanan Special thanks to Mihir Kshirsagar

  2. What are SIM swap attacks? Hi, I’m Victim and I need to move my cell service over to a new SIM card. Sure, Victim. Let’s confirm it’s you. Please provide the answer to challenge Y . Adversary Victim’s Carrier The answer to that challenge is Z. That’s correct. Your service has been moved to the new SIM card. SMS 2 Victim

  3. What are SIM swap attacks? Hi, I’m Victim and I need to move my cell service over to a new SIM card. Sure, Victim. Let’s confirm it’s you. Please provide the answer to challenge Y . Adversary Victim’s Carrier The answer to that challenge is Z. That’s correct. Your service has been moved to the new SIM card. SMS 3 Victim

  4. Attackers can intercept messages and calls Leads to financial loss, account hijacking, impersonation, and denial of service • September 5, 2019 4

  5. All five carriers had flawed policies Attack 100% successful on major carriers, 40% success on virtual carriers • Insecure authentication challenges across all carriers • 5

  6. Key vulnerability: Manipulable information Date/amount of last payment (2 carriers) • No authentication when making payments, so an attacker can make a payment, then use – that information to authenticate Recently called numbers (incoming and outgoing) (3 carriers) • Attackers can trick victims into placing or receiving calls – Reponse: After reviewing our research, T-Mobile informed us that they no longer • uses call logs for customer authentication (January 2020) 6

  7. Key vulnerability: Customer service reps ● Allowed SIM swaps without authentication Forgot to authenticate ○ Proceeded despite failed attempts ○ ● Disclosed information without authentication Guided our guesses ○ Leaked billing address ○ 7

  8. Why does this matter? We reverse-engineered the authentication policies of 145 websites that support • phone-based authentication. We examined the MFA schemes and recovery option pairs • Limitation: accounts were not linked to assets • 8

  9. Most sites don’t stand up well to SIM swaps Eighty three (a majority) websites default to insecure configurations • Seventeen websites allow SMS recovery allowed alongside SMS 2FA • We notified these vulnerable websites (January 2020) – 9

  10. Thank you! Full findings, recommendations, carrier/website responses: issms2fasecure.com Email: kvnl@cs.princeton.edu 10

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend