sec u r it y in c id en t s
play

Sec u r it y in c id en t s l esso n s l ea r n ed Mik k o k a r - PowerPoint PPT Presentation

Sec u r it y in c id en t s l esso n s l ea r n ed Mik k o k a r ik yt & a n u pu h a k a in en Er ic sso n psir t o u t l in e Introduction Past, present and lessons learned Future unpredictable? Conclusions PSIRT


  1. Sec u r it y in c id en t s – l esso n s l ea r n ed Mik k o k a r ik yt ö & a n u pu h a k a in en Er ic sso n psir t

  2. o u t l in e Introduction Past, present and lessons learned Future – unpredictable? Conclusions PSIRT Presentation for FIRST 2011 | Ericsson Internal | 2011-06-12 | Page 3

  3. in t r o d u c t io n

  4. Er ic s s o n ps ir t › Product Security Incident Response Team › No – internal IS/IT network supervision and incidents › No – mobile terminals and mobile malware › Yes – operator mobile networks, globally PSTN SWITCH SWITCH BSC DB Internet RNC GW GW PSIRT Presentation for FIRST 2011 | Ericsson Internal | 2011-06-12 | Page 5

  5. In c id en t en v ir o n men t f o r u s - pa s t › PSIRT receives filtered view of security incidents from operators › A case typically starts as – ”ordinary issue” reported to Ericsson support – fraud case › Most cases related to (lack of) operational security as of today PSIRT Presentation for FIRST 2011 | Ericsson Internal | 2011-06-12 | Page 6

  6. Pa st , pr esen t & l esso n s l ea r n ed

  7. Ca s e ex a mpl es Case 1: A-number spoofing Case 2: Free surfing Case 3: Prepaid fraud Lessons learned PSIRT Presentation for FIRST 2011 | Ericsson Internal | 2011-06-12 | Page 8

  8. Ca s e 1: A-n u mber s po o f in g › Voicemail eavesdropping or fake SMS messages by spoofing the A-number › Most often resolved with proper configuration and number analysis in telecom networks 2010 PSIRT Presentation for FIRST 2011 | Ericsson Internal | 2011-06-12 | Page 9

  9. Ca s e 2: Fr ee s u r f in g › Bypass charging rules for 3G mobile networks › Surf free of charge in the Internet › How does it work? – Use a proxying tool installed on the laptop – Exploit zero-rated URLs to bypass charging rules – Modify http headers to reflect both 0-rated URL and full URL of the site to be visited › E.g. www.operator_x.com.www.t9space.com › How to mitigate? – Proper configuration rules for mobile data networks PSIRT Presentation for FIRST 2011 | Ericsson Internal | 2011-06-12 | Page 10

  10. Ca s e 3: f r ee c a l l s , pr epa id f r a u d › Prepaid (roaming) customers making free calls › Prepaid balance credits › Insiders involved taking illegitimate actions – Leaked passwords and group accounts – Segregation of duties does not exist › How to mitigate? – Enforce good user and password policies – Good fraud management system – Logging activated PSIRT Presentation for FIRST 2011 | Ericsson Internal | 2011-06-12 | Page 11

  11. Les s o n s l ea r n ed › Main motivation as of today: free calls, free surfing › 90% of cases related to (lack of) operational security › Insufficient security policies – user account handling – segregation of duties – password policies › Logging and accountability not detailed enough › Evidence often destroyed during re-starts › Communication with other parties during incident investigation may be challenging PSIRT Presentation for FIRST 2011 | Ericsson Internal | 2011-06-12 | Page 12

  12. Fu t u r e – u n pr ed ic t a bl e?

  13. FUTURE SCENARIOS 50B CONNECTED CLOUD SERVICES DEVICES 2G PSTN SWITCH SWITCH A-number spoofing Free calls, free surfing BSC DB Prepaid fraud Internet RNC GW GW 3G/4G MOBILE PAYMENT PSIRT Presentation for FIRST 2011 | Ericsson Internal | 2011-06-12 | Page 14

  14. Co n c l u sio n s

  15. New c h a l l en ges a h ea d From one symptom to patterns and scenarios – wide attack surface Get out of the silo Lack of operational security will still be main reason for incidents Co-operation across countries, legal regions and organizations crucial PSIRT Presentation for FIRST 2011 | Ericsson Internal | 2011-06-12 | Page 16

  16. Qu es t io n s ? PSIRT Presentation for FIRST 2011 | Ericsson Internal | 2011-06-12 | Page 17

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend