'Ghost Telephonist' Link Hijack Exploitations in 4G LTE CS Fallback

by Haoqi Shan, Jun Li, Yuwei Zheng, Lin Huang, Qing Yang
Sept. 12, 2017 1 comment www.blackhat.com Pen Testing & Audits auditing & assessment

In this presentation, one vulnerability in CSFB (Circuit Switched Fallback) in 4G LTE network is introduced. In the CSFB procedure, we found the authentication step is missing. The result is that an attacker can hijack the victim's communication. We named this attack as 'Ghost Telephonist.' Several exploitations can be made based on this vulnerability. When the call or SMS is not encrypted, or weakly encrypted, the attacker can get the content of the victim's call and SMS. The attacker can also initiate a call/SMS by impersonating the victim. Furthermore, Telephonist Attack can obtain the victim's phone number and then use the phone number to make advanced attack, e.g. breaking Internet online accounts. The victim will not sense being attacked since no 4G or 2G fake base station is used and no cell re-selection. These attacks can randomly choose victims or target a given victim. We verified these attacks with our own phones in operators' network in a small controllable scale.

https://www.blackhat.com/us-17/briefings.html#ghost-telephonist-link-hijack-exploitations-in-4g-l...

Avatar
Steven Ulm 2 months ago

Excellent job in writing this presentation! Not only a great read but proved to be extremely useful to me!

Reply