2/11
After a WhatsApp vulnerability exploited in 2019 #WhatsApp/#Facebook sued NSO Group. As part of its evidence there was a contract between a NSO Group reseller and a telecom regulator.
Within that contract was a list of features, including something called #MMSFingerprint
3/11
What is an MMS Fingerprint? NSO’s description says it can "reveal the target device and OS version by sending an MMS to the device".
Problem here is this attack wasn’t known in the industry. So I went to work trying to figure it out. files.lbr.cloud/316009/whatsap…
4/11
A complication in MMS, is that the MMS flow is not that straightforward, and some parts of an MMS delivery don’t actually use MMS. A MMS sequence flow between two opcos is below.
Keep an 👁️ on that MM1_notification.REQ and the subsequent MM1_retrieve.REQ
5/11
The MM1_notification tells the recipient that an MMS is waiting. However its not an MMS, but an SMS (a WSP Push binary SMS). The follow-up MM1_retrieve.REQ isn’t really a MMS either, it’s a HTTP GET to an URL in the MM1_notification.
Here is where things get interesting
6/11
This HTTP GET should normally go to the recipient’s “mms” APN, to retrieve the MMS from the MMSC. But within this HTTP GET, user device information is included.
This seemed to match how the MMS Fingerprint could work, but we needed to test to confirm.
7/11
We got some sample SIM cards, from a random western European operator, and after some trial and error, we sent our own custom MM1_notification (binary SMS) to a test handset with the SIM. This binary SMS had a field that pointed to a web server we controlled.
Did it work?
8/11
Success!
Sure enough, the test mobile did a GET to our server, and we could see the x-wap-profile and (MMS) User-Agent. This seems to match the MMS fingerprint attack described. But why would anyone want this info?
9/11
Probable main reason is that Device info is useful to tailor malicious payloads like #Pegasus. At basic level, you could find out if target uses Android or iOS.
Its also standard for attackers to want. Not same attack but 93% of #Simjacker attacks requested device info
10/11
Good news though is that we didn't observe any attackers using this technique in the operators we protect, this may be due to it being old. In addition it should be relatively easy to block these attacks. More suggestions on how to do this in the blog
11/11
Conclusion: certainly not the biggest or most impactful attack but the fact NSOGroup reportedly offered it shows it had some value. Binary SMS continues to be an area with a steady stream of vulnerabilities.
Also our first time finding an attack in legal documents!
• • •
Missing some Tweet in this thread? You can try to
force a refresh
@RowlandCorr and I cover what may happen in the future. In particular we look at the little-known Russian separatist Mobile Operators Phoenix (Фенікс) and Lugacom (Лугаком)
2/10
The unlicensed Phoenix (Фенікс) & Lugacom (Лугаком) opcos were formed from the separatist seizure of Ukrainian Mobile Operator equipment after 2014 invasion of the #Donbas
They have been growing as the licensed Ukrainian Operators have pulled out
🧵A good recent example of #Ukraine contesting the Mobile Network / InfoSec battlespace.
Multiple #SIMBox seizures as part of an "enemy bot farm" network were announced yesterday by the Security Service of Ukraine. 1/6 ssu.gov.ua/novyny/z-pocha…
Technically this is a much bigger setup that the #SIMBox relay discovery from 2 weeks ago, (see my previous thread) which is not surprising as these are more traditional ‘bot farms’ used for signups for social media 2/6
According to the #SBU, the 5 enemy bot farms in the network used social media (including some banned in Ukraine) to “spread disinformation about a full-scale Russian invasion of our state and spread distorted news from the front”.
1/5 Another significant capture in #Ukraine. Reported discovery today of a #SIMBox being used to relay Voice calls & SMS and other info to Russian forces (including top leadership of Russian army) & other individuals in #Ukraine. I will explain what this is and how it works.
2/5
First the system is comprised of 3 main parts, 1) the SIM Box server - in this case a Hypertone SMB-128 . This handles the control of up to 128 SIM Cards, cycles them when detected etc , and co-ordinates interaction with the #GSM Gateways hybertone.com/en/pro_detail.…
3/5 Next the GSM Gateways, there are two Hypertone types being used here:
- There are 3x GoIP 8 - VoIP Gateway for 8 Channels being used,
- along with 1x GoIP-4 4 SIM VoIP GSM Gateway.
Both can be used for SMS or Voice