{"id":15770,"date":"2019-07-12T08:10:05","date_gmt":"2019-07-12T16:10:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/07\/12\/news-9517\/"},"modified":"2019-07-12T08:10:05","modified_gmt":"2019-07-12T16:10:05","slug":"news-9517","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/07\/12\/news-9517\/","title":{"rendered":"Cellular networks under fire from Soft Cell attacks"},"content":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Fri, 12 Jul 2019 15:30:00 +0000<\/strong><\/p>\n<p>We place a lot of trust in our mobile experience, given they\u2019re one of the most constant companions we have. Huge reams of data, tied to a device we always carry with us, with said device frequently offering additional built-in app functionality. An astonishing wealth of information, for anyone bold enough to try and take it.<\/p>\n<p>Security firm Cybereason uncovered an astonishing attack dubbed \u201c<a href=\"https:\/\/techcrunch.com\/2019\/06\/24\/hackers-cell-networks-call-records-theft\/\" target=\"_blank\" rel=\"noopener noreferrer\">Operation soft cell<\/a>\u201d haunting at least ten cellular networks based around the globe. Over the course of seven years, they went after all manner of detailed information on just 20 to 30 targets, feeding it back to base and building up an amazingly detailed picture of their daily dealings.<\/p>\n<h3>What happened here?<\/h3>\n<p>The compromise, which the researchers have given a high probability of being a nation-state attack, went to elaborate lengths to nab their high value targets. Attackers first gained a foothold by targeting a web-connected server and making use of an exploit to gain access. A <a href=\"http:\/\/www.pyxsoft.com\/portal\/c99-shell\/\" target=\"_blank\" rel=\"noopener noreferrer\">shell<\/a> would then be placed to enable further unauthorised activity.<\/p>\n<p>In this particular case, a modified version of the well-known <a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2013\/08\/breaking-down-the-china-chopper-web-shell-part-ii.html\" target=\"_blank\" rel=\"noopener noreferrer\">China Chopper<\/a> was deployed to carry out specific tasks. It\u2019s quite flexible, able to run on multiple server platforms. It\u2019s also quite old, dating back several years. I guess there\u2019s no tunes quite like the classics.<\/p>\n<p>Thanks to China Chopper and a variety of alternative compromise tools, the attackers would make use of credentials from the first machine to dig deeper in the network. Well-worn RATs like <a href=\"https:\/\/attack.mitre.org\/software\/S0012\/\" target=\"_blank\" rel=\"noopener noreferrer\">PoisonIvy<\/a> were used to ensure continued access on compromised devices.<\/p>\n<p>Eventually, they\u2019d gain control of the <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/identity\/ad-ds\/plan\/security-best-practices\/securing-domain-controllers-against-attack\" target=\"_blank\" rel=\"noopener noreferrer\">Domain Controller<\/a> and at that point,<span class=\"Apple-converted-space\">\u00a0 <\/span>it\u2019s essentially game over for the targeted organisation.<\/p>\n<h3>Groundhog Day<\/h3>\n<p>It appears the criminals reused various techniques to work their way around the various cellular networks, with little resistance. Talk about \u201cIf it ain\u2019t broke, don\u2019t fix it.\u201d So total was their ownership of certain organisations, they were <a href=\"https:\/\/www.techradar.com\/uk\/news\/cybercrooks-built-their-own-vpn-to-hack-into-global-telcos\" target=\"_blank\" rel=\"noopener noreferrer\">able to set up VPN services<\/a> to enable quick, persistent access on hijacked networks instead of taking the much slower route and connecting their way through multiple compromised servers.<\/p>\n<p>If they were worried about being caught in the act, they certainly didn\u2019t show it. In fact, from <a href=\"https:\/\/www.cybereason.com\/blog\/operation-soft-cell-a-worldwide-campaign-against-telecommunications-providers\" target=\"_blank\" rel=\"noopener noreferrer\">reading the main report<\/a> it seems in cases where there was some pushback, they simply looped back around and tried again till they succeeded, attacking in waves staggered over a period of months.<\/p>\n<h3>The Crown Jewels<\/h3>\n<p>Most of the time, attacks on web-facing servers result in an email from <a href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Have I been pwned<\/a> and you see which bits of personal information have been fired across the web this time. Not here, however\u2014it was never going to end with a username\/password dump.<\/p>\n<p>The attackers plundered cellular networks, gained access to pretty much everything you could think of. In cases where the <a href=\"https:\/\/www.reuters.com\/article\/us-cyber-telecoms-cybereason\/hackers-hit-global-telcos-in-espionage-campaign-cyber-research-firm-idUSKCN1TQ0BC\" target=\"_blank\" rel=\"noopener noreferrer\">target was fully compromised<\/a>, all username\/passwords were grabbed, along with billing information and various smatterings of personal data.<\/p>\n<p>However, the big prize here wasn\u2019t being able to hurl all of this onto a Pastebin or upload it to social media as a free-for-all; nothing so bland. It was, instead, being able to sit on both this data quietly alongside hundreds of gigabytes of call detail records. This is, as you\u2019ll see, a bad thing.<\/p>\n<h3>Call detail records: What are they?<\/h3>\n<p>Good question.<\/p>\n<p>Call detail records are <a href=\"https:\/\/www.horizon.ac.uk\/what-are-call-detail-records\/\" target=\"_blank\" rel=\"noopener noreferrer\">all about metadata<\/a>. They won\u2019t give you the contents of the call itself, but what they will give you is pretty much everything else. They\u2019re useful for a variety of things: billing disputes, law enforcement inquiries, tracking people down, bill generation, call volumes\/handling for businesses and much more. Not only do they avoid recordings of conversations, they also steer clear of specific location information.<\/p>\n<p>Nonetheless, patterns of behaviour are easy to figure out. A typical CDR could include:<\/p>\n<ul>\n<li>Caller<\/li>\n<li>Recipient<\/li>\n<li>Start\/end time of call<\/li>\n<li>Billing number<\/li>\n<li>Voice\/SMS\/other<\/li>\n<li>A specific number used to identify the record in question<\/li>\n<li>How the call entered\/exited the exchange<\/li>\n<\/ul>\n<p>If you\u2019re looking to target specific individuals, then this data over time is an incredible resource for an attacker to get hold of. Some may prefer the old spear phish\/malware attachment type scenario, but by going after the target directly, it\u2019s quite possible someone\u2019s going to find out. Where targets are high value, they\u2019ll almost certainly have additional security measures in place. For example, journalists who cover human rights abuses in dangerous parts of the world will often work with organisations who keep an eye out for potential attacks.<\/p>\n<p>This method, aimed at slowly digging around behind the scenes and out of view from whoever happens to be using those networks, is much sneakier. Depending on how things pan out, it&#8217;s entirely possible they&#8217;d never even know they&#8217;d been compromised by proxy in the first place.<\/p>\n<h3>Hidden in plain sight<\/h3>\n<p>With methods such as this, the people behind the malware daisy chain have an amazing slice of access to the individual with no direct specific risk. Everything at that point comes down to how well the cellular network is locked down, how good their security is, how on the ball their incident response team happens to be, and so on.<\/p>\n<p>If (say) they failed to spot numerous attacks, left vulnerable servers online, missed telltale signs that something is amiss, let well-known RATs like PoisonIvy dance across their network, allowed the hackers to set up a bunch of VPN nodes\u2026well, you can see where I\u2019m going with this.<\/p>\n<p>Where I\u2019m going is several years later and a large slice of \u201cOh dear.\u201d<\/p>\n<h3>Aftermath<\/h3>\n<p>Well, first thing\u2019s first: don\u2019t panic. It\u2019s worth noting there isn\u2019t any additional verification (yet) outside the initial threat report. Something bad has clearly happened here, but as to how severe it is, we\u2019ll leave that to others to debate.<\/p>\n<p>Whether this was pulled off by a high-level nation state approved group of attackers or a random collection of bored people in an apartment, one way or another those cell networks really had a number done on them. The impact to the individuals caught by this is the same, and one assumes they&#8217;ve been informed and taken appropriate action. We can only hope the cellular networks impacted have now taken appropriate measures and shored up their defences.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/hacking-2\/2019\/07\/cellular-networks-under-fire-from-soft-cell-attacks\/\">Cellular networks under fire from Soft Cell attacks<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/hacking-2\/2019\/07\/cellular-networks-under-fire-from-soft-cell-attacks\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Fri, 12 Jul 2019 15:30:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/hacking-2\/2019\/07\/cellular-networks-under-fire-from-soft-cell-attacks\/' title='Cellular networks under fire from Soft Cell attacks'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/06\/shutterstock_721419028.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>We break down the recently revealed attacks on telco operators around the globe, targeting specific high-value individuals.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/hacking-2\/\" rel=\"category tag\">Hacking<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/call-detail-records\/\" rel=\"tag\">call detail records<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cellular\/\" rel=\"tag\">cellular<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/china-chopper\/\" rel=\"tag\">China Chopper<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/compromise\/\" rel=\"tag\">compromise<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/domain-controller\/\" rel=\"tag\">domain controller<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hack\/\" rel=\"tag\">hack<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hacking\/\" rel=\"tag\">hacking<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobile\/\" rel=\"tag\">Mobile<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/nation-state-attack\/\" rel=\"tag\">nation-state attack<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/operation-soft-cell\/\" rel=\"tag\">operation soft cell<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/poison-ivy\/\" rel=\"tag\">Poison Ivy<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rats\/\" rel=\"tag\">RATs<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/vpn-servers\/\" rel=\"tag\">VPN servers<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/hacking-2\/2019\/07\/cellular-networks-under-fire-from-soft-cell-attacks\/' title='Cellular networks under fire from Soft Cell attacks'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/hacking-2\/2019\/07\/cellular-networks-under-fire-from-soft-cell-attacks\/\">Cellular networks under fire from Soft Cell attacks<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[22262,22263,22264,18865,22265,4980,3919,3764,10554,22266,22267,20693,41,22268],"class_list":["post-15770","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-call-detail-records","tag-cellular","tag-china-chopper","tag-compromise","tag-domain-controller","tag-hack","tag-hacking","tag-malware","tag-mobile","tag-nation-state-attack","tag-operation-soft-cell","tag-poison-ivy","tag-rats","tag-vpn-servers"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15770","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15770"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15770\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15770"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15770"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15770"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}