Improving The Security of Signalling Protocols
Improving The Security of Signalling Protocols
SIGNALLING PROTOCOLS
DIGITAL FINANCIAL
SERVICES RISKS AND
VULNERABILITIES
• Signaling networks use various protocols such as SS7, SIP or Diameter, which are
susceptible to a variety of fraudulent attacks
• Vulnerabilities in telecom networks allow hackers to read texts, listen to calls and track
mobile phone users’ locations and gain access to subscribers personal data to access
and disrupt communication services
• Fraudsters can also gain access to mobile banking and DFS apps which use SMS
authentication to intercept messages used by apps to identify users
• The cellular air interface (the radio frequency communication between the cell phone and
the cellular network)
5 COMMON SIGNALLING ATTACKS
• Telephone spam,
• Spoofing numbers (SS7 Spoofing)
• Location tracking
• Subscriber fraud
• Calls and message Interception,
• DoS, infiltration attacks,
• Routing attacks, etc.
• Two Factor Authentication Fraud (mobile banking frauds) – used to gain access to an
online bank account through the interception of messages sent to customers with the
OTP
Digital Financial
Services Fraud on
Mobile Networks
•
VULNERABILITY OF MOBILE FINANCIAL SERVICES TO FRAUD
Growth of digital financial services and more particularly mobile money, has been at the centre of financial
inclusion initiatives in various countries, notably in Sub Saharan Africa and Southern Asia, due to:
• Lack of access to traditional financial services in these regions
• Prevalence of mobile phones, wide acceptance of MMT, cashless service, speed, anonymity, and
portability of mobile money
• Proliferation of various financial services offered on mobile banking and other digital platforms:
Money Transfer including International Money –P2P, B2C,C2B,G2P
Digital Payment Services – Bills and other payments, insurance, health, school fees, loan disbursements
and repayments etc
Mobile Banking – Bank to bank/mobile transfers, bill and other payments, digital savings and credit
facilities, investments etc
Airtime Management – Purchase of airtime for self and others
These products provide opportunities for fraud, and other criminal activity
NB : These vulnerabilities have increased during the Covid era due to measures put in place
by providers and regulators to encourage increased cashless payments as a means to
7
prevent Covid
8
MOBILE FINANCIAL SERVICES – STATE OF THE INDUSTRY
GSMA-State-of-the-Industry-Report-on-Mobile-Money-2019
9
WHO ARE THE PROVIDERS?
3 Categories
Consumer Affecting
Agent
Provider Affecting
10
Common MFS Frauds
Consumer Affecting
• Identity Theft
• Impersonation Fraud
• Fraudulent SIM swaps through compromised
PINS
• Loss from Erroneous Transfers
• Mobile banking frauds
• Agent defrauding the customer (OTC,
Reversals, Fake Currency)
• Ponzi and other illegal investment schemes
• Social engineering – Phishing Scams/Con tricks
such as Job application and promotional
scams, fraudulent texts, extortion
• Digital Credit Fraud
Common MFS Frauds
Agent Affecting
Provider
• Internal Fraud
• Mobile banking frauds
• Digital Credit Fraud
• Illegal use of mobile platforms for criminal activity
e.g money laundering and terrorist financing
EMERGING RISKS- NEW PRODUCTS/SERVICES
• Debit Cards – Can be stolen and the funds transferred to bank accounts and mobile wallets via the
internet
• Prepaid Cards and Gift Vouchers funded with criminal proceeds via mobile money
• Securities and Investment products paid for through mobile money and other DFS channels
Move away from use of mobile money platforms and traditional banking channels to remit the
proceeds of terrorist financing
Increased use of informal channels such as hawala, and other informal money transfer agents by
terrorists to transfer cash to finance their activities
Use of mobile phones as the primary means of communication in the planning and execution of
terrorist and other criminal acts,
HENCE : Need for appropriate controls to safeguard the integrity of subscriber data and ensure that
mobile networks are not being used to facilitate terrorist and other criminal activity
15
CASE STUDY 1: Uganda’s banks plunged into chaos by a mobile money fraud hack
• Security breach involving Pegasus Technologies, mainly
affected bank to mobile wallet transfers
• At least $3.2 million is estimated to have been stolen in this
latest incident with some reports quoting a much higher
figure. The hackers used around 2,000 mobile SIM cards to
gain access to the mobile money payment system and
transfer millions of dollars via banks to various mobile
wallets
• MTN Uganda and Airtel Uganda, suspended mobile money
service transactions between their networks, indefinitely.
Stanbic Bank Uganda, and Bank of Africa also suspended
transactions between the banks and the mobile phone
companies.
A prudent DFS Risk Management Structure will comprise of the following key areas of
assurance:
• Money Laundering Reporting/Risk and Compliance Office (Statutory Requirement)
• Ethics and Compliance Risk Management (Fraud Management and Prevention,
Compliance with processes, Staff Ethics)
• Enterprise Risk Management – Business Continuity Plans, Information Security etc.
• Revenue and Product Assurance (Telcos)
• Internal Audit and Information Security Audit (this should be a separate division)
22
DFS RISK MANAGEMENT PROGRAM
TECHNICAL CONTROLS
• Real time Automated Transaction Monitoring pegged to transaction limits for financial transactions
• Fraud monitoring systems that apply artificial intelligence (AI) and machine learning (ML), combined with pre-packaged
rule sets – (Data must be valid, up-to-date industry data including roaming partners, number ranges, contact details
and other intelligence regarding sources of attacks)
• Sanction screening against international watch lists (AML/CFT)
• Use of appropriate link analysis tools to analyze subscriber data including locational details, call and financial
transaction patterns- (used to detect hoax calls and texts, corruption and fraud, terrorist activity, hate messages,
kidnapping etc)
2. Systemic Controls
• Restriction of access rights,
• Electronic/biometric registration to curb errors,
• Information security and system audit checks,
• PIN controls – for financial transactions, SIM swaps etc.
• System prompts to prevent sim swaps, erroneous transfers, etc., lead time for operationalizing of sim swaps, mobile banking
registrations
Common Suspicious Transactions/Red Flags
on Mobile Networks
1. Frequent agent deposits and low/no commission transfers to
multiple numbers
2. Multiple customer and agent registrations (sim and mobile
wallet)
3. Same day deposits by the same person in different locations
4. Customers depositing to third party accounts (Direct Deposits)
5. Customers failing registration validation checks
6. Customers failing sanctions screening checks
7. Immediate withdrawals after deposit (through Agents/ATMs)
8. Customers carrying out Multiple high value/high volume
transactions with no apparent economic rationale
24
Common Suspicious Transactions/Red Flags on
Mobile Networks
25
26
DFS RISK MANAGEMENT PROGRAM
Regulatory and Procedural Controls (Compliance and Consumer Protection)
8. Reporting
• Internal SARS Reporting processes and Complaints Recourse
• Periodic Regulatory and management reporting on ML/Fraud Trends
• SARS reporting to relevant FIU
9. Industry/Stakeholder Co-operation
• Mutual sharing of SARS information
• Benchmarking against industry best practice
• Common MM Association/Forums to address stakeholder challenges and engage regulators on
stakeholder matters
ITU - SECURITY, INFRASTRUCTURE AND TRUST WORKING GROUP
Proposed the following mitigatory strategies for detecting and mitigating signaling attacks:
• Social engineering attacks with MT-USSD – via location checks and verification of the IMEI and IMSI of the
hone and use of 2 way secure OTP
• Internal rules on SIM swaps by MNOs/MVNOs including SMS notifications to the subscriber seeking
confirmation to SIM SWAP, 2-4 hour holding time, verification measures including queries as to last
transaction etc;
• Detection and prevention of mobile banking fraud by Linking bank 2FA systems used by banks/PSPs to
SIM/phone number databases to enable real time verification on SIM Swaps and new mobile
banking/payment accounts
ITU - SECURITY, INFRASTRUCTURE AND TRUST WORKING GROUP
Technical report on SS7 vulnerabilities and
mitigation measures for digital financial services transactions
• Mitigating SIM card recycle risks – by monitoring dormant DFS accounts for signs of unusual activity upon
which the account should be blocked.
• Embedding spoof identifier within the user’s phone for authentication of communications between the
DFS provider and the user’s phone to authenticate the user and phone.
•
• Regulation requiring the putting in place of policies and procedures for the mitigation of SS7 and related
attacks e.g on SIM swaps.
• Regulatory rules on SIM swaps, including: standardization of sim swap rules, identification of subscriber
including an affidavit, and passport photo, verification of proxies
• Regulatory coordination between regulators so as to assign specific and joint roles and responsibilities.
• GSMA have made similar recommendations in their Report on SS7 Vulnerability – 2018 and
https://www.gsma.com/security/resources/fs-21-interconnect-signalling-security-recommendations-v6-0/
31
CHALLENGES
Reporting Institutions/Providers
• In-effective /Inadequate Risk Management structures e.g. no MLRO
• Ineffective /Inadequate Risk management Policies and Procedures
•
• Need for customised AML Awareness and Training programmes
• High cost of infrastructure (Monitoring and watchlist Screening systems)
• Lack of management support /misaligned business strategies (business expediency vs controls)
•
• Compliance Violations e.g - Failure to Report Suspicious Activity
Regulators
•
• Slow pace of operationalizing legislative reforms – (National Risk Assessments still outstanding, RIS and
•
Stakeholders not on board)
• Lack of Capacity, Training, and infrastructural support; impacts on effectiveness and fulfilment of statutory duties e.g.
inspections, compliance monitoring etc.
• Dual regulations for some RI’s (e.g. telcos)
• Pending crucial legislation e.g. Consumer Protection, Cybercrime and Electronic Payment Laws, Sector Specific
Legislation
• Inadequate penalties for non compliance
32
CHALLENGES
ENISA survey in the EU and the Security Infrastructure and Trust workstream
survey by the ITU
•
• Only 25% of Mobile operators reviewed have addressed the issue of SS7
telecom vulnerabilities
•
• Implementation rate was very low (below 10%) Have implemented mainly
SMS home routing and filtering on signalling nodes.
•
• Cost implications and the lack of regulation - 75% of the surveyed operators in
the EU replied that cost is the inhibiting factor in implementation, and the lack
of regulation mandating it
KEY TAKEAWAYS
1. Speed of Delivery of Electronic payments may give rise to non traditional banking risks
associated with Fraud, Money Laundering and Terrorist Financing
2. Regulators must ensure that providers have effective compliance programmes in place to detect
and prevent criminal activity on their networks.
3. Need to have the necessary legislation in place, coupled with appropriate regulatory regimes to
enforce it; including appropriate training programme for all stakeholders.
4. Need to ensure that providers have effective Transaction Monitoring and Screening systems - the
cost of such systems can be shared through multi-licensing arrangements – Regulators should
play a co-ordinating role towards this end
5. Supervisors and institutions must assess relevant DFS risks and design appropriate and
proportional measures to address risks, taking into account individual risk profiles
35
THANK YOU/ASANTE SANA