Cybersecurity

Mobile network infrastructure at growing risk from cyber attack

security (ranjith ravindran/Shutterstock.com) 

4G mobile communications networks are increasingly vulnerable to cyber intrusion, according to a new report from a Federal Communication Commission advisory group.

The attack vector, which targets the Diameter signaling protocol used to move traffic on 4G networks, hasn't been successfully exploited yet, according to Travis Russell, chair of the FCC's Communications Security, Reliability and Interoperability Council's working group on network reliability and security risk reduction. But he said mobile phones and the networks that support them are drawing increasing attention from bad actors.

Russell submitted the report at a March 28 CSRIC meeting, where the committee approved it. CSRIC advises the FCC on optimal security and reliability for U.S. communications systems, including telecommunications, media and public safety.

In the report on threats to the 4G's Diameter protocol, Russell called it "the SCADA for telecommunications networks." SCADA, short for Supervisory Control and Data Acquisition systems, refers to industrial control systems used by many industries, including power and water infrastructure providers. Vulnerabilities in those systems, often designed before the connections to the public internet became commonplace, have become notable targets for hackers.

The vulnerabilities of Diameter, Russell reported, are very similar to those discovered in the older Signaling System 7 protocol that supports older wired and wireless networks.

SS7 and Diameter are crucial support protocols that undergird wireline and wireless networks' infrastructures globally, allowing communications devices on those networks to exchange calls and text messages. Diameter is associated with 4G wireless networks.

Breaches of the protocol can allow interception of voice, text and data and tracking of users, just as SS7 vulnerabilities can, said Russell.

"We haven't seen attacks in the wild" on Diameter, he said, even though some vendors have reported them.

Mobile network security provider Adaptive Mobile reported earlier this year that it had detected increasingly sophisticated attacks on the wireless Diameter protocol.

Russell contested such reports. "There have been no real attacks," he said, adding that some vendors are seeing "suspect traffic," which isn't an actual attack. "We've seen some experimentation," he said.

Attackers, he said, target SS7 and Diameter because they are both weak links in mobile networks, allowing outside traffic to "roam" between competitor or contiguous networks. They are meant to allow traffic to flow between networks, making them natural targets.

Information sharing among mobile service providers, equipment makers and the federal government is critical to preventing exploitation of Diameter and 4G networks, said Russell. However, just as with SCADA systems and other infrastructure providers, that sharing is not as easy as it sounds.

"The industry is reluctant to share breach information," said Russell, who is also director of telecommunications cybersecurity at Oracle Communications. "We need to fix that problem."

Additionally, the report tapped the federal government to more quickly declassify threat information for industry consumption. The Department of Homeland Security and other federal agencies "need to engage with industry and share threat intelligence," he said.

The report also called on mobile operators to do more network monitoring and analysis; practice more IT-like cyber hygiene; look more closely at peer networks they connect with, as well as adopt Global Systems for Mobile Communications best practices to secure Diameter interconnections.

About the Author

Mark Rockwell is a senior staff writer at FCW, whose beat focuses on acquisition, the Department of Homeland Security and the Department of Energy.

Before joining FCW, Rockwell was Washington correspondent for Government Security News, where he covered all aspects of homeland security from IT to detection dogs and border security. Over the last 25 years in Washington as a reporter, editor and correspondent, he has covered an increasingly wide array of high-tech issues for publications like Communications Week, Internet Week, Fiber Optics News, tele.com magazine and Wireless Week.

Rockwell received a Jesse H. Neal Award for his work covering telecommunications issues, and is a graduate of James Madison University.

Click here for previous articles by Rockwell. Contact him at mrockwell@fcw.com or follow him on Twitter at @MRockwell4.


Featured

  • Cybersecurity

    DHS floats 'collective defense' model for cybersecurity

    Homeland Security Secretary Kirstjen Nielsen wants her department to have a more direct role in defending the private sector and critical infrastructure entities from cyberthreats.

  • Defense
    Defense Secretary James Mattis testifies at an April 12 hearing of the House Armed Services Committee.

    Mattis: Cloud deal not tailored for Amazon

    On Capitol Hill, Defense Secretary Jim Mattis sought to quell "rumors" that the Pentagon's planned single-award cloud acquisition was designed with Amazon Web Services in mind.

  • Census
    shutterstock image

    2020 Census to include citizenship question

    The Department of Commerce is breaking with recent practice and restoring a question about respondent citizenship last used in 1950, despite being urged not to by former Census directors and outside experts.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.