New 'Kraken' GSM-cracking software is released
- 22 July, 2010 12:18
Pierre Denys de Montfort's The Legend of The Kraken
The GSM technology used by the majority of the world's mobile phones will get some scrutiny at next week's Black Hat security conference, and what the security researchers there have to say isn't pretty.
On Friday, an open source effort to develop GSM-cracking software released software that cracks the A5/1 encryption algorithm used by some GSM networks. Called Kraken, this software uses new, very efficient, encryption cracking tables that allow it to break A5/1 encryption much faster than before.
The software is key step toward eavesdropping on mobile phone conversations over GSM networks. Since GSM networks are the backbone of 3G, they also provide attackers with an avenue into the new generation of handsets.
In December, the group released a set of encryption tables designed to speed up the arduous process of breaking A5/1 encryption, but the software component was incomplete. Now the software is done, and the tables are much more efficient than they were seven months ago. "The speed of how fast you could crack a call is probably orders of magnitude better than anything previously," said Frank Stevenson, a developer with the A5/1 Security Project. "We know we can do it in minutes; the question is, can we do it in seconds?"
As the software becomes more polished it will make GSM call eavesdropping practical. "Our attack is so easy to carry out, and the cost of attack is lowered so significantly, that there is now a real danger of widespread intercepting of calls," Stevenson said.
Stevenson and his co-developers haven't put together all the components someone would need to listen in on a call -- that would be illegal in some countries. Someone must still develop the radio listening equipment needed to gain access to the GSM signal, but that type of technology is within reach. Stevenson believes that this could be done using an inexpensive mobile phone and a modified version of open-source software called OsmocomBB. Hackers could also use a more-expensive Universal Software Radio Peripheral (USRP) device in conjunction with another program, called Airprobe.
A5/1 Security Project leader Karsten Nohl will discuss the hardware and software setup for his project's GSM cracking tools at next week's conference.
Last year there were about 3.5 billion GSM phones in use, according to data from the GSM Association. Not all of these phones are on networks that use A5/1 encryption -- some use the more-secure A5/3 algorithm; others use no encryption -- but a sizeable percentage are.
In the U.S., both AT&T and T-Mobile operate GSM networks.
The trade group that represents GSM network operators and equipment manufacturers, the GSM Association, has said in the past that A5/1 cracking efforts such as this are interesting, but attacks are extremely difficult to pull off in the real world. Intercepting mobile phone calls is illegal in many countries, including the U.S. The GSM Association did not respond to messages seeking comment for this story.
Project developers say the point of their work is to show how easy it really would be to crack A/51 -- something they say that grey market commercial products are already doing. According to Stevenson many of these security problems are solved in next-generation mobile network technologies such as 3G and LTE (Long Term Evolution).
However, even 3G phones can be compromised because they can roll back to GSM mode when a 3G network is not available. "You can choose to operate in 3G mode only, but then you will have very limited coverage," Stevenson said. "GSM has become the Achilles Heel of 3G security."
Meanwhile, another Black Hat presenter, Chris Paget plans to demonstrate a completely different way to intercept GSM calls. He's setting up a fake cellular tower that masquerades as a legitimate GSM network.
According to Paget, using open-source tools and a US$1,500 USRP radio, he can assemble his fake tower, called an IMSI (International Mobile Subscriber Identity) catcher. In a controlled experiment, he's going to set one up at Black Hat and invite audience members to connect their mobile phones. Once a phone has connected, Paget's tower tells it to drop encryption, giving him a way of listening in on calls.
"I think there's been too much focus on the cryptographic weaknesses in GSM," he said. "People need to recognize that the cryptographic weaknesses are not the worst weaknesses in GSM. "
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- Australian Red Cross Blood Service Enhances the Performance of Its Mission-Critical Applications
- Moving to a Private Cloud? Infrastructure Really Matters!
- Cost Savings Through Virtual Patching
- Endpoint Security Solutions: VDI Performance Analysis Report
- Endpoint Security Performance in Desktop Virtualisation Environments
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
How the Cloud Changes the Game for Line of Business Managers in Midsize Companies
It can be argued that what distinguishes midsize businesses most from large and small companies is not size, but attitude. While attitude alone cannot mitigate the challenges faced by midsize businesses, technology can help. And no technology offers more promise than the cloud. This paper, explores midsize business challenges from the perspective, not of the IT department, but of the line of business managers they support. Read on.
Detecting APT Activity with Network Traffic Analysis
Today’s successful targeted attacks use a combination of social engineering, malware, and backdoor activities. This research paper will discuss how advanced detection techniques can be used to identify malware command-and control (C&C) communications related to these attacks, illustrating how even the most high-profile and successful attacks of the past few years could have been discovered.
The Big Data Security Analytics Era is Here
Large organizations can no longer rely on preventive security systems, point security tools, manual processes, and hardened configurations to protect them from targeted attacks and advanced malware. Henceforth, security management must be based upon continuous monitoring and data analysis for up‐to-the‐minute situational awareness and rapid data-driven security decisions. This means that large organisations have entered the era of big data security analytics. Learn more.