Cyber Risk Leaders Magazine - Issue 3, 2020

Page 24

Cyber Security

Securing the next generation digital infrastructure highlights from BlackHat Asia 2020

O By Jane Lo Singapore Correspondent

riginally scheduled for March, BlackHat Asia 2020 returned 29th September – 2nd October 2020 to a virtual stage hosted in the Singapore Time Zone. With an agenda that spanned from policy decisions, thought leadership to firsthand technical skill-building, the event offered unique opportunities to learn the latest exploit development, platform security, malware and more. Here, we highlight some of the discussions on securing the digital infrastructure that will be powered by the nextgeneration technology of 5G.

5G cybersecurity risks With 5G implementation gaining steam globally, the talk on “Cross-Protocol Attacks in the Era of 5G” by Sergey Puzankov (Telecom Security Expert, Positive Technologies) cannot be more relevant – for governments, industries and users searching for more information on the benefits and risks of 5G deployment. “Mobile networks have evolved. These days they combine several generations”, he said, to deliver seamless service to subscribers. For example, 5G networks with non-standalone architecture rely on a 4G LTE core network. Devices will connect to 5G frequencies for data transmission, but rely on 4G and even 2G/3G networks for voice calls and SMS messaging.

24 | Cyber Risk Leaders Magazine

“This mishmash of technologies, protocols, and standards in telecom has implications for security,” he said. In other words, 5G networks in such deployments are exposed to legacy vulnerabilities inherent in these previous generation networks - such as the Diameter and GTP protocols, commonly used in the telecoms industry for 3GPP, GSM, UMTS, and LTE networks. Of particular concern are the “standards reliant on SS7 (Signaling System 7), a technology developed in the 1970s”, Puzankov explained, which “still continue to dominate.” Developed “in an era when only fixed-line operators had access to networks, and the stakes were much lower for questions of security,” he said. “It contains architectural flaws that make it vulnerable to a whole range of threats. These flaws can even be utilized to listen in on calls, intercept SMS messages, and instigate various forms of fraud.” Misconfiguration and software bugs also become points of compromise for potential attacks. “Intruders are attacking mobile networks from all possible angles, in part by leveraging multiple protocols in combined attacks,” he said. Securing the next generation digital infrastructure highlights from BlackHat Asia 2020 Highlighting a few scenarios of potential exploits – including bypassing firewall and tampering with data packets – he said, “an attack starts with actions in one protocol that are continued by actions in a different one,


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.