GSM IMSI catchers preyed on a cryptographic misstep in the GSM protocol. But we have LTE now, why worry? No one has an LTE IMSI catcher, right? Wrong. [Domi] is here with a software-defined base transceiver station that will catch your IMSI faster than you can say “stingray” (YouTube video, embedded below).
First of all, what is an IMSI? IMSI stands for International Mobile Subscriber Identity. If an IMEI (International Mobile Equipment Identity) is your license plate, your IMSI would be your driver’s license. The IMEI is specific to the phone. Your IMSI is used to identify you, allowing phone companies to verify your origin country and mobile network subscription.
Now, with terminology in tow, how does [Domi] steal your IMSI? Four words: Tracking Area Update Request. When a phone on an LTE network received a tracking area request, the LTE protocol mandates that the phone deletes all of its authentication information before it can reconnect to a base station. With authentication out of the way [Domi] spoofs a tower, waits for phones to connect, requests the phone’s IMSI and then rejects the phones authentication request, all under the nose of the phone’s user.
Now, before you don your tinfoil hat, allow us to suggest something more effective. Need more cell phone related hacks? We’ve got your back.
Wouldn’t IMSI be tied to the SIM card, which can be moved to a different phone?
Remember, this is written from USA point of view, they only recently started getting phones with removable SIM cards.
ATT and Tmobile have always had removable sim cards. Only carriers like Verizon and Sprint recently started having them for certain devices.
Anyone on AT&T or T-Mobile cellular service has had SIM cards for a decade or so now. It’s only Sprint / Verizon who didn’t.
Yes, exactly. That’s what he meant with the car analogy — you can drive any car, but only with your driver’s license (IMSI, stored on a SIM). And each car has its own license plate (IMEI). One identifies you (or the person paying the phone bill) and the other identifies the phone.
Yes! My genius software engineer aka MENACE remotely installed his own Stingray software on a laptop and in my work laptop etc
But the fact that I went through over 60 different phones under different names and addresses
Yet they would immediately get compromised and
ALL CHANGED THEIR SIM CARD STATUS’s TO HOME
WTH??
It’s still good for tracking down protesters and the like.
IMO, you still can’t clone someone this way. There is IMSI and the Ki private key. Back in the day to clone sim cards you needed both. Ki was the hardest part. All of this required physical access to the sim.
What article are you reading about cloning sims ?
keywords: COMP128 simscan Dejan Kaljevic(rip 2015)
KI extraction finally became impossible around ~2005(in europe), thats when most providers swapped all sim cards for V2. V2 cards employ either read limit (64K reads = blocked card) or throttle valid responses (more than x reads per second = returns garbage).
There is a hoax about magical methods to extract KI from V2 using side channel power analysis …. by using ordinary sim reader and a “special” program :), said program is a repackaged Dejans simscan +trojan sending all extracted V1 KI + IMSI to the author of the scam.
Maaaaybe something like ChipWhisperer could work on later cards.
Knowing where an IMSI device is, is essential to being able to receive calls. So of necessity it must be possible for a switch to ask other networks if they can contact an IMSI. The handoff from one cell to the next requires that phones respond to queries from other cells. To avoid dropped calls, cells must maintain state on active calls and recently active calls as the unit may move between cells or propagation may cause a handoff.
Asking for a system that can’t track you is like asking for dry water.
FWIW I saw an HP communications monitors with the cellular base simulation option at a “buy it now” of $499. Which is a “stingray” without the marketing hype. Whatever the mobile communications system, it always needs a communications monitor for testing and servicing the equipment.
That won’t stop people asking for it though… much like the politicians in the US asking for a “front door key to encryption”.
LOL Asking for it, the world police asking for things since when..
They ask for it, so the judicial system can say no. Then they get it while the media is looking the other way.
A system which can’t track can exist but it would have to work by network flooding paradigm – i.e. no addressing exists on network layer and each communication is a broadcast of “to whom it may concern” encrypted packets. Each station checks if it can decrypt any received packet (and that means, if all functions as planned, all packets generated anywhere in the network!) and if it can recognize the packet as deemed for the receiving station.
It commands huge bandwidth for even modest traffic, and for modest network sizes. It also makes snooping inexpensive, provided the eavesdropper can solve the encryption.
This is rather sweet. If you are wondering how could this be used:
-work on the range to achieve at least >100m
-deploy at the entrance of every Police station
-deploy around your stash/crack houses
You just became Batman.
and if you think this is nothing special check out older Defcon (or maybe blackhat?) presentation where someone demonstrated this and secret service detail
(accompanying lying sack of shit NSA director) shat their pants
I dont Understand much technical vocabulary of this guy because I am not familiar with terms, do you know other tutorial to investigate more because I am a victim of this type of machines? I cant see if you can see the same screem of the victim. you can?
Regards.
It looks like this is for tracking targets, not eavesdropping. But it’s probably an important component of a system that can do the latter (under lte).
but yeah, most of us would benefit from a “for dummies” version of this article.