




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
Contents11.via-SIM66810132.-of141517183.-on20202123244.-Useof26ofthe26TheUSUse2729305.Be-by333434356.to-of37383842437.–toAreUsedbytheUSandLawforand47488.-to50505153549.on-ofonandPCs 5757theof58606110.-of6262theofthe636465-of68of69of7173741–78PAGEPAGE10IntroductionThenumberofglobalmobilesmartterminalusersishuge.The2023FactsandFiguresreportreleasedbytheInternationalTelecommunicationsUnion(ITU)inNovember2023showsthatthemobilephoneownershiprateamongtheglobalpopulationaged10andaboveis78%,andthecoverageofmobilebroadbandwith3Gandaboveinthetotalglobalpopulationis95%.Smartphonesarenolongerlimitedtothetraditionalcommunicationfunctionofoperators,butbecomethebasicentrancefordailyshopping,entertainment,socialinteraction,studyandlifeservices.Theyarealsonodesformobileofficesandevenidentitytokensforaccessingvariousgovernmentandenterpriseintranets.Butatthesametime,mobilesmartterminalssuchasmobilephonesalsolurkhugecybersecurityrisks.ComparedwithtraditionalPCs,theyhavewidersensingcapabilitiesandareequippedwithhigh-precisionsensors,aswellassignalcollectiondevicessuchascamerasandmicrophones.Throughthecollectionandanalysisofdataassetsonthedevice,itispossibletoconducttargeted,accurateportraitanalysisofthetargetedpersonnel'sworkandlifetrajectory,behavioralhabits,psychologicalcharacteristics,socialrelationshipsandsurroundingenvironment,andevencontrolthemobilephonethroughvulnerabilityexploitationandmalwaredelivery,soastorealizeall-roundwiretappingandsurveillance.Acompromisedmobilephoneislikeawalkingbugormonitor.Nosecretscanbekeptwhereveritgoes,andeverythingistransparenttotheattacker's"God'sperspective".Forsmartterminaldevicessuchasmobilephonesthathavebeenintroducedintomobileofficeenvironments,oncecompromised,higher-valuedataassetsrelatedtothetargetmaybeleaked.What'sworse,theymaybecomeabreakthroughandspringboardforattackerstoinvadetheintranetsofgovernmentandenterpriseinstitutions.MobilesmartterminalssuchasmobilephoneshavebeencovetedbytheUSintelligenceagenciessincetheirappearancebecauseofthehugevalueofdataresourcestheycontain.Overthepasttwodecades,amajorchallengefacedbyglobalcriticalinformationinfrastructureoperators,securityvendorsandresearchershasbeenhowtodiscover,analyze,andrespondtocyberattackslaunchedbytheUSintelligenceagenciessuchastheNationalSecurityAgency(NSA)andtheCentralIntelligenceAgency(CIA).ComparedwithtraditionalPCs,mobilesmartterminalssuchasmobilephoneshavemorecybersecurityexposureandattacksurfaces,includingtheterminaldevicelevelinvolvinghardware,firmware,systemsandapplications,theinformationinteractionlevelinvolvingdatainterfaces,Wi-Fi,Bluetooth,cellularnetwork,geographicalpositioningservicessuchasGPS,etc..Atthesametime,thesecurityofthemobilephonesystemisrelatedtothecomplexsoftwareandhardwaresupplychainsystem,theindustrialecologyofAPPs,thesignaltransmissionofoperatorsandthedatastorageandaggregationoflargeinternetplatformvendors.ThesearethelinkscovetedbytheUSintelligenceagenciesandthekeytargetstoattack.ThisreportgatherstogetheralargenumberofdisclosuresandanalysesfromtheindustryandacademiaonthenetworkintelligenceactivitiescarriedoutbytheUSintelligenceagenciesagainstmobilesmartterminals(seethefigurebelow).Itisclassifiedandintegratedfromtheaspectsofterminalequipment,communicationinfrastructure,operatorsandinternetvendors,inordertoformanoverallunderstandingofthecyberattackactivitiesandinformationacquisitionbehaviorsoftheUnitedStatesagainstmobileterminals,mobileindustrychainsandsupplychains,operatorsandlargeinternetvendors,soastoestablishsystematicpreventioncapabilities,effectivelycoverthemobileindustrychainandapplicationecology,criticalinformationinfrastructure,andgovernmentandenterprisenetworkscenarios.Chapter1to5focusonattacksbytheUSonthehardware,firmware,systemsandapplicationsofmobilesmartterminals.Chapter6to10focusonattacksbytheUSonoperatorinfrastructureandinternalsystems,withthelattertwochaptersfocusingoncombinationattacksonoperatorsandsmarttermi+nals.Chapter11re-analyzesthePRISMprogram,exposingtheintelligenceactivitiesoftheUSintelligenceagenciestoobtainmobilesmartterminaldatathroughthesuperdataaccessinterfaceofinternetvendorsandperformbigdataanalysis(seethefigurebelow).TheanalysisandresearchresultsdisclosedbyallwalksoflifearoundtheworldhavejointlyrevealedthattheUSwiretappingandsecrettheftoperationsagainstmobilesmartterminalsaroundtheworldarepervasive,unscrupulousandintensified.Chapter1. OvertheMobilePhoneviaSMS-HighlySophisticatedAttacksSIMCardVulnerabilitiesTheSIMcardistheuseridentificationmoduleofthemobilecommunicationsystemandisusedtoregisteruseridentificationdataandinformation.AnobviousfeatureofattacksexploitingSIMcardvulnerabilitiesisthattheattacksarenotrestrictedbyhardwaretype.Theoretically,allbrandsandmodelsofmobilephones,andevenIoTdevicesandwearabledeviceswithSIMcards,regardlessoftheoperatingsysteminstalled,canbeexploitedaslongasthereisavulnerabilityintheinsertedSIMcard.InSeptember2019,anIrishcybersecuritycompanyexposedanattackexploitingtheSIMcardvulnerabilitySimjackertotargetmobilephoneusersinMexico,ColombiaandPeru.ItpointedoutthattheattackisverysimilartotwoNSASIMcardattackequipmentMONKEYCALENDARandGOPHERSETexposedbySnowden.Fig.1-1ListofCasesofNSAAttacksExploitingSimjackerVulnerabilityIncidentReviewOnSeptember2019,AdaptiveMobileSecurity,acybersecuritycompanyheadquarteredinDublin,Ireland,exposedanattacktargetingtheSimjackervulnerabilityintheS@TbrowserofSIMcards[1].ThisattackactivitysendsspeciallyformattedbinarySMSmessagestomobilephones.IfthereisS@TbrowserintheSIMcard,itwilltriggerSimjackervulnerabilityandexecutesmaliciousinstructionstoachievemaliciouspurposesincludinglocatingandstealingsecrets.TheSimjackervulnerabilityattackisonlyrelatedtothefunctionalcomponentsembeddedintheSIMcard.Intheory,allbrandsandmodelsofmobilephonesinsertedwithaSIMcardcontainingthisvulnerabilitymaybeattacked,evenIoTdevicesandwearabledeviceswithSIMcards.AlthoughAdaptiveMobileSecurityonlydetectedattacksinMexico,ColombiaandPeru,SIMcardsprovidedbytelecomoperatorsin29countriesaroundtheworldatthattimecontainedthevulnerability,involving1billionusers.AdaptiveMobileSecuritypointedoutthatontheonehand,theSimjackerattackwasverysimilarto4exposedattacksthatexploitSIMcardvulnerabilities,includingtwoNSASIMcardattackequipmentexposedbySnowden;ontheotherhand,theperpetratorhadaverybroadrangeofskills,experienceandresources,hadaccesstoSS7(SignalingSystem7)networks,andhadspecificinterestinmobileusersincountriessuchasMexico.ItisbelievedthatNSAisoneofthefewattackentitiesintheworldwiththeabovecapabilitiesandcharacteristics.AttackMethodTheSimjackerTechnicalPaper[2]releasedinOctober2019pointedoutthattheSimjackerattackexploitedthesecurityconfigurationerroroftheS@TBrowserintheSIMcardissuedbysomeoperatorsofnotverifyingthevalidityofthereceivedmessagetoperformattackssuchasremotelylocatingthetarget.S@TBrowser(SIMallianceToolboxBrowser)isSIMcardbuilt-insoftware.ItsoriginalpurposeistoenableservicessuchasobtaininguseraccountbalancesthroughSIMcards,soitisnotwidelyknown.Asof2019,theS@TBrowsertechnologyhasnotbeenupdatedfor10years,butatthattime,thebrowserwasalegacytechnologyandwasdefaultedasabuilt-incomponentofmanybrandsofSIMcards.AdaptiveMobileSecurityanalyzedSimjacker'sattacksteps:Step1:Theattackerusesanordinarymobilephone,GSMmodemorA2PSMSservicetosendSMS-PP(point-to-point)typetextmessagestotheattacktarget.ThetargetedapplicationisS@TBrowserintheSIMcard.Step2:AftertheattacktargetreceivestheSMS-PPtypemessage,thelogiconthemobilephoneistriggered,andtheS@TBrowserbecomestheexecutionenvironmentontheSIMcard.TheSIMcardtakesoverthemobilephonetoreceiveandexecutesensitiveinstructions.Step3:Oncetheattackcoderetrievesinformationsuchaslocationandspecificdeviceinformation(InternationalMobileEquipmentIdentity,IMEI)fromthephone,itcollatestheinformationandtriggersthelogiconthephoneagaintosendthecombinedinformationtothereceiverviaa"DataMessage".Fig.1-2TheTechnicalProcessofSimjackerVulnerabilityAttackAdaptiveMobileSecuritybelievesthatintheory,thecommandsthatS@TBrowsercanexecuteincludeobtainingthecurrentlocationofthedevice,IMEIinformation,networkinformation,languageinformation,sendingSMS,playingaudios,startingthebrowser,etc.,soitcanevenusemobilephonestosendfalseSMS,makephonecallstocommittelecomfraud,openmaliciouswebsites,etc.CathalMcDaid,thechieftechnologyofficerofAdaptiveMobileSecurity,said[3]thatoneofthespecialfeaturesoftheSimjackervulnerabilityattackwasthatthevictimwascompletelyunawareoftheSMSreceivedwithattackmessagesandthedatamessagessent,therewasnoindicationinanySMSinboxoroutbox.Thesecondwasthattheattackmaybe"thefirstreal-lifecaseofmalware(specificallyspyware)sentwithinanSMS".PreviousmalwaresentviaSMSsimplysentitslink,requiringtheusertoclickonthelinktodownload.PreviousmalwaresentviaSMSinvolvessendinglinkstomalware,notthemalwareitselfwithinacompletemessage.Third,manyofitsattacksseemtoworkindependentofhandsettypes,asthevulnerabilityisdependentonthesoftwareontheSIMandnotthedevice.haveobserveddevicesfromnearlyeverymanufacturerbeingsuccessfullytargeted:Apple,ZTE,Motorola,Samsung,Google,Huawei,andevenIoTdeviceswithSIMcards.TraceabilityAnalysisInDecember2013,DerSpiegeldisclosed48typesofNSA'sANTattackequipmentexposedbySnowden[4].AdaptiveMobileSecuritypointedoutthattheSimjackerattackisquitesimilartotwooftheattackequipmenttargetingSIMcards-MONKEYCALENDARandGOPHERSET.GOPHERSETusestheSIM(STK)applicationinterfacetosendSTKinstructionstothedesignatedSIMcardtocollecttheotherparty'scallrecords,SMScontentandcontactlist,andsendstheextracteddatatothedesignatednumberthroughtheSMSservice.MONKEYCALENDARisaspywareimplantedintotheSIMcardsofGSMusers.ItisalsobasedontheSIM(STK)andismainlyusedtoobtainthelocationinformationofthetargetedSIMcard.AdaptiveMobileSecuritybelievesthatthesimilaritiesamongthethreeare:first,theattacksalluseSTKinstructions;second,theattackshavethesamepurposeandcanobtainlocationinformation,contactlist,SMScontent,calllogs,etc.;third,theyalluseSMStosendoutbounddata.Fig.1-3ANT'sCyberattackEquipmentMONKEYCALENDARAgainstSIMCardsFig.1-4ANT'sCyberattackEquipmentGOPHERSETAgainstSIMCardsOrganizationscarryingoutSimjackerattacksalsohavebroadaccesstoSS7networks.AdaptiveMobileSecurityhasdiscoveredthatsomeSimjackervictimssufferedsimultaneouscyberattacksviaSS7andbelievestheattackmethodisbeingusedasafallbackintheincidentthatSimjackerexploitsareunsuccessful.SS7isacommonchannelsignalingusuallyusedamongoffices.Itissuperimposedontheoperator'sswitchingnetworkandisanimportantpartofthesupportnetwork.TheSIM卡及移动端核弹漏洞密集爆发:近期网络战顶级数字武器解析(IntensifiedOutbreakof"NuclearBomb"VulnerabilitiesinSIMCardsandMobileTerminals:AnalysisofDigitalinRecentCyberreleasedin2019pointedoutthathackerswhocanlogintotheSS7networktolaunchattackshaveahighprobabilityofnationalbackgrounds.AdaptiveMobileSecurityonlydetectedactualattacksinMexico,ColombiaandPeru.AsearlyasJuly2013,ReutersquotedOGlobo,aleadingBraziliannewspaper[6]thataccordingtotheinformationexposedbySnowden,someLatinAmericancountrieshavebecomethemaintargetsofNSAsurveillance,especiallyColombia,Venezuela,BrazilandMexico.ThereportconfirmedthattheNSAhadaspecificinterestinmobileusersincountriessuchasMexico.AdaptiveMobileSecuritydidnotdirectlyidentifytheorganizationthatcarriedouttheattackbecauseofconcernsthatdisclosingspecifictraceabilitymethodswouldundermineitscapabilitytodetectandpreventSimjackerattacksonaglobalscale.However,basedonitsanalysisoftheoverallsituationoftheSimjackerattack,technicalcharacteristics,attackweapons,attackpaths,attacktargets,etc.,themastermindNSAhiddenbehindtheSimjackerattackhassurfaced.ExtendedAnalysisBasedontheinformationexposedbySnowden,ChinesecybersecurityvendorAntiycombedandfoundthattheAdvancedNetworkTechnology(ANT),asubsidiaryofNSA,hadasmanyas15kindsofattackequipmentforscanning,monitoringanddatacollectionofmobilecommunicationdevices,accountingforaboutone-thirdofalltheexposed48kindsofequipment[7].Fig.1-5ANT'sCyberattackEquipmentArsenalTheequipmentinvolvesbothsoftwareandhardware.Theequipmentformsincludemalwarepayloads,celltowers,basestations,signaltransceivers,mobilephones,etc.,whichcanbeusedincombinationtoachievecomplexattackobjectives.Tab.1-1ANTCyberattackEquipmentAgainstMobileCommunicationDevicesAttackEquipmentTargetedDevicesandFunctionsSoftwareImplantationMethod/HardwareDeploymentLocationDROPOUTJEEPDROPOUTJEEPisasoftwareimplantforiPhonesthatcanremotelypush/pullfilesfromthedevice.Thedatathatcanbecollectedinclude:SMS,contactlist,voicemail,geolocation,hotmic,cameracapture,celltowerlocation,etc.Command,control,anddataexfiltrationcanoccuroverSMSmessagingoraGPRSdataconnection.Theinitialreleasewillfocusoninstallingtheimplantviacloseaccessmethods.Aremoteinstallationcapabilitywillbepursuedforafuturerelease.GOPHERSETGOPHERSETisasoftwareimplantforGSM(GlobalSystemforMobilecommunication)subscriberidentifymodule(SIM)cards.Thisimplantpullsdatasuchascontactlist,SMSandcallrecordsfromatargetedhandsetandexfiltratesittoauser-definedphonenumberviashortmessageservice(SMS).ItisloadedontotheSIMcardusingeitheraUniversalSerialBus(USB)smartcardreaderorviaover-the-airprovisioning.MONKEYCALENDARMONKEYCALENDARisasoftwareimplantforGSMSIMcards.Thisimplantpullsgeolocationinformationfromatargetedhandsetandexfiltratesittoauser-definedphonenumberviaSMS.ItisloadedontotheSIMcardusingeitheraUSBsmartcardreaderorviaover-the-airprovisioning.TOTECHASERTOTECHASERisaWindowsCEimplanttargetingtheThuraya2520handset.ItpullsGPSandGSMgeolocationinformation,callrecords,contactlist,andotheruserinformationfromThuraya2520handsetandexfiltratesittoauser-definedphonenumberviaSMS.TheexistingversionneedstobedeployeddirectlyontheThuraya2520handset.Aremotelydeployableversionisunderdevelopment.TOTEGHOSTLY2.0TOTEGHOSTLY2.0isasoftwareimplantfortheWindowsMobileoperatingsystemthatisbasedonStraitBizarre(aspringboardbackdoorthatenablesquantuminjectionattacks).Thisfunctionalityincludestheabilitytoremotelypush/pullfilesfromthedevice,SMSretrieval,contactlistretrieval,voicemail,geolocation,hotmic,cameracapture,celltowerlocation,etc.Command,control,anddataexfiltrationcanoccuroverSMSmessagingoraGPRSdataconnection.Theinitialreleasewillfocusoninstallingtheimplantviacloseaccessmethods.Aremoteinstallationcapabilitywillbepursuedforafuturerelease.PICASSOModifiedGSM(targeted)handsetthatcollectsuserdata,locationinformationandroomaudio.ReplacethetargetedphonewithamodifiedGSMphoneCROSSBEAMCROSSBEAMisareusableCHIMNEYPOOL-compliantGSMcommunicationsmodulecapableofcollectingandcompressingvoicedata.ItcanreceiveGSMvoice,recordvoicedata,andtransmitthereceivedinformationviaconnectedmodulesor4differentGSMdatamodes(GPRS,CircuitSwitchedData,DataOverVoiceandDTMF)backtoasecurefacility.GSMcommunicationmodule,deployedonmobilephones.CANDYGRAMMimicsGSMcelltowerofatargetednetwork.WheneveratargetedhandsetenterstheCANDYGRAMbasestation'sareaofinfluence,thesystemsendsoutanSMSthroughtheexternalnetworktoregisteredwatchphones.GSMcelltower,deployedtothetargetednetwork.CYCLONEHX9EGSM(900MGz)macro-classNetwork-ln-a-Box(NIB)system.UsestheexistingTyphonGUIandsupportsthefullTyphonfeaturebaseandapplications.Macro-classNIBsystem,deployedtobasestations.EBSRMulti-purpose.Picoclass,tri-bandactiveGSMbasestationwithinternal802.11/GPS/handsetcapabilityGSMbasestation,deployedtothetargetednetwork.ENTOURAGEDirectionFindingapplicationoperatingontheHOLLOWPOINTplatform.Thesystemiscapableofprovidinglineofbearing(LOB)forGSM/UMTS/CDMA2000/FRSsignals.DirectionFindingapplication,deployedontheHOLLOWPOINTplatform.GENESISCommercialGSMhandsetthathasbeenmodifiedtoincludeaSoftwareDefinedRadio(SDR)andadditionalsystemmemory.TheinternalSDRallowsawittingusertocovertlyperformnetworksurveys,recordRFspectrum,orperformhandsetlocationinhostileenvironments.Handheldsignaltransceiver,carryitwithyou,noneedtodeploy.NEBULAMulti-Protocolmacro-classNetwork-ln-a-Box(NIB)system.LeveragestheexistingTyphonGUIandsupportsGSM.UMTS.CDMA2000applications.LTEcapabilitycurrentlyunderdevelopment.Macro-classNIBsystem,deployedtobasestations.TYPHONHXBaseStationRouter-supportingGSMbands850/900/1800/1900andassociatedfullGSMsignalingandcallcontrol.GSMBaseStationRouter,deployedtothebasestationgateway.WATERWITCHHandheldfinishingtoolusedforgeolocatingtargetedhandsetsinthefield.Handheldfinishingtool,carryitwithyou,noneedtodeploy.SimjackervulnerabilityattackisanapplicationcaseoftheUSANTattackequipment.Thetechnology,infrastructureandmethodsusedprovethattheUScyberattackcapabilitieshavemadeahugeleap.ThemostprominentpointisthattheUSnolongerneedstoinstallimplantsviacloseaccessmethodsorremoteinstallation(inthiswaytheattackerneedstoobtainthekeyofthetargetedSIMcard).MonitoringcanbestartedsimplyviaSMS,whichismorecovert.AdaptiveMobileSecuritybelievesthattheattackerhasbeenusingtheSimjackervulnerabilitytocarryoutattacksforatleasttwoyearsandmonitoredtensofthousandsofusersbeforeitwasdiscoveredandexposed.TheUSintelligenceagencies,representedbytheNSA,haveacompletesetofstandardizedmobileattackequipment,arecapableofconductingrigorouslyorganizedoperations,andtheiroperationsarehighlycovert.ReferencesAdaptiveMobileSecurity.SimjackerTechnicalPaper.2019./Simjacker-Technical-PaperSimjacker技术分析报告.2019./s/hTgJEzbOxM5KMAIYK5ir3wCathalMcDaid.SimjackerNextGenerationspyingviaSIMCardVulnerability.2019.https:///insights/simjacker-next-generation-spying-over-mobile/JacobAppelbaum,JudithHorchert&ChristianStöcker.CatalogAdvertisesNSAToolbox.2013.https://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.htmlSim卡及移动端核弹漏洞密集爆发:近期网络战顶级数字武器解析2019.https:///articles/14161AnthonyBoadle.NSA'spied'onmostLatinAmericannations:Brazilpaper.2013.https:///article/us-usa-security-latinamerica-idUSBRE96816H20130709/2023网络安全威胁回顾与展望.2024./research/notice&report/research_report/2023_AnnualReport.htmlChapter2. TheStolenKey-StealingtheEncryptionKeyoftheMobilePhoneSIMCardSIMcardencryptionkeysareanimportantpartofmobilecommunicationsandoneofthefoundationsforensuringcommunicationsecurity.TheauthenticationkeyintheSIMcardencryptionkeyparticipatesinthelegalityauthenticationofmobiledevicesenteringthenetwork,andplaysanimportantroleinensuringusercommunicationsecurity.ThiskeyisflashedintotheSIMcardbytheSIMcardmanufacturerduringtheproductionprocessandprovidedtothenetworkoperator.Butitisthis"key"thatensuresthesecurityofmobilephonecommunicationsthathasbecomethetargetoftheUSandBritishintelligenceagencies.From2010to2011,theUSandBritishintelligenceagenciescarriedouttheDAPINOGAMMAoperationagainsttheDutchSIMcardmanufacturerGemaltotostealmobilephoneencryptionkeys.Fig.2-1ListofCasesofDAPINOGAMMAOperationbyNSAandGCHQIncidentReviewOnFebruary20,2015,TheInterceptpublishedanarticletitledTheGreatSIMHeist-HowSpiesStoletheKeystotheEncryptionCastle[1]basedontheNSAdocumentsleakedbySnowden.Itwasdisclosedthatbetween2010and2011,theMobileHandsetExploitation(MHET)composedoftheNSAandtheBritishGovernmentCommunicationsHeadquarters(GCHQ),animportantorganizationofthe"FiveEyes"intelligencesystem,carriedoutanoperationcalledDAPINOGAMMAagainstSIMcardmanufacturerGemalto,aimingtostealtheauthenticationkeysusedtoensurethesecurityofcommunicationsbetweenpersonalmobilephonesandmobilenetworks.ThebehavioroftheUSandintelligenceagenciestostealmobilephoneSIMcardauthenticationkeysandthenobtainmobilephonecommunicationdatahasbeenfullyexposed.TheDutchcompanyGemaltoisoneoftheworld'slargestSIMcardmanufacturers.ItwasacquiredbytheFrenchmilitaryindustrycompanyThalesin2019.Around2010,itscustomersincludednearly450mobileoperatorsin85countriesaroundtheworld,anditproducedapproximately2billionSIMcardseveryyear[1].DocumentsleakedbySnowdenshowthatinitskeyharvesting"trial"operationsinthefirstquarterof2010,GCHQsuccessfullyinterceptedkeysusedbywirelessnetworkprovidersinIran,Afghanistan,Yemen,India,Serbia,IcelandandTajikistan[2].Inaddition,theUSandBritishintelligenceagenciescooperatedcloselyduringtheoperation.GCHQusedtheNSA'sXKEYSCOREsystemtoscreenandlocktargets,andtheSIMcardkeysitobtainedwerealsosharedwithNSA.AttackMethodLockingtargetsusingtheNSA'sXKEYSCOREsystem:MHETusedtheNSA'sXKEYSCOREsystemtointerceptalargenumberofemailsontheemailserversofGemaltoandmobileoperators.Throughanalysisoftheemailcontent,keypersonnelorcluesmaybefoundwhomayhaveaccesstoGemalto'scorenetworkandkeygenerationsystem.XKEYSCOREistheNSA'ssystemforretrievingandanalyzingglobalinternetdata.TheXKEYSCOREsysteminterceptsdatasuchasemails,internetcalls,internetchatrecords,andbrowsinghistoryinrealtimethroughserversdistributedat150sitesaroundtheworld[3].Analystscanobtainthecontentdataandmetadataofthetargetednetworkactivitiesthroughvariouskeywordssuchasname,phonenumber,IPandbrowser.Withthissystem,NSAcanhaveapanoramicviewofeverymoveofaspecifictargetontheInternet.XKEYSCOREalsohasgoodscalabilityandcanbeintegratedorinteractedwithNSA'sTURBULENCEcyberattackoperatingsystemtoautomaticallyanalyzenetworkinformationcollectedthroughotherchannelsandtriggertasklogic;itcanalsoacceptdatafromotherprojecttasks(forexample,datafromforeignsatellitecommunicationscollectionprojectSKIDROWE)andprovideanalysisandprocessingfunctions;XKEYSCOREalsoprovidessupportfortheuseandsharingofintelligencebytheFiveEyes(FVEY)countries[4].Duringtheemailinvestigation,MHETfoundthatGemaltousedemailorFTPtosendSIMcardencryptionkeystoitsglobaloperatorcustomersinbatches.Whenitcametotransmittingkeyfiles,Gemaltoonlyusessimpleencryptionmethodsthatwereeasytocrack,sometimeseventransmittingthekeyfilesdirectlywithoutencryptingthem.ThisextensivetransmissionmethodcreatedconditionsfortheUSandBritishintelligenceagenciestointerceptkeyfiles.IntrusionintoGemalto'sinternalnetwork:inordertostealSIMcardencryptionkeysmoreconvenientlyandaccurately,MHETalsoinvadedGemalto'sinternalnetworkandimplantedmalwareonmultipleinternalcomputers.ItprovidesaccesstoGemalto'sintranetandfindtargetsforinterceptingkeys.DocumentsleakedbySnowdenrevealthatMHEThassuccessfullyimplantedseveralGemaltomachines,mastereditsentirenetworkandprocessedtheacquireddata[5].Developingprogramstostealkeysinbatches:basedonpreliminaryreconnaissance,MHETsuccessfullyinterceptedinternetcommunicationdatabetweenmultipleGemaltopersonalizationcentersandmobileoperatorsandobtainedencryptionkeys.AnarticleontheInterceptwebsitestated,inonetwo-weekperiod,theyaccessedtheemailsof130peopleassociatedwithwirelessnetworkprovidersorSIMcardmanufacturingandpersonalization.Thisoperationproducednearly8,000keysmatchedtospecificphonesin10countries.Inanothertwo-weekperiod,byminingjustsixemailaddresses,theyproduced85,000keys[1].InordertofurtherstealtheencryptionkeystransmittedbetweenGemaltoandmobileoperatorsonalargerscaleandinlargerquantities,theUSandBritishintelligencepersonnelalsospeciallydevelopedaprogramtoautomaticallyinterceptandcollectkeys.Ithasalsobeenshownthatalthoughtheautomatedmethodisabletoreturnarepresentativesetofitemsfrombulkdata,itoftenfailstodetectallitemsthatwouldbefoundmanually[6].Notonlythat,GCHQalsolaunchedanoperationcalled"HIGHLANDFLING"in2011,withgoalsincluding:tolookatgettingintoFranceHQtogetintocoredatarepositories;togetinformationofpossibleIPsthatcouldleadtopenetrationintooneormorepersonalisationcentres;tostartprocessforanewsupplierGieseckeandDevriente[7].ExtendedAnalysisTheSIMcardencryptionkeysisanimportanttoolforidenti
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2024年云南省科技厅下属事业单位真题
- 新型通信系统设计考试题目及答案
- 公益组织会计的工作计划
- 2024年延安市人民医院招聘笔试真题
- 2024年湖南省科学技术厅下属事业单位真题
- 2024年湖北省乡村振兴局下属事业单位真题
- 成功的蜂巢软件设计师考试的试题及答案
- 如何提升品牌员工的认同感计划
- 2024年南宁上林县三里镇招聘笔试真题
- 2024年马鞍山经开区城管局招聘笔试真题
- 2024北京海淀区三年级(下)期末语文试题及答案
- 带电粒子在复合场中的运动教学设计
- 贵州省妇幼健康服务体系与能力提升实施方案
- 运维经理培训
- 事业单位停薪留职协议
- 2025年1月浙江省普通高校招生选考化学化学试题(解析版)
- 主播语音与发声知到课后答案智慧树章节测试答案2025年春上海电影艺术职业学院
- 贵州2025年02月贵州省卫生健康委员会部分直属事业单位公开招考141名工作人员笔试历年典型考题(历年真题考点)解题思路附带答案详解
- 《干细胞疗法简介》课件
- 《基于PLC的立式车床控制系统设计》13000字(论文)
- 出口海运操作流程
评论
0/150
提交评论