Transcript
wVyu7NB7W6Y • Exposing The Flaw In Our Phone System
/home/itcorpmy/itcorp.my.id/harry/yt_channel/out/veritasium/.shards/text-0001.zst#text/0385_wVyu7NB7W6Y.txt
Kind: captions Language: en this is lonus from lonus Tech tips and we hacked the phone network in order to spy on him that's pretty messed up Derek I slept easier not knowing that we intercepted his phone calls and stole his two Factor passcodes is that your number elus yeah uh but I didn't get I mine didn't even ring we didn't touch his phone we didn't send him an email or a text nothing we did it all remotely and the worst part is it could happen to you I think I'm really surprised that no offense but like you guys did it well you're not a career criminal hacker Mastermind necessarily indeed but here it is a normal looking and feeling device with no you know obvious problem with it and you just receive my call instead of me receiving it just what like on command you just it's an app on your computer or what I I don't even know but before we explain how we did all that [Music] the first startup that Steve Jobs and Steve wak made wasn't Apple no they were tackling a different problem one where their product was actually illegal so back in the 1970s long-distance phone calls were really expensive adjusted for inflation a call from New York to London could run you $25 a minute so these two entrepreneurs created a little blue box and what it did was it hacked the telephone Network they could trick the telephone company into connecting the calls for free among other things we were young and what we learned was that we could build something ourselves that could control billions of dollars worth of infrastructure in the world I don't think there would have ever been an Apple computer had there not been blue boxing was said you called the pope yeah we did call the pope was pretended to be Henry Kissinger and we got the number of the Vatican and we called the pope and they started waking people up in the hierarchy you know I don't Cardinals and this and that and and they actually sent someone to wake up the pope when when finally we just burst out laughing and they realized that we weren't Henry Kissinger but how were they able to do all of this with one electronic box made from Radio Shack Parts until the mid 1920s most phones had no way of dialing when your phone was on the hook about 48 volts was connected from The Exchange to your phone then when you lifted the receiver an internal circuit connected the speaker and microphone drawing power and that caused the voltage to drop to around 10 volts and at the telephone exchange this drop turned on a light bulb alerting the operator who would then pick up and ask who you're calling Boston sir get me the bluebird Diner and after Consulting a directory they would connect a wire between your line and your friends manually connecting calls was labor intensive operators had to handle hundreds of connections per hour in 1910 one pundit said soon the telephone system will need to employ every working age woman in the country as an operator by 1950 there were more than a million of them in the us alone to reduce costs companies sought to automate the call connection process and one solution was the rotary dial telephone to use it you place your finger in a number hole rotated to the end end and the dial rotates back and on the inside a metal disc with ridges turns each Ridge pushes two metal plates into contact completing the circuit to The Exchange the dial sends pulses to match each number for the number two it sends two pulses for the number three it sends three pulses this goes on up to 10 pulses for the number zero which is why zero is at the far end of the dial instead of B inside the one those pulses that travel down the phone line they determine how your line is connected so they're known as control signals but as the length of the transmission line was increased so did its capacitance and resistance and this caused the clear input signals to become distorted smoothing out voltage changes so now the pulses couldn't trigger the switching at the exchange while this wasn't a problem for local calls it made automating long distance almost impossible now all phone lines including longdistance ones were built to carry sounds in the human voice and hearing range mainly from 300 to 3,400 Hertz so why not use this built-in capability to carry control signals to do this phone companies introduced the touchtone or push button telephone on a keypad specific frequencies were assigned to the horizontal axis and the vertical axis so that each button was uniquely identifiable by the combination of two tones by sending control signals within the voice band all telephone networks could receive it using their existing systems independent of distance but with this Innovation came an opportunity for jobs and wnc to exploit when you made a long-distance call it was first routed to a central node this node communicated with a remote node and they determined if a line was free by checking whether both sides were sending a 2600hz tone so jobs and was exploited this first they would dial a toll-free 1800 number which would get them into a local node and then they would send a 2600 HZ tone into the phone this would trick the remote node into thinking the call had been disconnected so the remote node would start playing the 2600hz tone again but jobs and was were still on the line and when they stopped playing the tone on their side the remote node assumed a new call was being placed by sending a key pulse tone followed by the desired phone number and ending with a start tone they could connect to any longdistance number for free as the home node still believed it was connected to a toll-free number the vulnerabilities in the signaling system were obvious to mimic the 2600hz tone some people would even use a toy whistle from a CPP crunch serial box it just happened to make that frequency the telephone companies clearly needed to develop a new signaling protocol and their solution was to use a separate digital line for carrying control signals that way no one could control the network by sending tones Down The Voice line because it no longer controlled how the call was connected this new protocol was called signaling system number seven or ss7 for short and it's still broadly in use today but it may not be as secure as people thought hello my name is Latifa Al makum I was Princess Latifa of Dubai claimed that her father Shake Muhammad the ruling Amir had held her in solitary confinement in the dark beaten and sedated for several years in late February 2018 her Finnish martial arts instructor Tina helped her Escape they fled to a yacht captained by former French intelligence officer erve jber and for 8 days they sailed toward India Latifa was hopeful but it wasn't to last late on the night of March 4th a dark boat pulled up alongside it was sent by her father laser sights pierced the smoke as agents boarded the yacht abducting Latifa and taking her back to Dubai but how did they find her well the captain had been the victim of a coordinated ss7 Attack One aiming to pinpoint his location and by extension the whereabouts of The Princess and I'm going to show you how using the exact same steps to spy on my friends with their permission of course this is carsten NL and Alexandra de Ola they are cyber security Specialists who are helping me spy on lonus we took three steps to spy on him first you have to infiltrate ss7 second gain trust and third attack of course the main reason any of this is possible is step one when ss7 was introduced in 1980 mobile phones barely existed they were so big that they were mainly just used as car phones but things changed quickly the number of mobile phones in the world exploded roaming is one of the main use cases of ss7 say Derek you you visit me over here your phone would try to connect to a network that's foreign and that Network would then have to reach out to your home network in Australia asking is this a valid customer are you willing to to pay for the charges that they'll incure on my network and all of that information is exchanged over S7 for this to work Telos need to communicate with each other so the way they do that is by making sure they're part of the same Club the way they share membership to this club is by using unique addresses to identify where requests are coming from ss7 is a Global Network just like the internet and like on the internet you need some addressing scheme so you need some way of saying this is me and this is you and on the internet we use IP addresses on ss7 we use what's called Global titles GTS so to provide global roaming coverage Telos typically establish agreements with two providers in each country they serve one primary and one backup Telos generally accept messages only from Global titles with which they have agreements the whole system is designed to be a closed network with few barriers once inside this is known as the Walled Garden approach so this system seems pretty secure and it [Music] was when ss7 was developed in the'80s the telecommunic A's landscape was dominated by a few large reputable operators these operators had established relationships and mutual interest in maintaining the Integrity of the network but 45 years on the landscape has shifted dramatically now there are over 1200 operators and 4,500 networks many of which need ss7 access from virtual Network operators to Mass Tech Services sending Uber Eats notifications there are so many more players in the garden that not all of them are trustworthy those companies some of them um sell Services onto third parties some of them can be bribed some of them can be hacked so there's probably thousands of ways into ss7 at reasonable effort or cost how much are we talking like how much would it cost to buy access to ss7 buying a single ss7 connection isn't that expensive we're talking a few thousand per month the people who do sell access I mean why why would they do it people sell ss7 XS for one reason money and thanks to Global agreements between providers accessing a trusted GT is like gaining access to all the GTS they have Partnerships with we even saw the invoice of a valuable us-based GT being leased illegally for $113,000 a month are you buying access to ss7 I'm paying for access to ss7 yes and um we we do that because we do ss7 security tests so we need to be in a similar position as real hackers to get near Real Results so step one infiltrate ss7 is complete on to step two Gain trust hackers today can try many different things once they've scaled the wall into the garden but you need more than just ss7 access and a phone number to attack even a trusted GT and the phone number of the target isn't enough to to uniquely identify them now you need something from the SIM card the real key in a mobile network is a unique 15 digigit identifier which belongs exclusively to the SIM card on the phone it's called an international mobile subscriber Identity or imy for short and it is very important basically to be able to collect the M from a subscriber we would launch some of the messages such as s routing info or send info for these messages are normally used to collect the M networks have firewalls in place that will deny some requests if they look suspicious getting an m is crucial to appear trusted so let's move on to the critical step three attack do you want to just like try the phone is there anything you can try to see if it works like call someone or text someone sure I'll call my wife she normally pick up yeah she'll she'll probably pick up hello hello Yvonne this is the voice of your husband I would like to talk to you about the payment um okay by no no it's me it's me did she hang up on you yeah yeah she did so we've established the phone works as a completely normal phone do you have any important calls coming up I don't know if I'd say it's important but I'm on my way to Creator Summit tonight and uh James from hacksmith was going to call me and we were going to kind of make some plans uh I'm getting a call right now are you getting a call no hello this is lonus hey lonus it's James how's it going it's going really well how are you pretty good am I going see the YouTube Summit yes I'm really looking forward to that and man do I hate Max so I I I feel like that's your persona man you can't game on a Mac uh line you want to talk I I would like to talk but I I never got the call so what what number did you dial is that your number lonus yeah uh but I didn't get I mine didn't even ring I heard it ring but I heard it through my speakers on my computer cuz I assume it went to your phone then that's right or did it go to your computer no yeah it went to everything of mine so yeah James I don't know you called you called lonus and it went to me thank you for uh for taking part in this weird demonstration there is absolutely nothing here to indicate that I was supposed to receive a call yeah and I mean the crazy thing is that's like a regular Canadian SIM card in there so any Canadian SIM card in theory could be uh vulnerable to such an attack where you know someone dials your number and it just doesn't go to you this is like freaking but on a completely different level that's exactly it now I'm familiar already with the concept of sim swapping where you social engineer a way to get a sim that is registered to someone else's account we've actually had accounts stolen that way in the past but in this case my phone still works hello hey so the demo we're doing is pretty trippy hun uh basically they had hacksmith call me my phone didn't ring at all and instead Derek from veritasium picked up the phone call and was able to talk to him and hacksmith had no idea that he called me and then sorry I'm with Cindy oh oh hi Cindy oh you're not on speaker okay that's fine just tell Cindy hi for me okay bye so how are we able to seize control of Linus's number like that when you put a phone number in your address book you often don't put the country code but then if you're in a roaming scenar scario that phone number would connect to a completely different person in the country you are currently in so it does make sense to basically overrule people's choices as to whom they're trying to dial because they're they're not going to triple check each time whether their address book entries have have country codes in them this is a powerful function by tricking the network into thinking his phone is roaming we can rewrite the number he is calling to a number that we control and so what I did at the end when I received this message I sent back your number that you can see here was your us-based number so even if you were located in Australia I was still able to forward the call to you on your Us number in uh Australia that's amazing you just try a few times and then it works right yes it's it's not always that simple but this time I was quite difficult so the most important question I have now then is what did you need to steal from me in order to become me like is this something you can social engineer out of my career is this something that I would need to accidentally leak a screenshot of my IMEI at the very simplest all we would need is your phone number that's it you could even do something where I could act as a middleman where I would reroute the call to me but also simultaneously I would dial for you the real number and I would send you through to them and then I can sit on the line and just record that call yikes but this isn't the only attack we can do a lot more with ss7 we can also intercept text messages as part of our suite of attacks similar to phone calls we can trick the network into thinking the target is raming which reroutes their messages to our GT we can then steal onetime passwords used in two-factor authentication this type of attack works until the subscriber interacts with their phone network at which point the phone reconnects to the correct GT but you need a few seconds only to hack into somebody's account of course you need that few second window to received a onetime password so we actually set up a new uh lonus YouTube channel okay so theoretically he could get this username and password via uh a dump because I'm a butthead and I use the same username and password across different accounts uh or he could install a key logger on my system he could get it that way when I'm typing it in so then I verify my number but of course he has my number because that's realistically not that hard to find and theoretically I'm supposed to get a two-factor code right now except I got it 82299 I'm in he's in he hacked the main frame wild hey yep we can hack your YouTube account I'm going to start posting science videos on lineus Tech tips oh that's okay I'm sure they'll get like 30 million views or whatever so I'll be fine with it thanks for the AdSense deal and you could see the code right there exact so you could see it at the at the bottom 82299 so basically once the interception is running then I would receive any SMS sent he would never never have known that he missed those messages or that they were intercepted exact wow yeah this uh seems pretty serious I mean SMS two Factor authentication is almost the default right unfortunately yes it's not only the default but in some cases it is the only available option and sometimes that can even be for accounts that should be treated with the utmost of care like a bank account there's a third method of attack that we weren't able to show lineup lucky for him his Network blocked the requests on many networks you can use the M number and the switching Center info we harvested in step two to send a command deeper into the network by targeting the switching Center where the device with the MZ is connected we can issue a command routinely used for legitimate purposes such as routing and forwarding calls or providing Emergency Services based on the device's location using this request we can track a target's location it's not as hard as you'd think ss7 doesn't even rely on GPS to locate someone in fact it was invented before GPS was even in public use one way to do this is if a Target is in range of multiple cell towers their location can be narrowed down to where the signals overlap the more Towers in range the more precise the location a more accurate method measures the time it takes for signals to reach a phone from three towers by calculating the distance based on transmission speed we can pinpoint an exact location on a 2d plane but ss7 attacks don't use either of these methods they try to be subtle an ss7 location request simply identifies the cell tower the target is connected to in an urban area with many Towers this can place them to within 100 m you would definitely know which city block somebody is in and if you wanted to to for instance find out whether they're at home or at work this is a great way to do it yeah that's um it's it's a little bit scary in 16 carsten and his team used this method to track US congressman Ted Lou the congressman has been in in California more specifically the LA area let's zoom in here a little bit so that is how we did it we executed three steps we infiltrated ss7 gained trust and attacked we intercepted Linus's phone calls and text messages I'm not sure he was as excited about it as I was this is why we can't have nice things up until now this has just been a bit of fun I've demonstrated these attacks on a friend of mine but the threats are real and they can have devastating consequences they will kill her the captain texted shortly before Latifa was abducted his phone was the target of an ss7 attack that involved all three of the steps we explored to start the attackers had leased multiple GTS in different countries then the following all happened in a 5-minute window first they sent at least seven separate requests in to get the captain's M from his us-based operator when that didn't seem to work they followed up with at least four location requests so did it work well all of these requests were blocked by firewalls that's why we have all the details but there was a sixth GT we haven't shown this one nearby in the US we have no information about the requests on this GT because they likely weren't stopped we spoke with of black the investigative journalist who revealed the ss7 exploits in this story and this is what he told us it's a brilliant example of ss7 involvement because it illustrates a classic sophisticated pattern of attack multiple GTS and multiple countries it's a textbook example of Telco penetration risks though because the emiratis were also using other software like Pegasus and other Hardware like spotter planes we can't say that any single one of these was the thing that led to her being found but the evidence is damning and ss7 is used pretty widely criminals have used ss7 to intercept sms2 Factor authentication codes and empty millions of dollars from bank accounts for some ss7 is just the first step the NSO group a notorious Israeli cyber surveillance firm acquired an ss7 Tracking Company in 2014 NSO is the company behind Pegasus a spyware tool that gains complete access to targeted phones without a user clicking anything embedding itself and erasing traces of Entry such zero click hacks are costly they can cost more than $4 million per exploit before NSO commits resources targeting specific software or vulnerabilities on a phone first they gather basic data like device type and software version to make their lives easier and as you've seen with ss7 this isn't hard one expert we spoke to tested a foreign Network and found 20 to 30 VIPs were constantly under surveillance there including the country's chief of cyber security accurate data on tracking is difficult to come by but another expert provided evidence of more than 2 and A5 million tracking attempts per year though they reminded us that the people being targeted are generally those of interest to State agencies now we couldn't find data on interception attempts but luckily experts told us this is far less common so so millions of malicious ss7 requests are sent each year but it used to be even worse to request location over ss7 you used to be able to send a command without even knowing the MZ and the network would just provide it to you no questions asked the classical example is the anytime interrogation request which as the name already suggests is um kind of a creepy command I don't believe there's ever legitimate purpose for one network to send this command to another Network interrogating about their customers carsten NL and fellow security researcher to BS Engle exposed these vulnerabilities publicly in 2014 the ss7 research that was disclosed in 2014 was a wakeup call to the industry most people had heard rumors that ss7 tracking and spying was possible but they hadn't really seen hard evidence of it and especially how easy it is that a rag gang of Hackers from Berlin was very amateur means can do any type of ss7 hacking that they want after their conference all of the German Telos immediately started refusing these requests anytime intergation is the First ss7 Command everyone stopped because it was abused a lot and never used constructively but there is over 150 other messages that need to be stopped as well to make ss7 be completely secure so if there are so many ways to abuse ss7 why haven't we gotten rid of it well because it's the backbone of 2G and 3G Communications so what if we phase out 2G and 3G well that has caused problems since 2018 cars in the EU are equipped with mandatory emergency call buttons that trigger in an accident they need a SIM card to work and to cut costs guess what auto manufacturers are using that's right 2G and 3G SIM cards using ss7 half to have that Legacy support or when 4G connectivity drops you have absolutely nothing left dude the the number of times that I'm on 3G not insignificant and I'm in a metropolitan area what's surprising of course is that there hasn't been a global push yet to replace ss7 with one of the two newer versions of the technology the latest of which that was introduced with 5G seems pretty secure but that's now a problem of first mover dis Advantage so because of the network effects you get nothing out of adopting a technology as the first guy you want to be the last one when everyone else is already connected and you get the full benefit from also joining the club so even though the 5G signaling protocol can stop the attacks completely and many networks are using 5G technology on their networks when routing calls between networks ss7 is still the deao standard you create a tremendous amount of in to use a term that's probably more your channel than my channel that makes moving on extremely difficult so unless there are some new major events that put this back on on the public radar um it could be another 10 15 maybe even 20 years until ss7 networks are finally Switched Off what's crazy is that we exploited these vulnerabilities and I'm just a YouTuber I did have the help of some excellent security researchers but I'm surprised at how easy it all is now imagine if I had the backing of a government this is a real problem so what can you do to protect yourself on the personal side as long as you have a SIM Card unfortunately there's not much you can do about location tracking if possible choose alternatives to SMS Bas two Factor authentication so messages can't be intercepted use an authenticator app or Hardware tokens and if you're worried about phone tapping use encrypted internet-based calling services like signal or Whatsapp we've been told that is mainly used on people of Interest so should it really matter to you ss7 is a huge privacy intrusion and there's there's millions of abuse cases every single month whether privacy intrusion is a problem for everyone individually of course as almost a philosophical question right somebody who who grew up more in the berin tradition of the chaos Computer Club like myself strongly believes that that privacy and the ability to kind of form your own thoughts without being observed is a prerequisite for democracy but many other people would argue nothing to hide nothing to FEA our technological world will never be perfect by the time we secure or replace ss7 vulnerabilities will already have been found in the new system but luckily there's an easy way to be ready for whatever the future holds build your knowledge and problem solving skills a little bit every day and you can start doing that right now for free with this video sponsor brilliant brilliant has thousands of interactive lessons where you can learn by doing making you a better thinker and Problem Solver you build real skills in everything from math and data analysis to technology and programming you name it brilliant is designed to be uniquely effective their first principles approach helps you build understanding from the ground up so you'll not only gain knowledge of key Concepts you'll learn to apply them to real world situations all while building your intuition giving you the tools to solve whatever problems come your way brilliant's new course on data clustering for example equips you with the same tools security researchers like carsten used to spot Trends among the billions of ss7 messages this is really helpful when hunting hackers but the concepts you'll learn also help navigating a world where data influences everything from what movies are being recommended to National politics and one of the best things about brilliant is since every lesson is bite-sized you can can build your skills and sharpen your mind whenever and wherever you have a few minutes helping you build a daily learning habit that sticks the opposite of mindless scrolling to try everything brilliant has to offer for free for 30 days visit brilliant.org veritasium or you can scan the QR code or click that link in the description you'll also get 20% off an annual premium subscription so I want to thank brilliant for sponsoring this video and I want to thank you for watching