Investigating Threats Posed by SMS Origin Spoofing to IoT Devices (2310.11052v3)
Abstract: The short message service (SMS) is a service for exchanging texts via mobile networks that has been developed not only as a means of text communication between subscribers but also as a means to remotely manage Internet of Things (IoT) devices. However, the originating number of an SMS can be spoofed. If IoT devices authenticate administrators based on the originating number of an SMS, the authentication is bypassed via SMS origin spoofing. Consequently, IoT devices are at risk of accepting commands from attackers and performing unauthorized actions. Accordingly, in this study, the specifications of major cellular IoT gateways were evaluated by focusing on remote management via SMS, and the authentication bypass hypothesis was verified. The results showed that 25 of the 32 targeted products supported SMS-based remote management, and 20 implemented authentication based on the originating number of the SMS. Furthermore, by spoofing the originating number of the SMS, one product was demonstrated to be remotely exploitable through authentication bypassing. Thus, this study revealed the threats posed by SMS origin spoofing to IoT devices and proved that SMS origin spoofing not only threatens text communication between people but also puts machine communication at risk.
- 3GPP. 1999. TS23.040: Technical realization of the Short Message Service (SMS).
- 3GPP. 2010. TR23.888: System improvements for Machine-Type Communications (MTC).
- 3GPP. 2016. Standards for the IoT. https://www.3gpp.org/news-events/3gpp-news/iot-r14
- SMSPROTECT: An automatic smishing detection mobile application. ICT Express 9, 2 (2023), 168–176. https://doi.org/10.1016/j.icte.2022.05.009
- Open Mobile Alliance. 2010. OMA-TS-DM_Security-V1_3-20100525-C: OMA Device Management Security.
- Open Mobile Alliance. 2016. OMA-TS-DM_Protocol-V1_3-20160524-A: OMA Device Management Protocol.
- SoK: Security Evaluation of Home-Based IoT Deployments. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, San Francisco, CA, USA, 1362–1380. https://doi.org/10.1109/SP.2019.00013
- Understanding the Mirai Botnet. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, Canada, 1093–1110. https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/antonakakis
- PETIoT: PEnetration Testing the Internet of Things. Internet of Things 22 (2023), 100707. https://doi.org/10.1016/j.iot.2023.100707
- Firmware Update Attacks and Security for IoT Devices: Survey. In Proceedings of the ArabWIC 6th Annual International Conference Research Track (ArabWIC 2019). Association for Computing Machinery, New York, NY, USA, Article 4, 6 pages. https://doi.org/10.1145/3333165.3333169
- Squire Technologies Blog. [n. d.]. Why SMS is Purpose Built for IoT. Retrieved August 12, 2023 from https://squire-technologies.co.uk/blog/why-sms-is-purpose-built-for-iot-3
- Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures. IEEE Communications Surveys & Tutorials 22, 1 (2020), 616–644. https://doi.org/10.1109/COMST.2019.2953364
- MB connect line. 2022. Manual mbNET (MDH810 – MDH859 + MDH871 + MDH 876) - from HW 02. https://mbconnectline.com/download/manual-mbnet-mdh810-mdh859-mdh871-mdh-876-from-hw-02/
- Smart logistics based on the internet of things technology: an overview. International Journal of Logistics Research and Applications 24, 4 (2021), 323–345. https://doi.org/10.1080/13675567.2020.1757053
- Automatic Verification and Execution of Cyber Attack on IoT Devices. Sensors 23, 2 (2023), 733. https://doi.org/10.3390/s23020733
- GSA. 2023. NB-IoT & LTE-M March-2023 – Summary. https://gsacom.com/paper/nb-iot-lte-m-march-2023-summary/
- GSMA. 2018. The Internet of Things by 2025. https://www.gsma.com/iot/wp-content/uploads/2018/08/GSMA-IoT-Infographic-2019.pdf
- Ng Huiwen. 2018. Police warn of phishing scams targeting DBS Bank customers via SMS. The Straits Times. https://www.straitstimes.com/singapore/police-warn-of-phishing-scams-targeting-dbs-bank-customers-via-sms
- Security threats in M2M networks: a survey with case study. Computer Systems Science and Engineering 270 (2016).
- Akaki I/O. 2022. Analysis and Reproduction of Spoofed SMS-DELIVER. https://akaki.io/2022/analysis_and_reproduction_of_spoofed_sms-deliver
- Ankit Kumar Jain and B.B. Gupta. 2018. Rule-Based Framework for Detection of Smishing Messages in Mobile Environment. Procedia Computer Science 125 (2018), 617–623. https://doi.org/10.1016/j.procs.2017.12.079
- S-Detector: an enhanced security model for detecting Smishing attack for mobile computing. Telecommunication Systems 66 (2017), 29–38. https://doi.org/10.1007/s11235-016-0269-9
- Mike Just. 2011. Challenge-Response Identification. Springer US, Boston, MA, 198–199. https://doi.org/10.1007/978-1-4419-5906-5_73
- Securing IoT Devices Against Emerging Security Threats: Challenges and Mitigation Techniques. Journal of Cyber Security Technology (2023), 1–25. https://doi.org/10.1080/23742917.2023.2228053
- Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, San Francisco, CA, USA, 1153–1168. https://doi.org/10.1109/SP.2019.00038
- A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects. Computers & Security 112 (2022), 102498. https://doi.org/10.1016/j.cose.2021.102498
- Lantronix. 2023. X300 Series IoT Cellular Gateway User Guide. https://cdn.lantronix.com/wp-content/uploads/pdf/PMD-00153B-X300-UG-release.pdf
- Structural health monitoring of civil engineering structures by using the internet of things: A review. Journal of Building Engineering 48 (2022), 103954. https://doi.org/10.1016/j.jobe.2021.103954
- Sandhya Mishra and Devpriya Soni. 2020. Smishing Detector: A security model to detect smishing through SMS content analysis and URL behavior analysis. Future Generation Computer Systems 108 (2020), 803–815. https://doi.org/10.1016/j.future.2020.03.021
- Moxa. 2022. OnCell 3120-LTE-1 User’s Manual. https://cdn-cms.azureedge.net/getmedia/072255dc-19e6-455d-9aa6-14bd6b2bdff0/moxa-oncell-3120-lte-1-series-manual-v1.3.pdf
- Teltonika Networks. [n. d.]. RUT241 - 4G/LTE Wi-Fi Router. Retrieved August 12, 2023 from https://teltonika-networks.com/products/routers/rut241/
- oneM2M. 2019. TS-0005-V3.5.1: Management Enablement (OMA).
- Peter Pistek and Martin Hudec. 2020. Using sms for communication with IoT devices. Mobile Networks and Applications 25, 3 (2020), 896–903. https://doi.org/10.1007/s11036-020-01520-8
- CatalanGate: Extensive Mercenary Spyware Operation against Catalans Using Pegasus and Candiru. The Citizen Lab. https://citizenlab.ca/2022/04/catalangate-extensive-mercenary-spyware-operation-against-catalans-using-pegasus-candiru/
- SMS.to. 2023. International SMS Sender ID regulations and requirements (list of countries). https://support.sms.to/support/solutions/articles/43000562659-international-sms-sender-id-regulations-and-requirements-list-of-countries-
- Mathew Solnik and Marc Blanchou. 2014. Cellular exploitation on a global scale: The rise and fall of the control protocol. Black Hat USA. https://www.blackhat.com/docs/us-14/materials/us-14-Solnik-Cellular-Exploitation-On-A-Global-Scale-The-Rise-And-Fall-Of-The-Control-Protocol.pdf
- Toward Automatically Connecting IoT Devices with Vulnerabilities in the Wild. ACM Trans. Sen. Netw. 20, 1, Article 6 (2023), 26 pages. https://doi.org/10.1145/3608951
- Fredrik Stålbrand. 2022. The Global Cellular IoT Gateway Market. Berg Insight. https://media.berginsight.com/2022/10/31230209/bi-terminal6-ps.pdf
- {{\{{ATtention}}\}} Spanned: Comprehensive Vulnerability Analysis of {{\{{AT}}\}} Commands Within the Android Ecosystem. In 27th USENIX security symposium (USENIX security 18). USENIX Association, Baltimore, MD, USA, 273–290. https://www.usenix.org/conference/usenixsecurity18/presentation/tian
- Rory Tingle. 2020. Royal Mail warns of text scam claiming to offer free iPhone 11 Pro. Mail Online. https://www.dailymail.co.uk/news/article-7801183/Royal-Mail-warns-text-scam-claiming-offer-free-iPhone-11-Pro.html
- Akaki Tsunoda. 2024. Demonstrating Spoofability of an Originating Number when Sending an SMS using SMPP. Digital Threats 5, 1, Article 12 (2024), 13 pages. https://doi.org/10.1145/3615667
- New Security Threats Caused by IMS-Based SMS Service in 4G LTE Networks. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS ’16). Association for Computing Machinery, New York, NY, USA, 1118–1130. https://doi.org/10.1145/2976749.2978393
- Webdyn. 2022. MTX-Titan Software & Hardware User Guide. https://www.webdyn.com/wp-content/uploads/2022/02/MTX-Titan-software-hardware-user-guide.pdf
- Review of agricultural IoT technology. Artificial Intelligence in Agriculture 6 (2022), 10–22. https://doi.org/10.1016/j.aiia.2022.01.001
- Lte phone number catcher: A practical attack against mobile privacy. Security and Communication Networks 2019 (2019), 1–10. https://doi.org/10.1155/2019/7425235