Jump to content

ReVoLTE Exploit: Hackers can eavesdrop on mobile calls with $7,000 worth of equipment

Pickles von Brine
Quote

The emergence of mobile voice calls over the standard known as Long Term Evolution has been a boon for millions of cell phone users around the world. VoLTE, short for Voice over LTE, provides up to three times the capacity of the earlier 3G standard, resulting in high-definition sound quality that’s a huge improvement over earlier generations. VoLTE also uses the same IP standard used to send data over the Internet, so it has the ability to work with a wider range of devices. VoLTE does all of this while also providing a layer of security not available in predecessor cellular technologies.

The attack consists of two main phases: the recording phase in which the adversary records the target call of the victim, and the call phase with a subsequent call with the victim. For the first phase, the adversary must be capable of sniffing radiolayer transmissions in downlink direction, which is possible with affordable hardware for less than $1,400 [1]. Furthermore, the adversary can decode recorded traffic up to the encryption data (PDCP) when she has learned the radio configuration of the targeted eNodeB. However, our attacker model does not require the possession of any valid key material of the victim. The second phase requires a Commercial Off-TheShelf (COTS) phone and knowledge of the victim’s phone number along with his/her current position (i.e., radio cell).

 

The implementation error ReVoLTE exploits is the tendency for base stations to use some of the same cryptographic material to encrypt two or more calls when they’re made in close succession. The attack seizes on this error by capturing the encrypted radio traffic of a target’s call, which the researchers call the target or first call. When the first call ends, the attacker quickly initiates what the researchers call a keystream call with the target and simultaneously sniffs the encrypted traffic and records the unencrypted sound, commonly known as plaintext.

ReVoLTE has its limitations. Matt Green, a Johns Hopkins University professor who specializes in cryptography, 
explained that real-world constraints—including the specific codecs in use, vagaries in the way encoded audio is transcoded, and compression of packet headers—can make it difficult to obtain the full digital plaintext of a call. Without the plaintext, the decryption attack won't work. He also said that keystream calls must be made within about 10 seconds of the target call ending.

The researchers provide several suggestions that cellular providers can follow to fix the problem. Obviously, that means not reusing the same keystream, but it turns out that's not as straightforward as it might seem. A short-term countermeasure is to increase the number of what are known as radio bearer identities, but because there's a finite number of these, carriers should also use inter-cell handovers. Normally, these handovers allow a phone to remain connected as it transfers from one cell to another. A built-in key reuse avoidance makes the procedure useful for security as well.


Um... Yeah this a problem. The fact someone can snoop a cell network with off the shelf equipment is bad. It puts vital infrastructure at risk. If cell providers can put mitigation in place, that would be a good thing. For now, this is just a scary thing to think about. 

Hackers can eavesdrop on mobile calls with $7,000 worth of equipment
revolte-diagram-640x336.jpg
Source

 

Be sure to @Pickles von Brine if you want me to see your reply!

Stopping by to praise the all mighty jar Lord pickles... * drinks from a chalice of holy pickle juice and tossed dill over shoulder* ~ @WarDance
3600x | NH-D15 Chromax Black | 32GB 3200MHz | ASUS KO RTX 3070 UnderVolted and UnderClocked | Gigabyte Aorus Elite AX X570S | Seasonic X760w | Phanteks Evolv X | 500GB WD_Black SN750 x2 | Sandisk Skyhawk 3.84TB SSD 

Link to comment
Share on other sites

Link to post
Share on other sites

It's obviously not good but there are far easier ways to accomplish the same outcome, like 3G/2G downgrade attacks a la police Stingray devices and the like.

 

The biggest limitation, particularly if you're in an urban area, is actually determining the specific target's call from others in order to record it due to how heavily saturated radio layers are; Moreover the recording phase itself is non-trivial despite the relatively low cost of devices capable of doing it.

 

A lab demonstration of techniques like this and being able to accomplish it in the wild are very different things.

[ P R O J E C T _ M E L L I F E R A ]

[ 5900X @4.7GHz PBO2 | X570S Aorus Pro | 32GB GSkill Trident Z 3600MHz CL16 | EK-Quantum Reflection ]
[ ASUS RTX4080 TUF OC @3000MHz | O11D-XL | HardwareLabs GTS and GTX 360mm | XSPC D5 SATA ]

[ TechN / Phanteks G40 Blocks | Corsair AX750 | ROG Swift PG279Q | Q-Acoustics 2010i | Sabaj A4 ]

 

P R O J E C T | S A N D W A S P

6900K | RTX2080 | 32GB DDR4-3000 | Custom Loop 

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, HM-2 said:

It's obviously not good but there are far easier ways to accomplish the same outcome, like 3G/2G downgrade attacks a la police Stingray devices and the like.

Thankfully(?) most carriers are shutting down 2G and 3G service at the end of the year. Most Android phones should allow you to limit your connections to 4G/LTE only, although you may need to jump through a hoop or two.

PLEASE QUOTE ME IF YOU ARE REPLYING TO ME

Desktop Build: Ryzen 7 2700X @ 4.0GHz, AsRock Fatal1ty X370 Professional Gaming, 48GB Corsair DDR4 @ 3000MHz, RX5700 XT 8GB Sapphire Nitro+, Benq XL2730 1440p 144Hz FS

Retro Build: Intel Pentium III @ 500 MHz, Dell Optiplex G1 Full AT Tower, 768MB SDRAM @ 133MHz, Integrated Graphics, Generic 1024x768 60Hz Monitor


 

Link to comment
Share on other sites

Link to post
Share on other sites

8 minutes ago, BlueScope819 said:

So then how do police stingray devices work? You are saying they can be detected if your phone drops to 3G? I think that would be pretty noticeable.

They're basically 4G jammers- they operate as local base stations, overpower real transmitters within a small local area, and basically pretend they can't carry 4G which forces a device connected to it to downgrade to 3G or 2G. 

[ P R O J E C T _ M E L L I F E R A ]

[ 5900X @4.7GHz PBO2 | X570S Aorus Pro | 32GB GSkill Trident Z 3600MHz CL16 | EK-Quantum Reflection ]
[ ASUS RTX4080 TUF OC @3000MHz | O11D-XL | HardwareLabs GTS and GTX 360mm | XSPC D5 SATA ]

[ TechN / Phanteks G40 Blocks | Corsair AX750 | ROG Swift PG279Q | Q-Acoustics 2010i | Sabaj A4 ]

 

P R O J E C T | S A N D W A S P

6900K | RTX2080 | 32GB DDR4-3000 | Custom Loop 

Link to comment
Share on other sites

Link to post
Share on other sites

Thankfully this is an exploit of the base-stations, not the phones themselves--so a patch is likely to be made and deployed.

15" MBP TB

AMD 5800X | Gigabyte Aorus Master | EVGA 2060 KO Ultra | Define 7 || Blade Server: Intel 3570k | GD65 | Corsair C70 | 13TB

Link to comment
Share on other sites

Link to post
Share on other sites

45 minutes ago, BlueScope819 said:

Ah I see, but then 3G and 2G are vulnerable to certain exploits then I suppose? 

3G and 2G use KASUMI and A5/1 respectively, which are both insecure cryptographic ciphers. KASUMI is an order of magnitude harder to cryptanalyse, but easily possible on a modern desktop computer via a related-key attack within a matter of an hour or so. A5/1 has been broken (in terms of cryptographic security) since about 2002.

[ P R O J E C T _ M E L L I F E R A ]

[ 5900X @4.7GHz PBO2 | X570S Aorus Pro | 32GB GSkill Trident Z 3600MHz CL16 | EK-Quantum Reflection ]
[ ASUS RTX4080 TUF OC @3000MHz | O11D-XL | HardwareLabs GTS and GTX 360mm | XSPC D5 SATA ]

[ TechN / Phanteks G40 Blocks | Corsair AX750 | ROG Swift PG279Q | Q-Acoustics 2010i | Sabaj A4 ]

 

P R O J E C T | S A N D W A S P

6900K | RTX2080 | 32GB DDR4-3000 | Custom Loop 

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, BlueScope819 said:

So then how do police stingray devices work? You are saying they can be detected if your phone drops to 3G? I think that would be pretty noticeable.

Stingrays only work on 2G(GSM) , not 3G (UMTS)and 4G(LTE). They do so by overpowering the actual GSM tower and spoofing the same one. It's actually rather simple in theory. Also can be built from $1000 in parts. So the 2G GSM interception is a downgrade attack itself.

 

The LTE one described is more of a "copycat" scheme where the target is called and then immediately terminated first. So this is a big redflag if your phone calls get dropped in succession. This can be induced by again, overpowering the radio so it does drop the target's call and then re-establishes it with the same key.

Link to comment
Share on other sites

Link to post
Share on other sites

Sounds like something a secret agent in a van could afford.

Specs: Motherboard: Asus X470-PLUS TUF gaming (Yes I know it's poor but I wasn't informed) RAM: Corsair VENGEANCE® LPX DDR4 3200Mhz CL16-18-18-36 2x8GB

            CPU: Ryzen 9 5900X          Case: Antec P8     PSU: Corsair RM850x                        Cooler: Antec K240 with two Noctura Industrial PPC 3000 PWM

            Drives: Samsung 970 EVO plus 250GB, Micron 1100 2TB, Seagate ST4000DM000/1F2168 GPU: EVGA RTX 2080 ti Black edition

Link to comment
Share on other sites

Link to post
Share on other sites

I’d prefer my phone calls sounding crystal clear like a landline call thanks to VoLTE instead of sounding choppy back when 3G networks (especially GSM) would allocate tiny bandwidth for voice because most is used for data.
 

I wouldn’t be so worried about this since it’s not a vulnerability in phones. 

There is more that meets the eye
I see the soul that is inside

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×