Exposed: Critical Vulnerabilities in USSD Banking Authentication Protocols

Zaynab Lamoyero, Oluwatobi Fajana
{"title":"Exposed: Critical Vulnerabilities in USSD Banking Authentication Protocols","authors":"Zaynab Lamoyero, Oluwatobi Fajana","doi":"10.1109/CSR57506.2023.10224933","DOIUrl":null,"url":null,"abstract":"Unstructured Supplementary Service Data (USSD) authentication has been widely adopted as a popular method for verifying user identity and securing transactions in mobile financial banking, particularly in Sub-Saharan African countries. This is due to the convenience, speed, and accessibility since they do not require high-powered computing phones, large storage, or internet connectivity. However, like every technological advancement, this has been widely exploited by malicious actors due to weak authentication requirements. This study critically examines all 19 commercial banks in Nigeria, which has the largest USSD banking usage in Sub-Saharan Africa. We analyse 30 scenarios to conduct an anatomy and build a timeline of USSD banking attacks. Furthermore, we critically but anonymously examine each USSD banking platform against several security factors selected from government guidelines, the National Institute of Standards (NIST) SP800-63B framework and the National Cyber Security Centre (NCSC) recommendations. This led to the revelation that certain services only require a single authentication, such as PIN, while others require no authentication at all. Also, most of the banks failed to comply with governmental and industrial authentication standards. Furthermore, we present a 5-phase timeline of USSD attacks and address present recommendations for different stakeholders at the various stages.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSR57506.2023.10224933","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Unstructured Supplementary Service Data (USSD) authentication has been widely adopted as a popular method for verifying user identity and securing transactions in mobile financial banking, particularly in Sub-Saharan African countries. This is due to the convenience, speed, and accessibility since they do not require high-powered computing phones, large storage, or internet connectivity. However, like every technological advancement, this has been widely exploited by malicious actors due to weak authentication requirements. This study critically examines all 19 commercial banks in Nigeria, which has the largest USSD banking usage in Sub-Saharan Africa. We analyse 30 scenarios to conduct an anatomy and build a timeline of USSD banking attacks. Furthermore, we critically but anonymously examine each USSD banking platform against several security factors selected from government guidelines, the National Institute of Standards (NIST) SP800-63B framework and the National Cyber Security Centre (NCSC) recommendations. This led to the revelation that certain services only require a single authentication, such as PIN, while others require no authentication at all. Also, most of the banks failed to comply with governmental and industrial authentication standards. Furthermore, we present a 5-phase timeline of USSD attacks and address present recommendations for different stakeholders at the various stages.
暴露:美元银行认证协议中的关键漏洞
非结构化补充服务数据(USSD)认证已被广泛采用为移动金融银行验证用户身份和保护交易的流行方法,特别是在撒哈拉以南非洲国家。这是由于便利性、速度和可访问性,因为它们不需要高性能的计算手机、大容量存储或互联网连接。然而,就像每一项技术进步一样,由于身份验证需求薄弱,这已经被恶意行为者广泛利用。本研究严格审查了尼日利亚所有19家商业银行,尼日利亚在撒哈拉以南非洲拥有最大的美元银行业务。我们分析了30种场景来进行解剖并构建美元银行攻击的时间表。此外,我们根据政府指导方针、国家标准研究院(NIST) SP800-63B框架和国家网络安全中心(NCSC)建议中选择的几个安全因素,严格但匿名地检查每个USSD银行平台。这导致了某些服务只需要一个身份验证,比如PIN,而其他服务根本不需要身份验证。此外,大多数银行未能遵守政府和行业认证标准。此外,我们提出了USSD攻击的5个阶段时间表,并在不同阶段为不同的利益相关者提出了建议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信