Kuro5hin.org: technology and culture, from the trenches
create account | help/FAQ | contact | links | search | IRC | site news
[ Everything | Diaries | Technology | Science | Culture | Politics | Media | News | Internet | Op-Ed | Fiction | Meta | MLP ]
We need your support: buy an ad | premium membership | k5 store

[P]
Customers of Telco Companies Face Privacy Breach (News)

By flaws
Sun Aug 15th, 2004 at 04:14:12 AM EST

Security

A security advisory posted on Bugtraq demonstrates how hackers can compromise customers of T-mobile wireless and Verizon (landline) voicemail boxes. The advisory talks about the use of Caller-ID spoofing the customers number, allowing a bypass of the PIN code since the voicemail thinks that the customer is calling to check their own voicemail. According to Secure Science Corporation, there has been no response from the vendors. Comments have been posted that T-Mobile has optional PIN code protection off by default. Better turn it on.


The sudden abundance of Voice-over-IP products out there grants hackers the ability to take what was once proprietary telephone technology and bring it to their own networks. This opens a whole new door for telecommunication security, including Caller-ID privacy screening and Caller-ID spoofing trivially by anyone with a VOIP phone and some packet-modification tools. The securityfocus advisory demonstrates that Caller-ID, similar to e-mail, is now a questionable communication protocol and has already affected the telecommunications companies. With the onslaught of spam, scams and phishing, this may be a new territory of exploitation for the bad guys as well.

Sponsors
Voxel dot net
o Managed Servers
o Managed Clusters
o Virtual Hosting


www.johncompanies.com
www.johncompanies.com

Looking for a hosted server? We provide Dedicated, Managed and Virtual servers with unparalleled tech support and world-class network connections.

Starting as low as $15/month
o Linux and FreeBSD
o No set-up fees and no hidden costs
o Tier-one provider bandwidth connections

Login
Make a new account
Username:
Password:

Note: You must accept a cookie to log in.

Related Links
o Bugtraq
o T-mobile
o Verizon
o Secure Science Corporation
o Voice-over-IP
o securityfocus
o More on Security
o Also by flaws


View: Display: Sort:
Customers of Telco Companies Face Privacy Breach | 28 comments (12 topical, 16 editorial, 0 hidden)
Another Example of VOIP flaws (none / 0) (#26)
by flaws on Mon Aug 16th, 2004 at 05:23:19 PM EST
(fl@ws)

Ureach is a web service that provides 1800 numbers to people, integrated with web, some optional software and phone lines. An example of another easy spoof is in one of their cgi features called call-back.

This feature allows you to call people back that have called you, but if you do a tcpdump on it, you can see that this can be taken advantage of.

Example

http://www21.ureach.com/7700d01OJT/cgi-bin/addrbk?func=di&greet1=2&greet 2=0&local=1234567890&remote=222-222-2222&name=You%20Suck&invis=1

This is obviously per session, so the 7700d01OJT will change per user, but within a session with ureach, you can actually input this in your browser, and it will call two numbers and connect them together. You can arbitrarily specify what numbers call what, but it's a primitive example of how Caller-ID spoofing is possible with just a few mistakes with some VOIP web cgi's.

T-Mobile customer here (none / 1) (#21)
by Xoder on Sat Aug 14th, 2004 at 07:53:07 PM EST
(Check@MyJournal) http://xoder.livejournal.com

Thanks for the heads up. I've got T-Mobile, and I've been meaning to do this, and in the search of the right option (8, for those who want to do it), I managed to enable automatic message playback mode so that when I have messages I don't have to hit 1 first, which is real nice.

In other news, they gave me free wireless web (WAP) access for the first 8 months, got me hooked, and now I don't want to pay US$5/mo to get it back. Farking drug dealers!
__
"Lately I've been hearing that god's on our side
But rumor has it, there's one on their side too
So what I'd like to know is
When it comes down to it, can my god kick their god's ass or what?" And

Telcos scare the shit out of me (3.00 / 19) (#19)
by xL on Sat Aug 14th, 2004 at 07:23:12 AM EST
(pi@madscience.nl) http://lab.madscience.nl/pim/

I spent a fair part of my life either working for telcos or for companies owned by telcos. The amount of ignorance to be found in such organizations is absolutely staggering. There probably were better times, when there were few telcos around and a lot of them were bureaucratic monopolies. The phone networks they were responsible for were mostly under control, the only people with meaningful access to those networks were the big telcos themselves.

It's not that, back in the old days, telco networks didn't have their fair share of security problems. Google around for 'blueboxing' and 'phreaking' to get a glimpse of that. These problems were mostly known, though, the telco's problems with mitigating them had little to do with a lack of understanding on their side, but more with the cost of upgrading infrastructure and the general slowness of the organization.

With the rise of SS7 and out-of-band signalling, telcos grew confident that they had their security problems tackled. All the historical efforts against security were geared towards rogue end users screwing things up from the short end of a circuit. The inner network was seen as a Black Box. Then telco deregulation and the internet came along and they never realized the gravity of their mistake.

Look at the inner LAN of any telco organization and you will find racks and racks of Sun and Cisco gear. Rolled in by bloated consultancy organizations and maintained by yet other bloated companies over fatass support contracts. These are immensely complex overengineered solutions and people understanding them in their entirety are far and between. Everybody else is scared to touch the network and gear unless if absolutely necessary and even then only if accompanied by a Change Request form filled in threefold. So Solaris never gets patched. IOS stays at the release it got when routers were installed. Only if actual outages occur because of an OS issue will you see any updates.

Management is done over telnet. The large support organizations doing the maintenance for the telco need to be able to do that without hassle, so generally there are root logins with tremendously simple passwords that are known throughout the entire company and they rarely change. You won't need to have taken classes in social engineering to get your hands on a lot of that kind of inside information. Security within telco networks is rotten to the core.

Add to this factor the rise of the multi-tier reseller business model that has risen out of the internet age and you have a recipe for disaster. More and more companies gain responsibility over a larger part of the traffic going towards end users than ever before. Instead of hundreds, there are now thousands and thousands of organizations that hook into the international SS7 signalling network, either directly or through a bigger telco. But guess what, the international telco network was never designed with the idea in mind that rogue organizations could tap into it directly. It is not at all clear to the telcos what kind of risks are associated with this loss of control they never anticipated.

ROR (3.00 / 5) (#10)
by cuz on Fri Aug 13th, 2004 at 04:30:55 PM EST
(holler@texas.co.jp) http://daphatspot.com/

I can just imagine some phone spammer wardialing for vulnerable mailboxes and changing the outgoing messages to viagra ads. +1FP

I have to PIN each time for Verizon wireless. -nt (none / 0) (#2)
by MrLarch on Fri Aug 13th, 2004 at 04:01:16 PM EST



Customers of Telco Companies Face Privacy Breach | 28 comments (12 topical, 16 editorial, 0 hidden)
View: Display: Sort:

kuro5hin.org

[XML]
All trademarks and copyrights on this page are owned by their respective companies. The Rest © 2000 - 2005 Kuro5hin.org Inc.
See our legalese page for copyright policies. Please also read our Privacy Policy.
Kuro5hin.org is powered by Free Software, including Apache, Perl, and Linux, The Scoop Engine that runs this site is freely available, under the terms of the GPL.
Need some help? Email help@kuro5hin.org.
If you can read this, you are sitting too close to your screen.

Powered by Scoop create account | help/FAQ | mission | links | search | IRC | YOU choose the stories! K5 Store by Jinx Hackwear Syndication Supported by NewsIsFree