
Phreaking Not Dead Yet 200
santos_douglas writes "From Wired comes this article about an exploit involving weak voicemail passwords and automated voice recognition systems for accepting collect calls. The providers involved, SBC and AT&T, don't seem too concerned about their customers receiving tens of thousands in fraudulant charges from places like Saudi Arabia and the Phillipines."
Old Voice mail exploit (Score:5, Interesting)
Re:Old Voice mail exploit (Score:5, Interesting)
1. Hack a direct dial voice mail #(after hours business)
2. Record the message "hello??.........Yes I'll accept"
3. Call Long distance operator to do a 3rd party billing for a call, give voice mail # to bill to
The call went through, regardless of the fact that the person calling her, and the person she called both had the same voice.
Re:Old Voice mail exploit (Score:2, Insightful)
From article:
[Quote]
Here's how the scam works: The default passwords that SBC issues to new users of their voicemail services are in a specific format and are easily guessed.
If the default password is not changed after the system is set up, it's ripe for exploitation by malicious hackers, who have been breaking into SBC voicemail systems and replacing the owners' recorded greetings with recordings of a voice saying "yes" at appropriate intervals.
[/Quote]
So, "you did that once?"
-dave-
Nike may lose money (Score:2)
Re:Old Voice mail exploit (Score:2, Funny)
Re:Old Voice mail exploit (Score:3, Funny)
I posted on a website how I scammed a large company.
Then I got arrested.
Social engineering more than phreaking (Score:5, Insightful)
Interesting read, just the same.
--
thank god !?!? (Score:4, Funny)
For a second I thought this meant all my friends with dialers would start calling me long distance. I hated that every five minutes.
please insert more money
hang on dude (holding dialer to hand set)
waiting as dialer mimics the sound of one quarter at a time
Re:Social engineering more than phreaking (Score:2, Insightful)
No, the article says that people are attacking the system with the default password that SBC sets when the voicemail is installed.
AT&T doesn't seem concerned because they are still charging people for the calls. (Gee, a 30% discount on a $10,000 phone call that a person did not make, how generous -sic.)
SBC probably doesn't care because it makes their competitor (or future competitor depending on your state), AT&T, look bad to consumers when the
AT&T (Score:2)
Re:How is it Social Engineering? (Score:2, Funny)
New here, huh?
Thats not 'Real Phreaking'! (Score:5, Funny)
Re:Thats not 'Real Phreaking'! (Score:1, Funny)
Re:Thats not 'Real Phreaking'! (Score:3, Funny)
Well yea, so does car jacking, volunteering for charity or skateboarding, but I don't think mom is gonna tell little Johnie to take his blue box, and go outside and get some fresh air....
Re:Thats not 'Real Phreaking'! (Score:2)
(I'm not joking, he really told me this)
So, how often did they let you visit your dad in prison?
Old Sk00l Phreaking (Score:1)
There was, and still is, great fun to be had with a 7/16" hex wrench.
I'm not old enough to have played with the Blue Boxes, but I sure got my kicks from Red Boxing calls all over the planet, and screwing with the COSMOS system.
Re:Old Sk00l Phreaking (Score:2, Interesting)
Re:Old Sk00l Phreaking (Score:3, Funny)
> Just walk up, plug in, dial away...
and get shot by the homeowner who figures you are cutting the phones before robbing his house.
I hope you have a "Plan B".
Re:Old Sk00l Phreaking (Score:2)
Re:Thats not 'Real Phreaking'! (Score:5, Interesting)
Re:Thats not 'Real Phreaking'! (Score:5, Funny)
It was designed that way so that linemen could use it beat the crap out of teenaged punks who they caught trying to steal their equipment.
Beige Box (Score:2)
Re:Thats not 'Real Phreaking'! (Score:2, Informative)
I've also got a really old one with the outside encased in rubber, and little prongs on the tiny rotary mech, so you could dial even with gloves on, at the top of a pole in any weather.
Dad was a lineman for MTS (Manitoba Telephone System). When he died I got all of this stuff, and a bunch of other cool stuff like climbing spikes and safety belts.
Note to all: don't install a
Re:Thats not 'Real Phreaking'! (Score:3, Funny)
Not dead yet? (Score:3, Funny)
Automated System Culpable (Score:5, Insightful)
Not only that, but AT&T is the one that chooses the default password, by picking something that is easily guessable they are doubly guilty of allowing this to happen.
Only paying 30% of a scam like this is shameful.
Re:Automated System Culpable (Score:4, Interesting)
Even worse (Score:3, Insightful)
Why can other systems (telemarketers, for example) tell that you've got an answering machine, but the phone company's can't?
And the article claims that they're happy with it that way:
I'll bet the people with the $12k bills
Re:Even worse (Score:5, Interesting)
Example: "YOu are about to accept a collect call. DO you accept?" (wait for 'yes', 'yep', 'uh-huh', whatever, interpret it, continue) 'To verify, please say the following word: (random word from set A)' (verify)
It wouldn't even take much effort. Suppose A includes 'toast', 'ummagumma', 'vaccum', 'moose', 'arbitrary', and of course, 'Forty-two'. They're all VERY distinctive, more so than 'nope' and 'yep', which they have to contend with anyway. Have, oh, 20 different lists, rotate them week to week (they're all on some server, not a problem there). Instant secure. Well, not absolute, but by an order of magnitude or 12.
Re:Even worse (Score:2)
This is similar to typing in a distorted word when signing up for a web site to prove you are a person and not a script.
Isn't it interesting that we finally found a practical use for Turing Tests?
Re:Even worse (Score:3, Informative)
"you have a collect call from "(name spoken by collect caller)" If you would like to accept charges say (random word or number) now. (pause) To accept charges say (same random word) now. To repeat this message press the # key"
The pause allows them to say 'umm what' and then figure it out. It's no harder than leaving a message on a voice mail system.
I originally thought of allowing the users to press a number on the telephone pad -- however that would allow them to input a sequence
Re:Even worse (Score:2)
No: if they are asked to press, say, 3, and respond by pressing 0123456789, they failed. Just check whether or not the first key pressed was the correct one. That way, any would-be abuser of the system has a 1 in 10 chance of getting through using a pre-recorded message, rather than the near-certainty they have wi
Re:Automated System Culpable (Score:4, Interesting)
...Not only that, but AT&T is the one that chooses the default password
Actually, SBC is at fault here. SBC is selling the voicemail system. SBC is setting the same default password for everyone.
AT&T is at fault for allowing someone's voicemail to accept collect calls and also by billing people that never made the calls.
Last, but not least, are the people that leave the default password on something.
Can't read the article but... (Score:3, Insightful)
We have had something like this happen at our company. The problem is not just the default password here...here is what happened (and yeah, this could be offtopic, but I found it interesting so maybe you will too)
Precursors to the condition:
1. We have multiple 800 numbers running into our phone bank.
2. Phones may be set up to forward phone calls to a remote number, including numbers overseas, if the user has the 4-digit password. (Yes, we actually have a need for t
Re:Automated System Culpable (Score:3)
There are posters in the labs *strongly* advising one to change their password once they login for the 1st time. As far as I know it works just fine. If the user continues to use their social security no. and somebody hacks it, the user is totally at fault here.
Since there is the question of huge monetary los
Phreaking (Score:5, Informative)
Re:Phreaking (Score:2, Informative)
phreaking
/freek'ing/ [from `phone phreak'] n. 1. The art and science of cracking the phone network (so as, for example, to make free long-distance calls). 2. By extension, security-cracking in any other context (especially, but not exclusively, on communications networks) (see {cracking}).
At one time phreaking was a semi-respectable activi
as always (Score:1)
Losers (Score:4, Insightful)
Not really new ... (Score:5, Informative)
You tell me who is right... (Score:4, Insightful)
concrete action to protect consumers from it."
OR
#2 --> "But AT&T spokesman Gordon Diamond said that AT&T has been instrumental
in stopping the scam."
CLUE
"Later Hatcher was told that AT&T would take 35 percent off her bill,
but she'd have to pay $8,000"
HMMMM.......
Quick summary of the exploit (Score:5, Informative)
We have a classic case of stupid users.
It's not that I don't feel for them. And I certainly think AT&T/SBC will start provisioning these systems with pseudorandom passwords as defaults. But if you don't change your password, and someone else finds out about it... that's no one's fault but your own.
Should the people who did this be punished? Absolutely, they clearly broke the law. But now, maybe people will begin to realize that security isn't something that they can leave up to third parties -- it's something they need to take in their own hands, lest they find themselves $12,000 up shit creek and lacking any means of locomotion.
levine
Re:Quick summary of the exploit (Score:3, Insightful)
While it is foolish for the user to not change his/her password, that pales in comparison to the blatant negligence on the part of the voicemail provider, who presumably has plenty of resources and expertise at their disposal, though obviously not evidenced in this fiasco.
Whoever is responsible for this scheme at SBC should be fired. And SBC should be responsible for the victims' bills.
Re:Quick summary of the exploit (Score:2)
It is an industry standard in the telecom world to provide a blatantly-obvious default password. As a poster mentioned below, cisco/cisco is pretty well known. I work for another large network equipment provider, and our default password is also our company name. Why? --because it saves us some headaches when we're doing initial installs, and it is the user's responsibility to insure their equipment is properly secured.
Whoev
Re:Quick summary of the exploit (Score:2)
Re:Quick summary of the exploit (Score:3, Insightful)
Re:Quick summary of the exploit (Score:4, Interesting)
Well I suppose it's not really restricted to phone systems (me stating the obvious here).... all I have to say is:
login: cisco
password: cisco
And then you can add 'stupid admins/BOFHs' to the list.
Re:Quick summary of the exploit (Score:1)
I agree with you in principle. Users should ultimately be responsible for the security of their accounts. After all, you do usually change the locks after buying a new house, right? The problem with this point of view, however, is that, as a computer geek, I am completely aware of how important it is to have good passwords for any kind of system. For other people this is not so obvious, and that is especially true in this case.
People are starting to realize that
What I don't get... (Score:2)
I can't belive ATT really wants to soak these people for $8k or whatever. it's idiotic.
Re:Quick summary of the exploit (Score:1)
Re:Quick summary of the exploit (Score:2)
A secure system cannot assume that a user, even one given formal training, will follow best practices. In this case, not putting in a forced password ch
Before everyone starts talking.. (Score:5, Interesting)
This ties in with our general hacker degredation. Phreaking is nearly gone, everything today is a DOS attack, a script kiddie, or a win32 virus, etc. Hell, I mutter "All your base..." in my compSci class and I am hard-pressed to find someone that can complete the phrase!
Sad, sad world...
Re:Before everyone starts talking.. (Score:1, Insightful)
Re:Before everyone starts talking.. (Score:2)
and it is spelled "cooties [bendcable.com]"
Re:Before everyone starts talking.. (Score:3, Interesting)
Passwords (Score:5, Interesting)
Rus
But here's the question (Score:5, Funny)
Here's the real question-should the people be forced to pay the bill because they were too dumb to not understand the words, "change your default password immediately." I say that we have already made things in life enough idiot-proof and AT&T has every right to ask them for thousands of dollars. Call it a "Stupid Bill".
Re:But here's the question (Score:2)
There is that bumper sticker, "Stupidity Should be Painful." Seems that finally is becoming the case.
I love how people fail to find themselves accountability for their own mistakes.
Re:But here's the question (Score:1)
Aunt May gets a voicemailbox last week and gets hacked, revceiving the similar sized bill as the sysadmin. Does getting a voicemail leave you with the same liability as running a website?
(btw the obvious answer is 'no')
And how DARE the phone company keep a collect call connected for over 6 hours, above ALL things this is the w
People are stupid...but.. (Score:1)
Re:But here's the question (Score:1)
The real answer is to charge them, but help the user sue the scammers for the business' money back as part of the lawsuit AT&T will surely file.
Now AT&T gets paid for their losses, the business pays for their stupidity in losing a
Re:But here's the question (Score:2)
Don't pay that bill! (Score:5, Interesting)
Don't pay the bill. Call a lawyer, write your congressman, and tell AT&T you WILL NOT pay, and ignore the collection agency. They have no right to engage in a shakedown like this; AT&T is reaping huge profits from the scam victims. This scam costs AT&T almost no money, yet they are reaping giant rewards. Seems like AT&T is the one running the scam.
Re:Don't pay that bill! (Score:3, Interesting)
Re:Don't pay that bill! (Score:1)
And your basis for saying this is...? You have a copy of the contract they signed where...? Your degree is from which law school...?
As someone said above... stupidity should be painful. This seems to be a step in that direction. Granted AT$T is making money off it, and it wouldn't be unwise to contest it. But sweeping generalizations about legality are just as silly as leaving the default password on your account.
Re:Don't pay that bill! (Score:2)
Maybe the box-owners whould secure their systems better, but the basic flaw in the system is that AT&T cannot determine whether a person reall
stop that, its not the users fault, (Score:1)
Turing test for phones.. (Score:4, Interesting)
Re:Turing test for phones.. (Score:2)
Re:Turing test for phones.. (Score:2, Insightful)
You just record & play back whatever they say. You could even use sox or something to fiddle with speed, noise, whatever, to make it sound less perfect.
Asking people to spell words or to complete an easy password cycle (like "Who's the current president of the USA?" or "Knock, knock?", etc. etc.) would be a lot thougher to beat. Thougher to implement too.
Re:Turing test for phones.. (Score:2)
that's not too long a wait for such a big company to get it's act together.
OK, the version number inflation joke is old. shame on me.
Default Password (Score:4, Insightful)
There is a solution however and I feel that the easiest would be for SBC to require users to change their passwords upon logging in for the first time. I know that voicemail systems which I have used have made that the very first step, before even allowing you to record your "I'm away" message.
Fix the problem and the rest will fall into place.
Re:Default Password (Score:2)
Re:Default Password (Score:2)
it is the phone companies responsibility to verify that the account holder has agreed to the charges.
imagine if someone stole your visa and the excuse that they used was your signature was easy to copy. this isn't a valid excuse for allowing the call to take place.
Re:"Default Password" is different then no passwor (Score:2)
I'm leasing a car. I don't have time to play 'lock the door'. It got stolen. Damn car dealer!
Re:"Default Password" is different then no passwor (Score:2)
That is a stupid analogy.
I rented a car just last week. The guy at the counter didn't say to me, "This car comes with a lock, but it doesn't really lock the car, so make sure you replace the lock right away with a better one." When a rental car is locked, it's locked. It isn't my responsibility to replace the lock. The lock that the car comes with might not be as good as a lock I can replace it with, but failing
An idea to improve the automated collect calls (Score:5, Insightful)
Sort of like the "Turing tests" that services like Yahoo and even Slashdot itself set up to foil automated registrations.
Re:An idea to improve the automated collect calls (Score:3, Insightful)
How could there be a group of people that have
Re:An idea to improve the automated collect calls (Score:3, Funny)
Re:An idea to improve the automated collect calls (Score:2)
Ultimately all you have to do is keep trying until the pattern matches, but even if there are only 20 variations that means y
Of course it easy money for AT&T (Score:3, Interesting)
Every time someone pulls this scam (not Phreak) AT&T makes money. In the two cases cited each one is worth about $8000 to AT&T.
Yes, some will fight the bill, and even win out against AT&T and SBC, but for every one who fights the charge hard enough to win, I'll bet that ten more just swallow and pay.
Uh, who knows, maybe SBS and AT&T are even making the calls, eh?
It would be interesting... (Score:1)
If this happened to me, I'd just tell the collection agency to take it to court. Then I'd explain what happened to a jury. Do you really think the average person would "buy" the argument from AT&T?
Also, they should be warned that they'
Not just user neglagence (Score:3, Interesting)
Re:Not just user neglagence (Score:2)
More on personal responsibility... (Score:3, Funny)
Comment removed (Score:4, Informative)
AT&T's fault! (Score:3, Interesting)
You can also get long distance calling cards this way too, I'm paranoid and I now dial these on the cord phone, then pick up the cordless. Are user's responsible for using encrypted phones?
AT&T is clearly at fault for accepting the charges. That is the part of the system that is the weak link, not the voicemail passwords. Someone could have hung an answering machine on their phone line. It's a ridiculous hole.
As for SBC, Their system asks you for your password BEFORE your mailbox number, and if it's right for the phone you're using, it doesn't ask for the mailbox. So, if you have the same password as the person whose phone you're using, you hear THEIR messages, and there is no way to listen to your own! It's rare, but it happens. Telcos are lame.
=Rich
BTW, pd [ucsd.edu] is the greatest, coolest, amazingest piece of linux software there is and hardly anyone seems to use it. You can make a DTMF decoder in no time, or generate any tones you need, and so much more! See the examples.....
I've got a totally different problem with this... (Score:2)
Until someone explains the contractual obligation involved, we're just talking crap.
Re:I've got a totally different problem with this. (Score:2)
current state of security sucks (Score:3, Insightful)
A couple of years ago someone apparently printed out checks from a laser printer with my name on them. Any jack-ass with a descent laser printer can make checks and a fake id.
Also today my wife's purse was stolen. I was helping her call credit card companies to cancel her cards. But the credit card companies wouldn't let me cancel them because I obviously wasn't my wife even though I had the answers to all their lame "security" questions.
The whole entire system is fucked up and easily beaten.
Re:current state of security sucks (Score:2)
Watch out for fraud! (Score:4, Informative)
I never call back numbers that I don't recognize. If it's important, they'll call me again.
Re:Watch out for fraud! (Score:2)
For more info check out http://www.lincmad.com/telesleaze.html
Re:Watch out for fraud! (Score:2)
The twist here was that when you phoned up, you heard a recording of an engaged tone. People would keep calling back until they gave up.
Expect similar scams in the US as SMS becomes more common.
where is the contract? (Score:4, Interesting)
AT&T screwed up with deploying voice recognition for this purpose (and presumably continuing to charge operator assist rates); that's their problem. I hope the lawyers are going to have a field day with them.
Blame the victim? Are you nuts? (Score:5, Insightful)
I see a hell of alot of posts to the effect "they kept the default password, they deserve the charges."
That's just stupid and shortsighted.
People balance security against realistic perceived risk. Realistic worst case risk for failing to reset my voice mail password: someone else hears my voice mail messages, deletes them without my ever hearing them, then records something embarrassing or damaging for my outgoing message. Bad, but perhaps I'm willing to live with that risk.
Getting hit with a $12,000 bill (or a $8,000 bill after AT&T generously reduces it) is completely unreasonable. Prior to reading this article, I didn't realize that this was a potential attack at all. I would have assumed that no company was stupid enough to let an answering machine accept charges on a phone call! You can't assess risks on attacks you aren't aware of. It's simply not possible to protect against all attacks (is your computer TEMPEST secure? Do you shred any documents you throw out with your social security number on them?). People need to balance risks against the cost to defend against them. Some people apparently decided against changing their password. They misjudged the risks because they were unaware that AT&T was doing something insanely stupid that could cost them alot of money.
Also remember that in many cases people are actively encouraged by their employers or service providers to not change the default passwords. I've specifically been told that in a number of cases. Depending on the reasonable risk level, I sometimes change the password anyway. I distinctly remember an ISP I was dealing with being shocked that I would want to change the factory standard password on the ISDN modem they sold us. If I changed it, how could they debug it remotely?)
Call Back, Dial Tone... the old days... (Score:2)
My first attempt at phreaking was with a software tone generator and a wal
Re:AT&T is responsible (Score:1)
Re:What's the purpose of this? (Score:1)
Re:AT&T bites (Score:2)