More Holes Found in T-Mobile Website 183
mogwhat writes "Even though T-Mobile's website was decisively hacked into over a year ago by now (in)famous cracker Nick Jacobsen, a blog posting by computer security expert Jack Koziol details many serious security holes in various T-Mobile websites. You would think that T-Mobile would have paid attention the first time? Time to get a new cell phone provider!"
Can you pwn me now? (Score:5, Funny)
Can you pw*404*
Aaw crap. I guess he could.
Re:Can you pwn me now? (Score:1)
Re:Can you pwn me now? (Score:2)
Don't get it... (Score:4, Insightful)
Re:Don't get it... (Score:1)
You're getting confused with those online casinos.
Re:Don't get it... (Score:1)
Re:Don't get it... (Score:1)
Re:Don't get it... (Score:2)
Re:Don't get it... (Score:5, Informative)
Re:Don't get it... (Score:1)
btw i just canceled i'm going to get a nextel over the weekend.
Re:Don't get it... (Score:1)
Re:Don't get it... (Score:2)
Because the cracker is going through the courts, while the company which allowed other peoples' information to be released, and did nothing about it when they were found out isn't...?
Tmobile SUX (Score:4, Insightful)
And with all of this privacy concern, what kind of liability does that put T-Mobile at when sensitive market data can be compromised? *SCARY*
Re:Tmobile SUX (Score:4, Informative)
Re:Tmobile SUX (Score:1, Informative)
Re:Tmobile SUX (Score:1)
STMP? Simple Transexual Male Protocol?
Re:Tmobile SUX (Score:2)
I realize that by that logic the entire internet isn't really secure, but email is significantly worse than other systems because (by default at least) it has no method for stopping unauthentic
Re:Tmobile SUX (Score:2)
You could build a fortress out a 20 foot thick lead walls, and it wouldn't be "secure" because someone could shoot you on the street outside on your way there.
Re:Tmobile SUX (Score:2)
Re:Tmobile SUX (Score:2)
Disagree -- there exist, or can exist, systems with better security properties than encrypted email. On can, for instance, build a messaging system which will guarantee that the sender will be notified within [X] hours if the message hasn't been received by the recipient. Sure, the messanger you hired might be shot on his way over to your buddy's fortress (or his way back with the signed receipt) -- but you'll find out that he's missing.
Re:Tmobile SUX (Score:1)
Re:Tmobile SUX (Score:2)
If it's sensitive to anybody besides your company (e.g. comes under SEC, HIPAA, GLB, SOx, CA1798 etc.) then y'all are going to get crucified in your next audit...
Ah well... (Score:4, Informative)
I hate the feeling of being trapped to one provider because they have something the others don't, even though they treat their customers like complete and utter shit. T-Mobile customer service leaves quite a lot to be desired.
Re:Ah well... (Score:1, Flamebait)
Maybe it's because I can hear.
Re:Ah well... (Score:1)
I'm currently locked into a contract with Sprint for one more year and I can't
Re:Ah well... (Score:1)
Also, in the two areas I frequent (Chicago Metropolitan area and Downstate IL), I've never had ANY service problems or interference in normal conditions. So maybe we're talking about two different T-Mobiles.
Re:Ah well... (Score:2)
Well, I don't know how many other cell phone providers you have dealt with (being that you are hearing disabled) but I have dealt with a couple and currently T-mobile (as crappy as they can be at times) are a whole world apart from the others I have had the unfortunate luck to deal w
Re:Ah well... (Score:1)
Oh yeah, I've had those problems. Actually, it's been happening ever since the Sidekick II was released. They recently had an extended downtime for "system upgrades" (which didn't change a damn thing at all... Emails keep bouncing, AIM refuses to sign on, webpages fail to load) and yes, they keep shrugging it off and blaming me. Feh.
Re:Ah well... (Score:2)
I've had T-Mobile since May, when I bought the Sidekick Color and upgraded to Sidekick II back in October. In recent months my friends and I would simultaneously lose signal for no apparent reason (It is identified by one, two or three "dancing dots" at the top of the screen, as opposed to a "G" which means full connection). I've called them (via relay) on it several times. Most of the time they give me some half assed excuse (Scheduled system upgrade at 1:00pm on a Wednesday? Come on...)
I'm speaking f
Re:Ah well... (Score:1)
But good point... My friend has a Smartphone which I really like, though it has a numerical keypad. Whenever I get a job and my contract with TMo expires, I might look at my options and decide what to do.
Just wondering... (Score:5, Insightful)
Why is it that every time a Slashdot news story gets posted, a riducilousy inane comment or question has to be appended to the actual news item?
Could this be the lamest thing ever?
Re:Just wondering... (Score:1, Insightful)
Though if the submitter does append a question, the editor occasionally gives his own answer, or a link to some additional information he googled up before the story went live.
Re:Just wondering... (Score:4, Informative)
This said, I agree that the questions are sometime s lame (like this one). Probably submitters feel compelled to leave the blurb open-ended to start the thread of discussion, out of fear of seeing the "important news" fall flat on its face, and it sometimes really is quite annoying.
Re:Just wondering... (Score:2)
Could this be the lamest thing ever?
I'd just like to point out that this seems to be an unintentional metajoke.
Due to the mock inane question added to the end hahaha
Re:Just wondering... (Score:2)
Re:Just wondering... (Score:2)
Umm... (Score:5, Insightful)
Because of their website?
I'm willing to bet that the guy in charge of coding the backend for their site is not the same guy setting up the telephone network.
Re:Umm... (Score:5, Insightful)
Re:Umm... (Score:1)
Re:Umm... (Score:2)
Come to think of it, you're right. What is the point of this? But, anyway, the issue is account management and security, not the telephone network.
Re:Umm... (Score:3, Insightful)
I'm willing to bet that the guy in charge of coding the backend for their site is not the same guy setting up the telephone network.
Yes, but one could argue that a website is like a logo, or a sales sheet, or a press kit: it's what represents the values the companies want to convey across, and if they suck, there's a strong hint that the rest of the company may suck too. It's not always true though, as Microsoft, its shiny frontpage and not-so-good OS demonstrates, but more often
Attention All TMobile Customers (Score:5, Insightful)
Re:Attention All TMobile Customers (Score:2)
Re:Attention All TMobile Customers (Score:2)
Charging per text message is ridiculus. They need to stop that. 128 bytes for a text message puts thousands of times less burden on their network than a phone converstion.
Not little known (Score:5, Informative)
It's not a little known fact amongst people who follow the hacking/cracking/phreaking/carding scene, even loosely. Read the excellent book the hacker crackdown [mit.edu] by Bruce Sterling for an informative account of what the SS does (and also does spectacularly wrong).
Rant about T Mobile (Score:2, Flamebait)
and when I'd want to top up my credit I'd have to listen to a 5 mins of crap about how they had changed for the better, before being told I had to now wait 30 mins for my top up to take affect instead of the almost-instant old way. yay for progress.
that was several years ago. I left them a
Re:Rant about T Mobile (Score:5, Informative)
Re:Rant about T Mobile (Score:2)
Some people dont speak English at all!
Re:Rant about T Mobile (Score:2)
Some people dont speak English at all!
Well, their main customer base is american after all...
Re:Rant about T Mobile (Score:2)
That being the case, they could have called them selves "T-Cell" but this might result in some confusion, protests, and mayhem. "T-Cell - Get more from life!"
Re:Rant about T Mobile (Score:2)
Phone Company's (Score:5, Informative)
Security as PR, not as security (Score:5, Insightful)
"T-Mobile suffered some bad press for its lousy security, nothing more. It'll spend some money improving its security, but it'll be security designed to protect its reputation from bad PR, not security designed to protect the privacy of its customers."
And I seriously doubt if the treatment of security would be or is any better from any of the other cellular carriers.
- SR
Time to change the provider? (Score:2, Funny)
Obscured Security (Score:5, Interesting)
Time to get a new cell phone provider? (Score:5, Insightful)
But it won't protect your personal data. That is out of your hands and has been for the last thirty years or so. Your personal information has already been given away or sold by ChoicePoint, the government, the credit bureaus, and everyone else. Your only option is to assume it's gone, check your credit report regularly, and hope someone isn't using your social security number. Identity theft isn't something you can do anything to prevent. You can only catch it in time, and then hope you can fix it. Despite all the rosy stories about how after 300 hours of work people managed to clear their names, there are real stories of people who don't get their money and credit ratings back. There simply haven't been any solid studies one way or the other -- it's all anecdotal.
No, I'm not fucking bitter at all.
Re:Time to get a new cell phone provider? (Score:1)
ID theft doesn't happen online. The overwhelming majority of cases happen where someone snarfs the carbon copies from a credit card purchase out of the dumpster behind the 7-11. What can you do about it? Take the carbons with you (if you encounter an old-school carbon copy card thingamajob), and like you said, pay attention to your own credit.
You aren't liable for fraud perpetrated in your name. "ID theft" is a nice bu
Re:Time to get a new cell phone provider? (Score:2)
But: 70% of id theft is from insider data theft. The studies that say "most id theft is from stealing wallets/dumpster diving/etc" are talking about cases where people know how they lost the data. It's easy to know if your wallet's gone walkabout. Most people simply don't know where their data went or how. Search for "University of Michigan" and id theft to find the study. There is nothing that anyone can do about insider
Re:Time to get a new cell phone provider? (Score:1)
First - don't pay your bills on time. Wrack up lots of late fees, and never pay them.
Second - default on your student loans, if you have any.
Third - Don't pay your late fees and switch job frequently to aviod a wage garnish for the student loans you have defaulted on.
All this will result in a VERY poor credit rating. End result - no one wants my identity, and even if they did, they couldn't get a cred
Re:Time to get a new cell phone provider? (Score:2)
Re:Time to get a new cell phone provider? (Score:2)
netcraft (Score:5, Informative)
Re:netcraft (Score:2)
ASP or Java? (Score:4, Informative)
Re:ASP or Java? (Score:3, Interesting)
Re:ASP or Java? (Score:1)
Re:ASP or Java? (Score:2)
lesson number 2 of 4556832554 (Score:5, Funny)
do you...
a) tighten your security on your network so it doesnt happen again
b) appoligize and place it on your "things to do" list or
c) dont change a damn thing but pay snoop dog and company mega bucks to advertise your new sidekick II?
if your t-mobile then c is the correct answer!
Not a surprise (Score:2)
T-Mobile (Score:3, Funny)
Well... (Score:2, Insightful)
Sure pwning the network through their website doesn't help but you shouldn't be talking company secrets over a cell (for example) and not expecting someone, somewhere, to be able to hear you.
So? (Score:1)
Anybody fooling enough to assume that material posted to a t-mobile website is SECURE pretty deserves whatever they get...
Phones should stay phones (Score:2, Offtopic)
So? (Score:3, Insightful)
Another statement the article makes is that the text bug "could be used in a phishing attack on T-Mobile customers, especially if you hex encoded portions of the URL." How? Wouldn't any phishing attack involve making the form submit to some place besides the official website? Doing so much as trying to insert an HTML tag produces a server error (which, I'm guessing, is intentional), so it wouldn't even be possible to close the form and open a new one in its place that submits to a rogue site.
Bad coding (Score:2)
It's Worse then you think.... (Score:4, Interesting)
This is not a troll or a joke - it really happenned. I *like* T-mobile's phones...but their lack of security (well at least that one store's security anyway) scares me.
Re:It's Worse then you think.... (Score:3, Informative)
[Disclaimer: Slightly off topic].
I *like* T-mobile's phones...
Err, T-Mobile doesn't make phones. Since you can get any phone T-Mobile offers from online retailers, their phones shouldn't really influence your choice of provider. Unless you're willing to get roped into a contract for the sake of saving a hundred bucks on a phone. It's often not worth it. There are very good sites online to buy unbranded GSM phones, such as ustronics.com, mobilecityonline.com, and expansys.com to name a few. And good rev
NumberFormatException = Injection Vulnerabilty ??? (Score:1)
Since this is a Java exception I can't think of a way to exploit it. I happen to write Java web frontends on a daily basis and some of the pages will throw exceptions if fed malformed parameters. Where is the problem?
Re:NumberFormatException = Injection Vulnerabilty (Score:1)
Credit Card Numbers? (Score:2, Interesting)
T-mobile is about the only website I give my credit card number to. Could their weak system be the culprit? I don't know enough about hacking to know if this is possible, but it seems like quite a coincidence...
wow... (Score:1)
Re:wow... (Score:2)
Lol.
Makes me glad ... and wonder (Score:2)
Re:Makes me glad ... and wonder [correction] (Score:2)
guess I should have used the preview button.
not only does t-mobile suck on security (Score:1)
i chose them because of their inexpensive data rates and being the first on the market with the hp6315 ipaq phone. however they end up charging you minutes for calls that you don't answer and so many other miscellaneous things that i've already paid them the money to cancel my contract.
can one of you cell phone providers not suck?
Cross Site Scripting FAQ (Score:1, Informative)
http://www.cgisecurity.com/articles/xss-faq.shtml [cgisecurity.com]
Ze Germans (Score:2)
a BMP image on T-mobile's website??? (Score:2)
That's pretty sad when the web developer doesn't even know how to create a basic website correctly. I only noticed this because when pages load, BMP's load from the bottom up, not top down because the format is backwards.
Inaccuracies in the article (Score:2)
His very last example exploit showed clearly that the support.t-mobile.com site was in fact running on Resin, and the NumberFormatException indicates that at least in this case, the input parameters were being validated. You should notice that there is not a single class in the stack trace from a JDBC driver, and that the parameter was being converted to an integer. Hence no dang
Since when is a parseInt Exception an Injection op (Score:2)
In fact, the parseInt may protect the SQL from being manipulated. Likewise with the script tag injection. He tries it, it doesn't work. Admittely there is no nice errors message, but it still doesn't work.
This is just a tailgating article.
Re:Cell is already insecure (Score:1)
Re:Cell is already insecure (Score:5, Interesting)
Soooooo........how does your digital scanner breal the encryption?
Encryption in the GSM network utilizes a Challenge/Response mechanism.
The Mobile Station (MS) signs into the network.
The Mobile Services Switching Center (MSC) requests 5 triples from the Home Location Register (HLR).
The Home Location Register creates five triples utilizing the A8 algorithm. These five triples each contain:
A 128-bit random challenge (RAND)
A 32-bit matching Signed Response (SRES)
A 64-bit ciphering key used as a Session Key (Kc).
The Home Location Register sends the Mobile Services Switching Center the five triples.
The Mobile Services Switching Center sends the random challenge from the first triple to the Base Transceiver Station (BTS).
The Base Transceiver Station sends the random challenge from the first triple to the Mobile Station.
The Mobile Station receives the random challenge from the Base Transceiver Station and encrypts it with the Individual Subscriber Authentication Key (Ki) assigned to the Mobile Station utilizing the A3 algorithm.
The Mobile Station sends the Signed Response to the Base Transceiver Station.
The Base Transceiver Station sends the Signed Response to the Mobile Services Switching Center.
The Mobile Services Switching Center verifies the Signed Response.
The Mobile Station generates a Session Key (Kc) utilizing the A8 algorithm, the Individual Subscriber Authentication Key (Ki) assigned to the Mobile Station, and the random challenge received from the Base Transceiver Station.
The Mobile Station sends the Session Key (Kc) to the Base Transceiver Station.
The Mobile Services Switching Center sends the Session Key (Kc) to the Base Transceiver Station.
The Base Transceiver Station receives the Session Key (Kc) from the Mobile Services Switching Center.
The Base Transceiver Station receives the Session Key (Kc) from the Mobile Station.
The Base Transceiver Station verifies the Session Keys from the Mobile Station and the Mobile Services switching Center.
The A5 algorithm is initialized with the Session Key (Kc) and the number of the frame to be encrypted.
Over-the-air communication channel between the Mobile Station and Base Transceiver Station can now be encrypted utilizing the A5 algorithm.
Re:Cell is already insecure (Score:1)
Re:Cell is already insecure (Score:1)
Re:Cell is already insecure (Score:2)
Only the nerds among us are going to see the AMPS icon lit and think "oh, I better not say anything secret."
Re:Cell is already insecure (Score:1)
Re:Cell is already insecure (Score:1)
Lots of reasons it sucks. (Score:3, Informative)
The main reason for what you're seeing, though, is that unlike Europe, we have several competing standards. GSM is finally starting to spread, but additional standards are still common.
So 1: your phone has to match your network standard. If you're not using a GSM provider, you're pretty much left with nowhere but the provider (or an authorized reseller, which just sells the same phones anyway) to buy a phone. And even if you could buy a phone elsewhe
Re:so how does it work? (Score:2)
Re:so how does it work? (Score:2)
Of course they don't want you to cancel the subscription and walk to a less expensive competitor with the phone they paid but you did not yet pay back. So they lock your phone.
You can get the unlock code when some time has elapsed (and you paid back at