Feeds

Phreakers seize government phone system

Department of Homeland (in)Security

Internet Security Threat Report 2014

Information technology workers at the US Department of Homeland Security are busy scraping egg off their collective faces after unknown hackers broke into their telephone system and racked up $12,000 in calls to the Middle East and Asia.

The hackers made more than 400 calls by accessing the voicemail system of the Federal Emergency Management Agency, a subagency of DHS, according to the Associated Press. The system had recently been upgraded, and it appears a "hole" was left open by the unidentified contractor who performed the job. A spokesman didn't identify the hole but said it has been closed.

One of the older tricks in the annals of so-called phone phreaking is breaking into private branch exchange systems by using passwords that are set by default during initial setup. Security-minded admins will see to it that those passwords are changed, but bureaucracy and inertia being what they are, that doesn't always happen.

Afghanistan, Saudi Arabia, India and Yemen were among the countries that received calls from the hacked FEMA account. Most of the calls lasted for about three minutes, but some were as long as 10 minutes.

Ironically, DHS, which is responsible for securing US infrastructure against terrorists, issued a warning in 2003 that unsecured PBXes were wide open to intruders.

"This illegal activity enables unauthorized individuals anywhere in the world to communicate via compromised US phone systems in a way that is difficult to trace," the bulletin read.

The AP story is here. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Managing SSL certificates with ease
The lack of operational efficiencies and compliance pitfalls associated with poor SSL certificate management, and how the right SSL certificate management tool can help.