Hackers steal call records from cell providers in ‘massive-scale’ espionage
Get link
Facebook
X
Pinterest
Email
Other Apps
-
The attackers are believed to be state-backed. Illustration by Alex Castro / The Verge
Hackers have stolen call records from over 10 cell providers worldwide as part of a “massive-scale” espionage attempt against at least 20 individuals, TechCrunch reports. The attack has been dubbed “Operation Softcell” by Cybereason, the security research firm that discovered it. It’s sophisticated enough that the firm believes there’s a “very high probability” it’s state-backed.
The target of the attacks are “call detail records,” which contain detailed metadata on every call made from an individual’s phone, including times, dates, and the cell-based location of the device. The content of calls are not held in these records, but the metadata alone is hugely valuable. If a carrier doesn’t realize that its network has been infiltrated, then the hackers could have access to this data in real time, and individuals would have no way of knowing that their data has been compromised.
Although the attackers have penetrated deeply enough into each service provider that “they could shut down the network tomorrow,” Cybereason’s head of security research, Amit Serper told CNET, their focus seems to be espionage, rather than disruption. The hackers appear to be targeting high profile government and military targets, whose movements and communications will be significantly compromised by the hack.
The attacks were first discovered a year ago, but go back by as many as seven years. The researchers say the attacks are ongoing, and that the hacker’s servers are still operational.
At least 10 unnamed cell networks across Europe, Asia, Africa, and the Middle East have been hit by the hack, which is not thought to have affected any North American providers. Cybereason says the hackers initially gained access to the networks by finding an exposed server or by using an old vulnerability, before penetrating through the network until they came to the caller data records database. The hackers created privileged accounts in order to easily regain access later, and in one case even set up a VPN connection to easily tunnel back into the network.
The sophistication of the attacks means that Cybereason believes the group is nation-state backed, and the techniques used match those of APT10, a notorious Chinese hacking group which was charged with stealing data from NASA, IBM, and other US tech companies last year. However, since this group’s tools and methods are now publicly available, the researchers say there’s no definitive proof that the group is behind the attack.
Although no US providers are thought to have been affected by the hack, the discovery of what appears to be a Chinese state-backed hacking attempt is likely to escalate tensions between the US and China. The Trump administration is concerned that China is willing and able to conduct cyber warfare against its enemies, and cited cybersecurity concerns when it placed Huawei on the entities list, over fears that the company could use its network equipment to sneak malware into US networks.
Source: Jon Porter|@JonPorty (The Verge). ~Best Feeds ™...
The top speeds cost top dollar, but you might not need the fastest drive T he price of an external storage drive is tied to a few factors: the amount of storage capacity you’re looking for, how fast the drive is at transferring your files, and its physical size. At this point, high-capacity external drives that require power adapters are surprisingly inexpensive. This is a great option for some, especially if lugging it around isn’t a big deal, or you rarely feel the need to unplug it. But those who are looking for something smaller, particularly a more travel-friendly USB-C drive that doesn’t compromise on storage capacity or speed, have a few different roads to take. As you might expect, it can get very expensive to find a drive that ticks all of these boxes. But thanks to the falling rates of SSD prices, you can get a fast external drive with a lot of storage capacity for less than you might expect. I tested a few 1TB USB-C solid state drives ranging in price from...
Giertz got tired of waiting for Elon Musk to release Tesla’s first pickup truck, so she made one herself. Simone Giertz was tired of waiting for Elon Musk to unveil his new Tesla pickup truck, so she decided to make one herself. The popular YouTuber and self-described “queen of shitty robots” transformed a Model 3 into an honest-to-god pickup truck, which she dubs “Truckla” — and naturally you can watch all the cutting and welding (and cursing) on her YouTube channel. There’s even a fake truck commercial to go along with it. Giertz spent over a year planning and designing before launching into the arduous task of turning her Model 3 into a pickup truck. And she recruited a ragtag team of mechanics and DIY car modifiers to tackle the project: Marcos Ramirez, a Bay Area maker, mechanic and artist; Boston-based Richard Benoit, whose YouTube channel Rich Rebuilds is largely dedicated to the modification of pre-owned Tesla models; and German des...
It is at least the fourth fatal crash involving Autopilot Illustration by Alex Castro / The Verge Tesla’s advanced driver assist system, Autopilot, was active when a Model 3 driven by a 50-year-old Florida man crashed into the side of a tractor-trailer truck on March 1st, the National Transportation Safety Board (NTSB) states in a report released on Thursday . Investigators reviewed video and preliminary data from the vehicle and found that neither the driver nor Autopilot “executed evasive maneuvers” before striking the truck. NTSB_Newsroom ✔ @NTSB_Newsroom NTSB issued preliminary report Thursday for its ongoing investigation of the fatal, March 1, 2019, highway crash near Delray Beach, Florida. The preliminary report is available at; https:// go.usa.gov/xmpBm 67 3:10 PM - May 16, 2019 Twitter Ads info and privacy 62 people are talking about this The driver, Jeremy Beren Banner, was killed in th...
Comments
Post a Comment