Risk
6/8/2009
10:50 AM
George V. Hulme
George V. Hulme
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Hackers Claim To Have Pwned US T-Mobile. As In: Everything.

It's not the kind of forum post an executive would like to see created about their company. It's not a leaked rumor about an upcoming product or service, or even a ranting upset customer. Nope. It's a group claiming to have controlled portions of your IT network for a long time. And they published what looks to be proof of the breach. T-Mobile is investigating.

It's not the kind of forum post an executive would like to see created about their company. It's not a leaked rumor about an upcoming product or service, or even a ranting upset customer. Nope. It's a group claiming to have controlled portions of your IT network for a long time.

And they published what looks to be proof of the breach. T-Mobile is investigating.This post hit the Full Disclosure security mailing list over the weekend:

Hello world,

The U.S. T-Mobile network predominately uses the GSM/GPRS/EDGE 1900 MHz frequency-band, making it the largest 1900 MHz network in the United States. Service is available in 98 of the 100 largest markets and 268 million potential customers.

Like Checkpoint Tmobile has been owned for some time. We have everything, their databases, confidental documents, scripts and programs from their servers, financial documents up to 2009.

We already contacted with their competitors and they didn't show interest in buying their data -probably because the mails got to the wrong people- so now we are offering them for the highest bidder.

Please only serious offers, don't waste our time.

If true, I wonder how much customer data has been compromised? I've a feeling that we'll find out soon enough, should the culprits not get what they're asking.

If they did get financial records, that could very well be a regulatory problem for T-Mobile, specifically with Sarbanes-Oxley compliance. But that may not be the biggest concern T-Mobile has at the moment.

To back up their claims, they published a list of servers that are purported to have been breached, including applicationIDs and IP addresses. The list includes a number of billing and collection systems.

Right now, it doesn't look good. But there's a chance the entire post is a hoax.

T-Mobile has issued a statement saying that it is investigating, and that the company would notify customers if there were any evidence that customer information was compromised.

This incident begs the question: is your company ready for such an incident? Well, as ready as one could be? How would your legal, HR, and incident response teams get engaged should this happen? What's the plan? How would you handle the preliminary customer calls and questions? Who in law enforcement would you contact?

The time to answer those questions is before something like this happens. Not cobbling together the response as it is happening.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0607
Published: 2014-07-24
Unrestricted file upload vulnerability in Attachmate Verastream Process Designer (VPD) before R6 SP1 Hotfix 1 allows remote attackers to execute arbitrary code by uploading and launching an executable file.

CVE-2014-1419
Published: 2014-07-24
Race condition in the power policy functions in policy-funcs in acpi-support before 0.142 allows local users to gain privileges via unspecified vectors.

CVE-2014-2360
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules allow remote attackers to execute arbitrary code via packets that report a high battery voltage.

CVE-2014-2361
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules, when BreeZ is used, do not require authentication for reading the site security key, which allows physically proximate attackers to spoof communication by obtaining this key after use of direct hardware access or manual-setup mode.

CVE-2014-2362
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules rely exclusively on a time value for entropy in key generation, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by predicting the time of project creation.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.