https://techcrunch.com/2018/11/15/millions-sms-text-messages-leaked-two-factor-codes/
By Zack Whittaker
TechCrunch
11.15.2018
A security lapse has exposed a massive database containing tens of
millions of text messages, including password reset links, two-factor
codes, shipping notifications and more.
The exposed server belongs to Voxox (formerly Telcentris), a San Diego,
Calif.-based communications company. The server wasn’t protected with a
password, allowing anyone who knew where to look to peek in and snoop on a
near-real-time stream of text messages.
For Sébastien Kaul, a Berlin-based security researcher, it didn't take
long to find.
Although Kaul found the exposed server on Shodan, a search engine for
publicly available devices and databases, it was also attached to to one
of Voxox's own subdomains. Worse, the database -- running on Amazon's
Elasticsearch -- was configured with a Kibana front-end, making the data
within easily readable, browsable and searchable for names, cell numbers
and the contents of the text messages themselves.
Most don't think about what happens behind the scenes when you get a text
message from a company, whether it's an Amazon shipping notification or a
two-factor code for your login. Often, app developers -- like HQ Trivia
and Viber -- will employ technologies provided by firms like Telesign and
Nexmo, either to verify a user's phone number or to send a two-factor
authentication code, for example. But it's firms like Voxox that act as a
gateway and converting those codes into text messages, to be passed on to
the cell networks for delivery to the user's phone.
[...]
--
Subscribe to InfoSec News
https://www.infosecnews.org/subscribe-to-infosec-news/
https://twitter.com/infosecnews_