Mark R. Taylor
 
Take no prisoners!
 

http://americantruckersatwar.com
AmericanTruckersAtWar Discussion Group
http://youtube.com/ironponyexpress
 


--- On Mon, 9/15/08, milford421 [EMAIL PROTECTED]


 
Thanks to Ruthr.
Someone's been chatting a lot during the weekend, but picking up FEMA's
PBX network as 
their main carrier might not have been the smartest thing to do. Over 400
calls, lasting 
from three up to ten minutes were placed through their network, a breach made
possible 
due to an insecurely configured Private Branch Exchange system :
"A hacker broke into a Homeland Security Department telephone system over
the weekend 
and racked up about $12,000 in calls to the Middle East and Asia. The hacker
made more 
than 400 calls on a Federal Emergency Management Agency voicemail system in 
Emmitsburg, Md., on Saturday and Sunday, according to FEMA spokesman Tom
Olshanski."
Calls were placed to exotic locations such as Afghanistan, Saudi Arabia, India
and Yemen, 
with Sprint originally detecting the compromise and blocking all outgoing
long-distance 
calls from the location. If you're to assume a zero day vulnerability was
used in process 
you'd be wrong as an unpatched vulnerability is just as useful as a zero
day one :
"At this point it appears a "hole" was left open by the
contractor when the voicemail 
system was being upgraded, Olshanski said. Olshanski did not know who the
contractor 
was or what hole specifically was left open, but he assured the hole has since
been 
closed."
With no shortage of vulnerabilities allowing automated reconnaissance for
easily 
exploitable systems to happen, perhaps if you were to assume that you would be
targeted 
"in between" next to being exclusively targeted this wouldn't
have happened, as I doubt 
this phreaker knew he was using FEMA's network in the first place.
Dancho Danchev is an independent security consultant and cyber threats analyst,
with 
extensive experience in open source intelligence gathering, malware and E-crime
incident 
response. Dancho is also involved in business development, marketing research
and 
competitive intelligence as an independent contractor. He's been an active
security blogger 
since 2007, and maintains a popular security blog sharing real-time threats
intelligence 
data with the rest of the community on a daily basis. 

http://blogs.zdnet.com/security/?p=1765
August 21st, 2008

FEMA's PBX network hacked, over 400 calls made to the Middle East

Posted by Dancho Danchev @ 4:07 am

Categories: Hackers, Governments, United States of America

Tags: FEMA, DHS, VoIP, Private Branch Exchange, Dancho Danchev

Someone's been chatting a lot during the weekend, but picking up FEMA's
PBX network as 
their main carrier might not have been the smartest thing to do. Over 400
calls, lasting 
from three up to ten minutes were placed through their network, a breach made
possible 
due to an insecurely configured Private Branch Exchange system :

"A hacker broke into a Homeland Security Department telephone system over
the weekend 
and racked up about $12,000 in calls to the Middle East and Asia. The hacker
made more 
than 400 calls on a Federal Emergency Management Agency voicemail system in 
Emmitsburg, Md., on Saturday and Sunday, according to FEMA spokesman Tom
Olshanski."

Calls were placed to exotic locations such as Afghanistan, Saudi Arabia, India
and Yemen, 
with Sprint originally detecting the compromise and blocking all outgoing
long-distance 
calls from the location. If you're to assume a zero day vulnerability was
used in process 
you'd be wrong as an unpatched vulnerability is just as useful as a zero
day one :

"At this point it appears a "hole" was left open by the
contractor when the voicemail 
system was being upgraded, Olshanski said. Olshanski did not know who the
contractor 
was or what hole specifically was left open, but he assured the hole has since
been 
closed."

With no shortage of vulnerabilities allowing automated reconnaissance for
easily 
exploitable systems to happen, perhaps if you were to assume that you would be
targeted 
"in between" next to being exclusively targeted this wouldn't
have happened, as I doubt 
this phreaker knew he was using FEMA's network in the first place.

Dancho Danchev is an independent security consultant and cyber threats analyst,
with 
extensive experience in open source intelligence gathering, malware and E-crime
incident 
response. Dancho is also involved in business development, marketing research
and 
competitive intelligence as an independent contractor. He's been an active
security blogger 
since 2007, and maintains a popular security blog sharing real-time threats
intelligence 
data with the rest of the community on a daily basis. 



--~--~---------~--~----~------------~-------~--~----~
You received this message because you are a member of the "News Sarasota" 
Google group...

To read more, go to: 


http://www.newssarasota.com 
http://newssarasotaezine.talkspot.com 


To hear more, go to: 


http://thecaptainsamerica.podomatic.com 


Enjoy the priviledge you now share with others who want to know what others 
don't...

Thanks, 

Matt Bruce
Managing Editor
News Sarasota.com
Retired 25 Year Fire-Rescue Captain
Host Of:
"The Captain's AMERICA" Show
Heard From 12 noon to 1 PM ET Monday Thru Friday
LIVE On Net Talk World.com
Across America & Around The Globe At The Speed Of The Internet...
Weekend's Overnight on The Accent Radio Network...
Check Out:
http://thecaptainsamerica.com
http://www.nettalkworld.com

For more options, visit this group at 
http://groups.google.com/group/News-Sarasota...

To post to this group, send email to [EMAIL PROTECTED]

To unsubscribe from this group, send email to [EMAIL PROTECTED]
-~----------~----~----~----~------~----~------~--~---

Reply via email to