<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>digital security &#8211; EFR Technology Group</title>
	<atom:link href="https://www.efrtechgroup.com/category/digital-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.efrtechgroup.com</link>
	<description>We maintain technology so you don't have to!</description>
	<lastBuildDate>Fri, 28 Jun 2019 18:45:00 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.efrtechgroup.com/wp-content/uploads/2019/02/cropped-EFRTG-color-2-32x32.jpg</url>
	<title>digital security &#8211; EFR Technology Group</title>
	<link>https://www.efrtechgroup.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How a trivial cell phone hack is ruining lives</title>
		<link>https://www.efrtechgroup.com/tech/how-a-trivial-cell-phone-hack-is-ruining-lives/</link>
		
		<dc:creator><![CDATA[Randall]]></dc:creator>
		<pubDate>Fri, 28 Jun 2019 18:45:00 +0000</pubDate>
				<category><![CDATA[2-factor]]></category>
		<category><![CDATA[at&t]]></category>
		<category><![CDATA[bad password]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[digital security]]></category>
		<category><![CDATA[gear]]></category>
		<category><![CDATA[Gmail]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[opinion]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[services]]></category>
		<category><![CDATA[sim]]></category>
		<category><![CDATA[sim swapping]]></category>
		<category><![CDATA[sms]]></category>
		<category><![CDATA[t-mobile]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Twitter]]></category>
		<category><![CDATA[two-factorauthentication]]></category>
		<guid isPermaLink="false">https://www.efrtechgroup.com/how-a-trivial-cell-phone-hack-is-ruining-lives/</guid>

					<description><![CDATA[[ad_1] &#8220;This is still very raw (I haven&#8217;t even told my family yet),&#8221; Coonce wrote in an anguished Medium post. &#8220;I can&#8217;t stop thinking about the small, easy things I could have done to protect myself along the way.&#8221; On a Monday night in June, Matthew Miller&#8217;s daughter woke him up to say that his [&#8230;]]]></description>
										<content:encoded><![CDATA[<p> [ad_1]<br />
</p>
<div>
<p>&#8220;This is still very raw (I haven&#8217;t even told my family yet),&#8221; Coonce <a href="https://medium.com/coinmonks/the-most-expensive-lesson-of-my-life-details-of-sim-port-hack-35de11517124">wrote</a> in an anguished Medium post. &#8220;I can&#8217;t stop thinking about the small, easy things I could have done to protect myself along the way.&#8221;</p>
<p>On a Monday night in June, Matthew Miller&#8217;s daughter woke him up to say that his Twitter account had been hacked. He had no cell phone service; within a few days Miller lost his Gmail and Twitter account and $25,000 from his family bank account.</p>
<p>In Miller&#8217;s case, the attacker deactivated all his Google services, deleted all his tweets, and blocked most of his 10K followers. Once he got his phone number back from the hacker, T-Mobile let the hacker steal it a second time. &#8220;I&#8217;ve been considering changing my bank account number, social security number, and other accounts that are critical to living and working in the US,&#8221; Miller <a href="https://www.zdnet.com/article/sim-swap-horror-story-ive-lost-decades-of-data-and-google-wont-lift-a-finger/">wrote</a> in a post. &#8220;I am also freaked out about using cloud services so my strategy at the moment is &#8230; writing my passwords down on paper and leaving everything else off the cloud.&#8221;</p>
<p>Both men were victims of SIM-swap attacks, where someone uses pieces of personal information to convince your cell service provider to transfer (port) your number and associated phone account to a device in the attacker&#8217;s possession. With control of your phone number and account, they proceed to break into all connected accounts, usually beginning with email. The attacker changes info in your accounts so you can&#8217;t get them back, sets up email forwarding in case you regain control of your email, and goes through all your cloud-stored documents looking for things of value.</p>
<p>It is a uniquely personal and invasive attack. Thanks to Coonce and Miller, we now know a lot more about how these attacks are done, and how terrible the destruction is. In Miller&#8217;s case, we learned how unhelpful T-Mobile, Google, and Twitter were — with both Twitter and Google, Miller was stuck in a hell of filling out online account recovery forms and sending them off into an abyss of automated response. And for those wondering, Miller used two-factor (text/SMS) as an extra layer of security for his accounts. But with his phone out of his hands, it didn&#8217;t matter.</p>
<p><img decoding="async" alt="1155556290" data-caption="phone hacker" data-credit="Diy13 via Getty Images" data-credit-link-back="" data-dam-provider="" data-local-id="local-1-6003025-1561741963260" data-media-id="6f09f5cd-5241-4d8d-bec6-447f3d26b60b" data-original-url="https://s.yimg.com/os/creatr-uploaded-images/2019-06/e8bd6a20-99c7-11e9-af9f-dc1dfd62ca45" data-title="1155556290" src="https://www.efrtechgroup.com/wp-content/uploads/2019/06/How-a-trivial-cell-phone-hack-is-ruining-lives.jpeg"/></p>
<p>Miller eventually recovered his accounts, but only because he is special: In both <a href="https://www.zdnet.com/article/how-i-survived-a-sim-swap-attack-and-how-my-carrier-failed-me/">articles</a> about his experience, Miller mentions his &#8220;well-connected friends&#8221; at both companies who helped him out, as well as leveraging his platforms as a tech journalist.</p>
<p>That is both sobering and problematic, as few regular users have this kind of privilege and access. Like you probably are right now, I&#8217;m wondering what kind of hell everyone else would be in. Engadget reached out to both Twitter and Google for comment. We did not receive a response from Twitter by time of publication.</p>
<p>According to Google, victims of account hijacking should fill out <a href="https://support.google.com/accounts/answer/7299973">this claim form</a>. The company also posted information to mitigate SIM-swap attacks and hijacks in <a href="https://security.googleblog.com/2018/10/announcing-some-security-treats-to.html?m=1">this brief October 2018 post</a> about (the 2018) updates to Google&#8217;s Security Checkup process and sign-in security. Google also indicated that SIM swapping will not compromise a Google account that is protected by two-step verification.</p>
<p>Furthermore, the company said a non-SMS two-factor method (like a YubiKey) was an option only if the attacker knows the victim&#8217;s password. Google recommends <a href="https://support.google.com/accounts/answer/7026266?co=GENIE.Platform%3DAndroid&amp;hl=en">Google Prompt</a> or<a href="https://support.google.com/accounts/answer/1066447?co=GENIE.Platform%3DAndroid&amp;hl=en"> Google Authenticator</a>, with physical keys as the strongest form of two-factor. Google also said that SIM-swap attacks are rare and confined to specific targets, and that most people don&#8217;t need two-factor stronger than SMS (text-based).</p>
<p>Needless to say, Google&#8217;s email was a confusing response to the details we learned in the SIM-swap attack and account hijacks experienced by Coonce and Miller. And I, for one, believe that saying most people are fine with SMS as their two-factor, that most people shouldn&#8217;t worry about SIM-swap attacks, is too conservative to feel like safe advice.</p>
<p>Especially when we consider the context of two important things. First, that we&#8217;re hearing about SIM swaps more than ever and only from high-profile techies &#8212; we won&#8217;t hear about what&#8217;s happening to regular people. And secondly, there was a big breach which likely made an attack typically considered a high-effort, targeted attack, into a much easier way to grab cash and steal accounts.</p>
<h3>That T-Mobile data breach was actually a big deal</h3>
<p>Coonce uses AT&amp;T, while Miller uses T-Mobile and Google Fi. The SIM porting process for both networks has terrifyingly minimal security, both companies had customer pins exposed for an unknown amount of time in 2018, and T-Mobile suffered a fairly recent breach of all the info anyone needs to do a SIM-swap attack.</p>
<p>According to AT&amp;T <a href="https://www.att.com/shop/wireless/transferyournumber.html#q4">documentation</a>, all that is required for transfer is the information one could find on a recent cell phone bill: Account number, name of the account holder, billing address, and &#8220;pin or password if applicable&#8221; — noting that the minimal billing info is all that&#8217;s required if someone &#8220;can&#8217;t remember&#8221; their pin or password. It is the <a href="https://www.t-mobile.com/switch/#Transfer">same</a> for a T-Mobile transfer, just info on a bill, though they don&#8217;t state if a password or pin is required at all.</p>
<p>In August 2018, T-Mobile was hacked and the billing information of <a href="https://www.engadget.com/2018/08/24/hackers-access-millions-t-mobile-customer-details/">2.5 million customers</a> was stolen. The company reassured press by stating no financial data was compromised — but I&#8217;ll bet that wasn&#8217;t the point. It was all that juicy billing information, with which attackers can get way, way more by SIM porting and stealing people&#8217;s phone numbers and accounts.</p>
<p>The day after T-Mobile&#8217;s breach news, a researcher discovered that all T-Mobile and AT&amp;T customer account PINs had been sitting there for an unknown amount of time <a href="https://www.engadget.com/2018/08/25/t-mobile-att-pin-vulnerability/">exposed by website flaws</a>.</p>
<p>Obviously, the SIM porting processes at both companies should&#8217;ve been made way more secure a long time ago — about the time we started to live our entire lives through our phones. But it became even more urgent for T-Mobile to do so after their massive breach. Yet they didn&#8217;t, and here we are.</p>
<h3>SOS — Save our SIMS</h3>
<p><img decoding="async" alt="SIM card character holding crowbar" data-caption="SIM card character holding crowbar isolated on white background. 3d illustration" data-credit="Talaj via Getty Images" data-credit-link-back="" data-dam-provider="Getty Creative" data-local-id="local-22-8973876-1561742250355" data-media-id="d6a93cab-92e1-3273-9c3d-7bacf192244f" data-original-url="https://s.yimg.com/os/creatr-images/2019-06/93a231a0-99c8-11e9-b5db-8b49015f9287" data-title="SIM card character holding crowbar" src="https://www.efrtechgroup.com/wp-content/uploads/2019/06/1561747855_744_How-a-trivial-cell-phone-hack-is-ruining-lives.jpeg"/></p>
<p>It would be really great if there was a security trick or technique I could offer or recommend for people to do to prevent their SIMs from being ported (swapped, stolen). Like &#8220;here&#8217;s this extra, annoying security step you can add to your SIM account.&#8221; The truth is, cell carrier companies haven&#8217;t done much, if anything, to increase SIM security.</p>
<p>In January 2018, before <i>that</i> breach, T-Mobile quietly published <a href="https://www.t-mobile.com/news/unauthorized-porting-protecting-your-account">a post about unauthorized SIM porting</a> in which it recommends that customers add a secondary password to their accounts, which the company calls &#8220;port validation.&#8221; However, nothing about port validation is mentioned on T-Mobile&#8217;s <a href="about:blank">SIM transfer information page</a>, where a link could seriously raise customer awareness about this very serious threat.</p>
<p>On AT&amp;T&#8217;s &#8220;<a href="https://about.att.com/pages/cyberaware/ni/blog/porting">Prevent Porting to Protect Your Identity</a>&#8221; page, little is offered outside &#8220;don&#8217;t share your phone number&#8221; and &#8220;keep your inbox clean.&#8221; AT&amp;T&#8217;s only extra security step on offer is &#8220;Add all &#8216;extra security&#8217; measures to your AT&amp;T Wireless accounts.&#8221; Following <a href="https://www.att.com/esupport/article.html#!/wireless/KM1051397?gsi=l4t5z9">that link</a>, we learn that the &#8220;extra security measures&#8221; only make it so someone has to provide your pin when signing in online, getting secondary online access, or when in-person in a retail store.</p>
<p>Yeah, we&#8217;re scratching our heads, too. To be clear, AT&amp;T&#8217;s extra security measures are not anything extra, they just extend pin requirements to do online and in-person account management. Like T-Mobile, no information about unauthorized SIM porting or taking extra security measures is on AT&amp;T&#8217;s <a href="https://www.att.com/shop/wireless/transferyournumber.html">customer information page on SIM transfers</a>.</p>
<p>It&#8217;s bad. And it probably won&#8217;t change until an executive at T-Mobile or AT&amp;T experiences the stomach-plummeting terror of having their Gmail account taken (along with Google Photos, Google Drive, Calendar, Contacts) and any number of their other accounts raided — like with Miller and Coonce, their Coinbase accounts, and financial accounts drained.</p>
<h3>Security mistakes were made</h3>
<p>We can, however, learn from the security mistakes Coonce and Miller made before losing their SIMs and connected accounts. Both state in their write-ups that they are not security nerds, and admit they did some lazy things with general account security that they deeply regret. Coonce <a href="https://medium.com/coinmonks/the-most-expensive-lesson-of-my-life-details-of-sim-port-hack-35de11517124">wrote</a>, &#8220;Given my naive security practices, I probably deserved to get hacked  —  I get it. It doesn&#8217;t make it hurt any less (&#8230;)&#8221; In a heartfelt, raw plea concluding his writeup, Coonce tells readers, &#8220;I urge you to learn from these mistakes.&#8221;</p>
<p>So it&#8217;s pretty easy for attackers to steal our SIMs (port our phone numbers with the associated account onto a phone they control). Especially if you&#8217;re on AT&amp;T or T-Mobile and haven&#8217;t changed your pin <a href="https://www.engadget.com/2018/08/25/t-mobile-att-pin-vulnerability/">since all customer pins were found exposed in late 2018</a>. That means the security mistakes Coonce and Miller are referring to aren&#8217;t about securing our SIMs, their mistakes were in how their other accounts were — or weren&#8217;t — secured.</p>
<p>If we can&#8217;t protect our SIMs, we need to secure what they would give a stranger access to.</p>
<p>One way both men could have prevented the attackers from getting around two-factor is if they had instead used a physical USB security key, such as a <a href="https://www.yubico.com/">YubiKey</a> or <a href="https://cloud.google.com/titan-security-key/">Google&#8217;s Titan</a>, with accounts that are compatible with these keys. Yes, they can be a pain in the ass when you&#8217;re in a hurry, even if somewhat conveniently carried on your keychain with your house keys. Yet if someone can intercept your text messages without you even knowing it, it&#8217;s worth not losing your email account and having your bank balance drained so some jerkface thief can buy Bitcoin.</p>
<p>Coonce and Miller regretted having so much personal information about themselves floating around online, though it&#8217;s difficult to see how anyone can prevent breach data from being passed around. Coonce emphasized that people should use an offline password manager (such as <a href="https://www.lastpass.com/">LastPass</a> or <a href="https://1password.com/">1Password</a>) to create and securely store complicated passwords. This should be done instead of letting operating systems, browsers, or your Google Account save your passwords.</p>
<p>Miller in particular wished he hadn&#8217;t used the convenient &#8220;sign in with your Facebook/Google/etc account&#8221; buttons on apps and websites. &#8220;In the past I would just click the Facebook, Google, or Twitter button to setup an account or login,&#8221; he wrote. &#8220;I&#8217;m done doing that and gave up convenience for better security.&#8221;</p>
<p><span class="t-meta c-gray-4">Images: Diy13 via Getty Images (Hacker with phone); Talaj via Getty Images (SIM with crowbar)</span></p>
</p></div>
<p>[ad_2]<br />
<br /><a href="https://www.engadget.com/2019/06/28/cell-phone-hack-is-ruining-lives-identity-theft/">Source link </a></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
