{"id":860,"date":"2009-07-18T14:10:30","date_gmt":"2009-07-18T18:10:30","guid":{"rendered":"http:\/\/rbach.net\/blog\/?p=860"},"modified":"2022-12-30T12:14:35","modified_gmt":"2022-12-30T17:14:35","slug":"weak-pbx-passwords-cost-55-million","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/weak-pbx-passwords-cost-55-million\/","title":{"rendered":"Weak PBX Passwords Cost $55 Million"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-111148 size-medium\" title=\"Weak PBX Passwords Cost $55 Million\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ILuvYourPC-5.jpg?resize=150%2C99&#038;ssl=1\" alt=\"Weak PBX Passwords Cost $55 Million\" width=\"150\" height=\"99\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ILuvYourPC-5.jpg?resize=150%2C99&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ILuvYourPC-5.jpg?resize=75%2C50&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ILuvYourPC-5.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>The <a href=\"https:\/\/www.usdoj.gov\" target=\"_blank\" rel=\"noopener noreferrer\">U.S. Justice Department<\/a> unsealed indictments against three Filipino residents on 06-12-2009 for an international PBX hacking scheme. According to <em><a href=\"http:\/\/voices.washingtonpost.com\/securityfix\/2009\/06\/default_passwords_led_to_55_mi.html?wprss=securityfix\" target=\"_blank\" rel=\"noopener noreferrer\">Security Fix<\/a><\/em>, the three are accused of hacking into thousands of private telephone networks in the U.S. and abroad, and then selling access to those networks at call centers in Italy that advertised cheap international calls and used the profits to help finance terrorist groups in Southeast Asia.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-111141 size-medium\" title=\"broke into PBX and voice mail systems, mainly by exploiting factory-set or default passwords\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phone_money-1-e1572191473400-150x115.jpg?resize=150%2C115&#038;ssl=1\" alt=\"broke into PBX and voice mail systems, mainly by exploiting factory-set or default passwords\" width=\"150\" height=\"115\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phone_money-1-e1572191473400.jpg?resize=150%2C115&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phone_money-1-e1572191473400.jpg?resize=75%2C58&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phone_money-1-e1572191473400.jpg?w=616&amp;ssl=1 616w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>The U.S. government alleges that the people arrested in <a class=\"zem_slink\" title=\"Philippines\" href=\"http:\/\/en.wikipedia.org\/wiki\/Philippines\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">the Philippines<\/a> were responsible for hacking private branch exchange (PBX) systems and voice mail systems owned by more than 2,500 companies worldwide. The <a href=\"http:\/\/voices.washingtonpost.com\/securityfix\/PBX%20Hacking%20Filed%20Version%20of%20Indictment.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">indictments<\/a> allege that between October 2005 and December 2008, Manila residents Mahmoud Nusier, Paul Michael Kwan and Nancy Gomez broke into PBX and voice mail systems, mainly by exploiting factory-set or default passwords on the systems. According to Erez Liebermann,\u00a0 assistant U.S. attorney for New Jersey, &#8220;The default passwords were left open in most of these <a class=\"zem_slink\" title=\"Business telephone system\" href=\"http:\/\/en.wikipedia.org\/wiki\/Business_telephone_system\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">PBX systems<\/a>.&#8221;<\/p>\n<p>The government charges that Italian call center operators paid the hackers $100 for each hacked PBX system they found. The defendants are charged with computer hacking, conspiracy to commit wire fraud, and access device fraud. The case was filed in the U.S. District Court of New Jersey, the home of long-distance provider AT&amp;T. The documents allege the thieves used the hacked PBX systems to relay more than 12 million minutes in unauthorized international phone calls, or $55 million worth of telephone charges.<\/p>\n<p>According to <em><a href=\"https:\/\/web.archive.org\/web\/20210307203629\/http:\/\/translate.google.com\/translate?js=n&amp;prev=_t&amp;hl=en&amp;ie=UTF-8&amp;u=http%3A%2F%2Fit.reuters.com%2Farticle%2FtopNews%2FidITMIE55B01320090612&amp;sl=it&amp;tl=en&amp;history_state0=\" target=\"_blank\" rel=\"noopener noreferrer\">Reuters<\/a><\/em> the defendants allegedly sold access to the compromised systems to 40-year-old Pakistani Mohammed Zamir, the manager of a call center in <a class=\"zem_slink\" title=\"Brescia\" href=\"http:\/\/maps.google.com\/maps?ll=45.5333333333,10.2333333333&amp;spn=0.1,0.1&amp;q=45.5333333333,10.2333333333 (Brescia)&amp;t=h\" target=\"_blank\" rel=\"geolocation nofollow noopener noreferrer\">Brescia, Italy<\/a>. Italian authorities arrested Zamir and at least four other Pakistani men operating call centers throughout <a class=\"zem_slink\" title=\"NASDAQ: NTRS\" href=\"http:\/\/www.google.com\/finance?q=NASDAQ:NTRS\" target=\"_blank\" rel=\"googlefinance nofollow noopener noreferrer\">Northern<\/a> Italy. According to the <a href=\"http:\/\/www.ap.org\" target=\"_blank\" rel=\"noopener noreferrer\">AP<\/a> and Carlo De Stefano, head of Italy&#8217;s anti-terrorism police unit, much of the proceeds were sent to the Philippines and may have been forwarded to <a class=\"zem_slink\" title=\"Islamism\" href=\"http:\/\/en.wikipedia.org\/wiki\/Islamism\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">Islamic extremist groups<\/a> in the region, including Al-Qaeda-linked Abu Sayyaf. \u201cThere are strong suspicions and some clues, but nothing concrete,\u201d De Stefano said.<\/p>\n<p><strong><em>Rb-<\/em><\/strong><\/p>\n<p><em>No matter the system (TCM, <a class=\"zem_slink\" title=\"Voip\" href=\"https:\/\/web.archive.org\/web\/20190710223245\/https:\/\/www.wikinvest.com\/concept\/Voip\" target=\"_blank\" rel=\"nofollow noopener wikinvest noreferrer\">VoIP<\/a>, SIP, T&#8217;s) sloppy installation practices can make any type of system vulnerable. That&#8217;s why I always include a requirement that all manufacturer and VAR account passwords be changed before the equipment is brought on-site and that they are changed by the Owner at the time of acceptance of the system. I have started to back this up by tying this requirement to their PLM bond requirements. <\/em><\/p>\n<p><em>We also recommend to our clients that they disable international calling by default on their system and only allow it as required, based on the concept of <a href=\"http:\/\/en.wikipedia.org\/wiki\/Principle_of_least_privilege\" target=\"_blank\" rel=\"noopener noreferrer\">least privilege<\/a>.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Feds charged three for breaking into PBX and voice mail systems by exploiting factory-set or default passwords on the systems to the cost of $55M<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[3216,67,15,2541,66,4],"class_list":["post-860","post","type-post","status-publish","format-standard","hentry","category-networking","tag-3216","tag-hack","tag-networking","tag-passwords","tag-pbx","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/860","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=860"}],"version-history":[{"count":6,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/860\/revisions"}],"predecessor-version":[{"id":130001,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/860\/revisions\/130001"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=860"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=860"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=860"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}