Pages

Sunday, June 30, 2019

Fwd: ⚠️ JoaoA.deSilva2018 -JoaoA.dSilva2019⚠️ SOMEONE TRIED TO LOG INTO YOUR ACCOUUNT Alert: #176 ⚠️




    
How a trivial cell phone hack is ruining lives
This is a personal security red alert.


On a Tuesday night in May, Sean Coonce was reading the news in bed when his phone dropped service. He chalked it up to tech being tech and went to sleep. When he woke up, his Gmail account had been stolen and by Wednesday evening he was out $100,000.

"This is still very raw (I haven't even told my family yet)," Coonce wrote in an anguished Medium post. "I can't stop thinking about the small, easy things I could have done to protect myself along the way."

On a Monday night in June, Matthew Miller's daughter woke him up to say that his Twitter account had been hacked. He had no cell phone service; within a few days Miller lost his Gmail and Twitter account and $25,000 from his family bank account.

In Miller's case, the attacker deactivated all his Google services, deleted all his tweets, and blocked most of his 10K followers. Once he got his phone number back from the hacker, T-Mobile let the hacker steal it a second time. "I've been considering changing my bank account number, social security number, and other accounts that are critical to living and working in the US," Miller wrote in a post. "I am also freaked out about using cloud services so my strategy at the moment is ... writing my passwords down on paper and leaving everything else off the cloud."

Both men were victims of SIM-swap attacks, where someone uses pieces of personal information to convince your cell service provider to transfer (port) your number and associated phone account to a device in the attacker's possession. With control of your phone number and account, they proceed to break into all connected accounts, usually beginning with email. The attacker changes info in your accounts so you can't get them back, sets up email forwarding in case you regain control of your email, and goes through all your cloud-stored documents looking for things of value.

It is a uniquely personal and invasive attack. Thanks to Coonce and Miller, we now know a lot more about how these attacks are done, and how terrible the destruction is. In Miller's case, we learned how unhelpful T-Mobile, Google, and Twitter were — with both Twitter and Google, Miller was stuck in a hell of filling out online account recovery forms and sending them off into an abyss of automated response. And for those wondering, Miller used two-factor (text/SMS) as an extra layer of security for his accounts. But with his phone out of his hands, it didn't matter.

Miller eventually recovered his accounts, but only because he is special: In both articles about his experience, Miller mentions his "well-connected friends" at both companies who helped him out, as well as leveraging his platforms as a tech journalist.

That is both sobering and problematic, as few regular users have this kind of privilege and access. Like you probably are right now, I'm wondering what kind of hell everyone else would be in. Engadget reached out to both Twitter and Google for comment. We did not receive a response from Twitter by time of publication.

According to Google, victims of account hijacking should fill out this claim form. The company also posted information to mitigate SIM-swap attacks and hijacks in this brief October 2018 post about (the 2018) updates to Google's Security Checkup process and sign-in security. Google also indicated that SIM swapping will not compromise a Google account that is protected by two-step verification.

Furthermore, the company said a non-SMS two-factor method (like a YubiKey) was an option only if the attacker knows the victim's password. Google recommends Google Prompt or Google Authenticator, with physical keys as the strongest form of two-factor. Google also said that SIM-swap attacks are rare and confined to specific targets, and that most people don't need two-factor stronger than SMS (text-based).

Needless to say, Google's email was a confusing response to the details we learned in the SIM-swap attack and account hijacks experienced by Coonce and Miller. And I, for one, believe that saying most people are fine with SMS as their two-factor, that most people shouldn't worry about SIM-swap attacks, is too conservative to feel like safe advice.

Especially when we consider the context of two important things. First, that we're hearing about SIM swaps more than ever and only from high-profile techies -- we won't hear about what's happening to regular people. And secondly, there was a big breach which likely made an attack typically considered a high-effort, targeted attack, into a much easier way to grab cash and steal accounts.
That T-Mobile data breach was actually a big deal

Coonce uses AT&T, while Miller uses T-Mobile and Google Fi. The SIM porting process for both networks has terrifyingly minimal security, both companies had customer pins exposed for an unknown amount of time in 2018, and T-Mobile suffered a fairly recent breach of all the info anyone needs to do a SIM-swap attack.

According to AT&T documentation, all that is required for transfer is the information one could find on a recent cell phone bill: Account number, name of the account holder, billing address, and "pin or password if applicable" — noting that the minimal billing info is all that's required if someone "can't remember" their pin or password. It is the same for a T-Mobile transfer, just info on a bill, though they don't state if a password or pin is required at all.

In August 2018, T-Mobile was hacked and the billing information of 2.5 million customers was stolen. The company reassured press by stating no financial data was compromised — but I'll bet that wasn't the point. It was all that juicy billing information, with which attackers can get way, way more by SIM porting and stealing people's phone numbers and accounts.

The day after T-Mobile's breach news, a researcher discovered that all T-Mobile and AT&T customer account PINs had been sitting there for an unknown amount of time exposed by website flaws.

Obviously, the SIM porting processes at both companies should've been made way more secure a long time ago — about the time we started to live our entire lives through our phones. But it became even more urgent for T-Mobile to do so after their massive breach. Yet they didn't, and here we are.
SOS — Save our SIMS

SIM card character holding crowbar

It would be really great if there was a security trick or technique I could offer or recommend for people to do to prevent their SIMs from being ported (swapped, stolen). Like "here's this extra, annoying security step you can add to your SIM account." The truth is, cell carrier companies haven't done much, if anything, to increase SIM security.

In January 2018, before that breach, T-Mobile quietly published a post about unauthorized SIM porting in which it recommends that customers add a secondary password to their accounts, which the company calls "port validation." However, nothing about port validation is mentioned on T-Mobile's SIM transfer information page, where a link could seriously raise customer awareness about this very serious threat.

On AT&T's "Prevent Porting to Protect Your Identity" page, little is offered outside "don't share your phone number" and "keep your inbox clean." AT&T's only extra security step on offer is "Add all 'extra security' measures to your AT&T Wireless accounts." Following that link, we learn that the "extra security measures" only make it so someone has to provide your pin when signing in online, getting secondary online access, or when in-person in a retail store.

Yeah, we're scratching our heads, too. To be clear, AT&T's extra security measures are not anything extra, they just extend pin requirements to do online and in-person account management. Like T-Mobile, no information about unauthorized SIM porting or taking extra security measures is on AT&T's customer information page on SIM transfers.

It's bad. And it probably won't change until an executive at T-Mobile or AT&T experiences the stomach-plummeting terror of having their Gmail account taken (along with Google Photos, Google Drive, Calendar, Contacts) and any number of their other accounts raided — like with Miller and Coonce, their Coinbase accounts, and financial accounts drained.
Security mistakes were made

We can, however, learn from the security mistakes Coonce and Miller made before losing their SIMs and connected accounts. Both state in their write-ups that they are not security nerds, and admit they did some lazy things with general account security that they deeply regret. Coonce wrote, "Given my naive security practices, I probably deserved to get hacked  —  I get it. It doesn't make it hurt any less (...)" In a heartfelt, raw plea concluding his writeup, Coonce tells readers, "I urge you to learn from these mistakes."

So it's pretty easy for attackers to steal our SIMs (port our phone numbers with the associated account onto a phone they control). Especially if you're on AT&T or T-Mobile and haven't changed your pin since all customer pins were found exposed in late 2018. That means the security mistakes Coonce and Miller are referring to aren't about securing our SIMs, their mistakes were in how their other accounts were — or weren't — secured.

If we can't protect our SIMs, we need to secure what they would give a stranger access to.

One way both men could have prevented the attackers from getting around two-factor is if they had instead used a physical USB security key, such as a YubiKey or Google's Titan, with accounts that are compatible with these keys. Yes, they can be a pain in the ass when you're in a hurry, even if somewhat conveniently carried on your keychain with your house keys. Yet if someone can intercept your text messages without you even knowing it, it's worth not losing your email account and having your bank balance drained so some jerkface thief can buy Bitcoin.

Coonce and Miller regretted having so much personal information about themselves floating around online, though it's difficult to see how anyone can prevent breach data from being passed around. Coonce emphasized that people should use an offline password manager (such as LastPass or 1Password) to create and securely store complicated passwords. This should be done instead of letting operating systems, browsers, or your Google Account save your passwords.

Miller in particular wished he hadn't used the convenient "sign in with your Facebook/Google/etc account" buttons on apps and websites. "In the past I would just click the Facebook, Google, or Twitter button to setup an account or login," he wrote. "I'm done doing that and gave up convenience for better security."

Images: Diy13 via Getty Images (Hacker with phone); Talaj via Getty Images (SIM with crowbar)
In this article: 2-factor, AT&T, bad password, data breach, data security, digital security, gear, Gmail, Google, identity theft, infosec, internet, mobile, opinion, security, services, SIM, sim swapping, SMS, T-mobile, Twitter, Two-factorAuthentication
All products recommended by Engadget are selected by our editorial team, independent of our parent company. Some of our stories include affiliate links. If you buy something through one of these links, we may earn an affiliate commission.
@


---------- Forwarded message ---------
From: Warning ⚠️ <posty@takeitsd.mydns.jp>
Date: Sun, Jun 30, 2019 at 1:01 AM
Subject: ⚠️ Joaoa.desilva2018 - JoaoA.dSilva2019 ⚠️ SOMEONE TRIED TO LOG INTO YOUR ACCOUUNTS Alert: #176 ⚠️
To: <dimbl2l@cisco.com.uk>






Big Brother Is Watching You Online: How To Avoid Being Tracked

  1. Clean your Internet browsing history after every use. ...Delete Search history on Search engine like Google Search*
  2. Create specific passwords for each account. ...
  3. Avoid JavaScript search engines. ...
  4. Use Tor and a Linux Live Image, like Tails.

* How do I delete my Google browser history:
  1. On your computer, open Chrome.
  2. At the top right, click More.
  3. Click History.
  4. On the left, click Clear browsing data. ...
  5. From the drop-down menu, select how much historyyou want to delete. ...
  6. Check the boxes for the info you want Google Chrome to clear, including “browsing history.”
Apr 12, 2018


Google makes it easy to find your personal web history, on google site manage it and even delete it. Just go to http://google.com/history and log in to your Google account. There, you will see your entire history and can browse it by category. ... Here, you can turn offsearch history, so Google won't save future searches.
YESGoogle stores a record of everything you search for on Google.com if you're logged into your Google Account. You can clear your local browser history, but that won't clear what's stored on Google's servers. ... You'll now be able to review and delete recent search history within Google search itself.Oct 24, 2018

Stop your phone from being tracked with these settings
  • Tweak your phone's location settings. Apple and Android devices that you might not be aware of. ...
  • Limit ad tracking. ...
  • Stop Google from tracking your every move. ...
  • Use a private browser on your phone. ...
  • Check your online accounts. ...
  • Opt out of ads. ...
  • Check your virtual assistants. ...
  • Control permissions on your apps.
Jan 26, 2019

 Rating: 4.7 - ‎23 votes
You become anonymous and protect your online privacy. ... Unfortunately, masking your computer's IP address is not quite as simple as changing a setting.
Dec 12, 2017 - ... ways your information is tracked online, and how to protect your data from ... Because the image is not stored with your cookies, clearing your ...




G o o g l e

Joaoa.desilva2018




!

login attempt blocked

joaoa.desilva2018@gmail.com

joaoa.dsilva2019@gmail.com


A user has just signed in to your Google Account from a new device. We are sending you this email to verify that it is you.

We're you in Moscow?:

Yes me !


not me !

If you have any questions you can contact us at Support
To unsubscribe from the online newsletter service please . (click here)




You received this email to inform you about important changes to your account and Google services you use.

No comments:

Post a Comment