this post was submitted on 09 Dec 2023
103 points (100.0% liked)

Cybersecurity News

1326 readers
6 users here now

Welcome to Cybersecurity News!

A community that collect news and other tidbits related to cybersecurity in all its domains.

There are no hard and fast rules regarding what to post here-- we are fine with both pop news articles and more technical pieces regarding cybersecurity.

We use a bot called flynnbot to repost some rss feed content but the majority of posts are human-curated.

New to Cybersecurity?

Here are some resources to get you started:

Related Communities

[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]

founded 1 year ago
MODERATORS
 

cross-posted from: https://midwest.social/post/6303502

The FBI investigated a man who allegedly posed as a police officer in emails and phone calls to trick Verizon to hand over phone data belonging to a specific person

Despite the relatively unconvincing cover story concocted by the suspect ... Verizon handed over the victim’s data to the alleged stalker, including their address and phone logs. The stalker then went on to threaten the victim and ended up driving to where he believed the victim lived while armed with a knife

Version Security Assistance Team–Court Order Compliance Team (or VSAT CCT) received an email from [email protected].“Here is the pdf file for search warrant,” Glauner, allegedly pretending to be a police detective, wrote in the email. “We are in need if the this [sic] cell phone data as soon as possible to locate and apprehend this suspect. We also need the full name of this Verizon subscriber and the new phone number that has been assigned to her. Thank you.”

Verizon is not the only telecom that has failed to properly verify requests like this. In a somewhat similar case, I spoke to a victim who was stalked after someone posing as a U.S. Marshal tricked T-Mobile into handing over her phone’s location data.

top 10 comments
sorted by: hot top controversial new old
[–] [email protected] 8 points 8 months ago

Having worked in the industry on the retail side for both Sprint and then T-Mobile since 2007 and the amount of continuous annual training and borderline annoying effort these companies put out to retail employees about not disclosing CPNI (Customer Proprietary Network Information)... and considering how often this seems to happen... it's clear the back end teams don't get the same training or reminders despite their jobs actually being to disclose this info under the right circumstances.

[–] [email protected] 6 points 8 months ago* (last edited 8 months ago)

Of note, he already had a warrant out in California for stalking an ex there. She had to change her phone number 4 times in 4 months, "but somehow he kept getting it."

She was also with Verizon, so it's pretty clear that this is a systemic issue with how they verify warrants(they clearly dont).

Here's hoping these two women and anyone else who sees this story and was mysteriously stalked while using Verizon sues the living fuck out of them.

[–] [email protected] 4 points 8 months ago

Clearly the guy didn't have a warrant and Verizon gave the data anyway.

[–] [email protected] 2 points 8 months ago

I'm starting to understand why borderline illiterate scammers from india are able to scam so many people.

If you're pushy and you just say that you're an official something or rather then people will just do things for you.

[–] [email protected] 2 points 8 months ago

This was in a security presentation I used to give. Watch the horror unfold. :)

https://www.youtube.com/watch?v=lc7scxvKQOo&t=2s

[–] [email protected] 2 points 8 months ago

And likely there is nothing wrong with it.

[–] [email protected] -3 points 8 months ago* (last edited 8 months ago) (3 children)

No shit we live in the wild West there is no security.

think about it... Think about the ways you could do stuff like that... There is nothing stopping it.

[–] [email protected] 10 points 8 months ago

There is nothing stopping it.

Proper verification is a good start.

[–] [email protected] 6 points 8 months ago

Safety is an illusion...

[–] [email protected] 3 points 8 months ago

80s and 90s were the wild West of tech. Now we're more like the mobster era, with some countries toying with prohibition.