AT&T, Verizon reportedly hacked to target US govt wiretapping platform

234 pointsposted 9 months ago
by el_duderino

63 Comments

NelsonMinar

9 months ago

It used to be the US government worked to secure American communications. But between these backdoors and the NSA losing control of exploits thanks to the Shadow Brokers, they do more now to undermine American security than protect it.

hypeatei

9 months ago

No, Intel agencies have always been too powerful and Truman saw it when disbanding the OSS (Office of strategic services) after WWII. Then, he begrudgingly created the CIA to compete in the cold war.

They've always undermined American security so they could have more information and power.

NelsonMinar

9 months ago

I don't have references, apologies, but in the 90s and 00s there were reports of NSA making polite suggestions to private companies to improve their cryptosystems and secure crucial infrastructure. That advice was always viewed with suspicion and verified, but was often genuinely helpful. Over time NSA started using that influence more and more to implant back doors. Dual_EC_DRBG is a particularly well documented example. I assume now most companies absolutely don't trust the NSA as a partner in designing security systems since they have worked so often to undermine them.

0xEF

9 months ago

Do you think trust in the agency depends on who was heading the NSA at the time? This is something I'm increasingly curious about with all the US Alphabet Agencies since they are appointed positions.

MonkeyClub

9 months ago

And, I would add, how does that position SELinux?

user

9 months ago

[deleted]

diggan

9 months ago

> It used to be the US government worked to secure American communications.

When was this? As far as I remember (but I'm not that old to be honest), it seems to mostly been about the US government making sure the government has secure communications, while the rest get to fend for themselves.

ffujdefvjg

9 months ago

Fend for themselves, and if they don't cooperate with the wishes of the TLAs they get legal trouble nobody could possibly afford. And if you end up in the secret FISA courts, you basically can't get legal representation because it's secret, or ever really talk about it. Also there's no real oversight for this stuff because it's that secret.

0xEF

9 months ago

Not to be that guy, but if you're going to drop conspiracy theories on HN, you need to cite your sources. Less hand waving and more fact checking.

tolerance

9 months ago

What part of the claim in question do you feel is conspiratorial in theory?

immibis

9 months ago

You misunderstood "American security" to mean "security of Americans" instead of the intended meaning "security of the American regime"

mistrial9

9 months ago

you are not wrong, but this has always been the case, from the earliest times. Similar problems with the institution of the military. It calls for moving past the initial indignation, and engaging somehow.. otherwise you get the government you deserved, as they say.

duped

9 months ago

I have heard several anecdotes going back the last 15 years from folks who have had surprise meetings or phone calls with the FBI to inform them that some of their IT infrastructure had been compromised by foreign actors.

In each case the FBI wanted to keep the breach open as a honeypot so they could investigate the bad actors, regardless of considering the cost to the business of continuing to leak data about their products/customers/employees.

raxxorraxor

9 months ago

That has always been the case. The danger is accepted for additional capabilities. The alleged security is pure propaganda.

"That there is no safe backdoor" has more or less been the statement of any expert on the topic. In a time we still had experts since security consultants of today are often as shady as the scammers trying to get access to your data/system.

ben_w

9 months ago

Both statements are simultaneously true.

The goal is to protect the physical and institutional USA (and equivalent for other countries' intel agencies); this requires making sure there's no successful conspiracies, from within or without, to destroy it; this requires all the things we here all agree are bad for digital security, including the security necessary to running e.g. electronic banking ledgers or votes.

I don't have any actual solutions here, that's just a description of the problem space as I understand it to be.

There's a bunch of US agencies sponsoring Tor, presumably to undermine hostile governments, even though there's also US agencies trying to subvert it.

formerly_proven

9 months ago

^ this guy is about to learn about the crypto wars.

neom

9 months ago

Does it drive anyone else nuts when they throw in something related to the main article like this

"Security researchers also found that the threat actor attacked hotels, engineering companies, and law firms in Brazil, Burkina Faso, South Africa, Canada, Israel, France, Guatemala, Lithuania, Saudi Arabia, Taiwan, Thailand, and the United Kingdom."

but that isn't in the main article and they don't say where they got that information from?

photochemsyn

9 months ago

Sounds like another government-approved leak to a compliant corporate media outlet by 'anonymous sources'. I don't know why the relevant government agencies don't just issue a press release unless they're unusually embarrassed by this apparent security failure. The other possibility is the story is no more true than all those 'anonymous source' leaks about Iraq's (nonexistent) chemical, biological and nuclear weapons programs from two decades ago.

If we're not going to accept Seymour Hersch's anonymously-sourced claim that the US Navy was involved in the destruction of the Nordstream pipelines, why accept this claim at face value either? For an example of reporting of a major hacking incident not reliant on anonymous government sources, see the OPM hack:

https://www.nytimes.com/2015/06/05/us/breach-in-a-federal-co...

Notably, the WSJ source report doesn't include any mention of reporters attempting to get official statements from the relevant US government agencies and being rebuffed. That smells like plausible deniability of the kind involved in the bogus Iraq WMD leaks.

TriangleEdge

9 months ago

The article didn't say but I'm guessing the target could of been JSI Telecom. I knew some people that worked for JSI ~10 years ago and the US govt used their platform in a handful of organizations.

MassPikeMike

9 months ago

From the article: "if hackers gained access to service providers’ core routers, it would leave them in a powerful position to steal information..."

Sorry for the newbie question, but isn't most internet traffic end-to-end encrypted, these days? So what information would the hackers, or for that matter the "lawful intercept" system , have been able to steal? I do see how accessing routers would let intruders launch malwares, spoof other sites for phishing attacks, etc.

davisr

9 months ago

TLS encryption means absolutely nothing. The very system of using certificate authorities is flawed by design. NSA has no trouble performing MITM. Go search 'NSA FLYING PIG'.

https://www.cnet.com/tech/tech-industry/nsa-disguised-itself...

amanda99

9 months ago

That's just not even remotely true.

After the PRISM stuff, folks got a lot more savvy with encryption. TLS has been tightened up a lot since then across many fronts (perfect forward secrecy, removing crap roots, certificate transparency, etc).

There's just no way the NSA can be MITMing any reasonable proportion of traffic. Possibly extremely targeted stuff, and sure, there's technically the possibility that Google is handing over keys, but if it was happening at any massive scale, people would now know.

That's why the fight has moved over to metadata now, which is what the three letter agencies are vacuuming up these days.

halJordan

9 months ago

People choose to believe that nothing happened after snowden and because this is a religion to them you can't even tell them they're wrong

blablabla123

9 months ago

Yeah but I imagine the ice is getting thin. Sure, use of key pinning on the web failed - but for instance banking apps commonly use it. Once monitoring Certificate transparency logs gets more traction, things like that could get noticed.

davisr

9 months ago

How does the use of certificate pinning mean anything when a FISA court can demand the keys and issue a gag order to prevent public disclosure?

gruez

9 months ago

1. AFAIK no government, even authoritarian ones, coerced a CA to misissue a certificate. There have, however, been plenty of other ways governments are able to get certificates, like seizing the domains/servers.

2. Even if they did, chrome has enforced certificate transparency, so a gag order on the CA/CT provider would simply result in the certificate being rejected.

hulitu

9 months ago

> 1. AFAIK no government, even authoritarian ones, coerced a CA to misissue a certificate.

As far as you and i know. Those things are not public. Helps with espionage (see Crypto AG).

blablabla123

9 months ago

Sure, but then it isn't related to the CA system anymore and any action from them wouldn't be under the radar anymore.

Also this problem would apply to any key like gpg. Well, as long as it's not in a Hardware security module. Of course they could also seize that but at some point it becomes logistically impractical, at least for mass surveillance.

jeroenhd

9 months ago

Information that someone can gather from access to telecom network hardware includes all SMS traffic (not Signal/iMessage/etc. of course), the contents of every call you make (not over Signal/iMessage/etc.), 2FA codes, the domain of most websites you visit (sniffing TLS certificates, though ECH should hopefully reduce that at some point), and of course your phone's current location at all times; with beamforming technologies like mmWave, that location can be accurate to centimeters or less.

If access is wide-spread, you could even figure out who's communicating with who over encrypted messengers by watching for packet timings. Target A communicates with the Signal server and milliseconds later Target B receives a push notification? And then seconds later the inverse happens? That's probably proof enough that two people are communicating.

I doubt lawful intercept systems have the ability to inject any traffic, but it's very useful to know the exact make, model, modem version, and OS version of a phone before sending malware like Pegasus to a device, and telco infrastructure knows most of that.

As for phishing, knowing what services your target uses can be very useful. Spoofing numbers isn't very hard, and if you've been receiving calls from your local real estate agent for a while, you won't notice as much when you an imposter uses a spoofed number. The more niche and offline the business you're pretending to be, the less likely you'd consider a phishing attempt suspicious.

eightysixfour

9 months ago

On top of what you mentioned, they would have access to significant metadata, unencrypted traffic, and it is worth assuming that government agencies have the resources to acquire certificates and MITM high value information.

hiatus

9 months ago

> have the resources to acquire certificates and MITM high value information.

Isn't that mitigated by certificate transparency?

eightysixfour

9 months ago

Obviously this all depends on your threat model at the end of the day, but if assuming a state level actor, I don’t think it is that far fetched to assume they can acquire the original certificate.

ls612

9 months ago

For WebPKI yes it should be.

nashashmi

9 months ago

Meta data of how many packets are going between two parties, when its going, and who else is getting the data at the same time. It is like the pizza traffic story at 10 pm.

tguvot

9 months ago

in case that wiretap system related to telephony, etc - plain voice data can be obtained

xyst

9 months ago

I hate how numb I have gotten to data breaches due to the incompetence of these companies. All of the major US cellular networks have all been hacked to a certain degree.

Hizonner

9 months ago

Well, that's what happens when you deliberately compromise your own infrastructure with "lawful intercept" back doors.

Neonlicht

9 months ago

The CCP doesn't need the backdoor. The US intelligence agencies have to do the whole masquerade of freedom and liberty.

CatWChainsaw

9 months ago

So maybe surveilling everything everywhere at all times has its downsides, TLAs?

phendrenad2

9 months ago

Tech imitates life. Hyenas specialized in chasing lions away from their prey.

olliej

9 months ago

Happily, this kind of attack would not compromise secure communication with government mandated "secure intercept" technology, because of magic fairy dust reasons :-/

jeroenhd

9 months ago

Targeting wiretapping infrastructure may be a viable attack, but with how few details are available to the public, it's hard to estimate the impact. Just because a wiretapping platform was hacked doesn't mean any data was gathered, and if it really was, we don't know what kind of data.

Thanks to mobile networks, information can be anything from live internet traffic to live location information of cars and phones. However, I suspect if someone did a hack that juicy, carrier SOCs would've noticed immediately. This type of infrastructure isn't exactly hooked up to a public IP address somewhere.

ziddoap

9 months ago

>However, I suspect if someone did a hack that juicy, carrier SOCs would've noticed immediately.

We're talking real deal nation-state actors targeting an industry where for the last few decades the only downside of being breached is having to say "oh oops, sorry" and maybe providing a year of credit monitoring. Security is something taken just seriously enough to avoid a ruling of negligence, but no more.

It is very optimistic to assume that carriers would immediately notice a breach by threat actors this sophisticated.

jeroenhd

9 months ago

There's a difference between "oops, the newsletter database got leaked" and "oops, the president/senate/FBI got wiretapped". You can pay ten dollars per victim for one, but get in trouble with various law enforcement agencies with the other.

If an external actor can control the wiretapping infrastructure, that doesn't just imply spying on targets; it can also cause some wiretapping evidence on terrorists/spies used by law enforcement can no longer be used.

raxxorraxor

9 months ago

The security flaws in these products were government mandated. I think the negligence case would be quite difficult here and distract from the real responsibility.

runjake

9 months ago

> This type of infrastructure isn't exactly hooked up to a public IP address somewhere.

Without going into details, consider that sometimes they are, even with very large providers that you think should know better. Law enforcement’s got to get to them somehow.

And much of the documentation for these systems is publicly available. Search for your favorite enterprise company and for “lawful intercept”.

AmericanChopper

9 months ago

I was going to comment basically this. Everything you could possibly want to know about how LI systems work is documented by the vendors online. It’s really just network interfaces that forward intercepted traffic to aggregators.

The thing about CSPs is their core business is edge routing. A majority of their core assets are going to be internet connected routers, and you’d actually be able to collect more data by owning some of those. The additional information you can get from LI (and the reason you often need a clearance to work on LI systems) is information about who law enforcement are running intercepts on.

Also, LI is just a regulatory cost centre for CSPs. It’s hilarious (or scary, depending on your perspective) how poorly those systems are maintained, and how often the break.

A4ET8a8uTh0

9 months ago

<< few details are available to the public, it's hard to estimate the impact.

Would it not be a good indicator that it may not be a great idea to begin with?

<< carrier SOCs would've noticed immediately.

I want to believe that. I do. But the longer I live in corporate, the more I think that we are experiencing a serious competency problem across the board.

yusyusyus

9 months ago

ehh.. LI on routers has been (at least on one major vendor) designed to not be visible to end operators in the course of normal operation. there are ways to see it, but it involves either the actual LI mechanism or some esoteric debugs. And it probably wouldn't be obvious to SOCs if the implemented LI was legit or not.

So, the question of competence or otherwise may be mooted by virtue of simply not having proper visibility.

tguvot

9 months ago

in fqct, iirc, it might be even illegal to know what wiretaps are running on the system unless you are the one who process warrant or implement the wiretap. and in case wiretap falls under fisa, than this is classified information and a whole different can of worms

A4ET8a8uTh0

9 months ago

Fair point. I do not know enough in that area to argue further.

hansvm

9 months ago

> This type of infrastructure isn't exactly hooked up to a public IP address somewhere.

It's getting from point A to point B, and probably not via sneakernet. The details will make it more or less secure, but I'd be shocked if it's going through anything other than public internet pathways.

jeroenhd

9 months ago

The only endpoint that I can imagine travels through the internet (presumably through an encrypted VPN) is at the exit point where law enforcement agencies get access.

These carriers make up the backbone of the internet, but that doesn't mean the internet is the only network they route.

Hizonner

9 months ago

> This type of infrastructure isn't exactly hooked up to a public IP address somewhere.

Snort.

throwway120385

9 months ago

I would just assume there's a cloud provider that handles all of the wiretapping services for both or all carriers. There's a single-point-of-failure for everything else nowadays anyway. Look at what happened with Crowdstrike, or Solarwinds, or any number of other big single-source providers. Nobody wants to maintain it in house, with predictable results.

tguvot

9 months ago

there is nothing like this. the closest thing to it is something called TTP (trusted third party), that works as intermediary between telco and law enforcement agencies. they perform wiretap order processing, setups actual wiretaps, collect/bundle and ship away to agencies wiretapped information. but there is a bunch of them and you (telco) don't have to use them

throwway120385

9 months ago

That's actually really good, then. Thank you for explaining this.

Hikikomori

9 months ago

They probably dont have a public ip but just spearfish a network engineer at these ISPs and you'll have access to the devices performing the legal intercept.

user

9 months ago

[deleted]