Home>News Center>World
             
     

    Hackers steal data through phone networks
    (Agencies)
    Updated: 2005-01-24 16:47

    Computer hackers have taken to stealing data the easy way -- by eavesdropping on phone and e-mail conversations to find the keys to seemingly impregnable networks, security experts say.

    The danger of attacks with insider information was illustrated earlier this month with the arrest of a California man accused of breaking into mobile phone network T-Mobile USA Inc.'s database and reading e-mails and files of the U.S. Secret Service, and by the exploits of a hacker who breached a hospital's database and changed mammogram results.

    The nature of threats to network security has changed as sophisticated hackers learned to tap into sensitive information flowing through telecommunications' servers, especially those that provide wireless and Internet access.

    "Telecom providers are probably one of the main targets for malicious attackers because they control communications for everybody," said Ralph Echemendia, head of Intense School, which trains executives in network security risks.

    CANDY FROM A BABY

    Hackers may con their way into a phone network by posing as phone company tech employees to get passwords into the network. Then they could essentially tap phones or search for personal data like text files or even camera phone photos.

    "(Hackers) will sit there and listen in, waiting to get valuable information," Echemendia said. "Once they have a foothold on one system they go through the same process to find other hosts."

    Security experts at Intrusic Inc. captured 4,466 passwords and 103 master passwords allowing global access to corporate databases while monitoring one Internet service provider for a 24-hour period, Intrusic President Jonathan Bingham said.

    "It's like stealing candy from a baby," Bingham said. "The malicious attacker will assume the identity of a person whose password they have stolen through this passive sniffing and they end up entering this organization as a legitimate user."

    Once inside, it takes the hacker seconds to set up back doors that allow access to the database at any time to do more spying, data theft or worse.

    BEST PRACTICES

    Most hackers, however, are after information -- passwords, social security numbers and birth dates -- that they can sell or use to penetrate bank and credit card accounts, Forrester Research Inc analyst Laura Koetzle said.

    "Telecoms and cable companies are pretty high on the list simply because of their huge customer bases," Koetzle said. "If they can crack T-Mobile's database they can get user names and passwords for (millions of) subscribers at all once."

    In a statement, T-Mobile, a Deutsche Telekom AG unit, said it "quickly put in safeguards to prevent further access and began an investigation" after a hacker broke into its internal computer systems in 2003 and accessed data on 400 customers.

    As more companies shift business functions to the Internet and allow workers to access secure systems from off-site, it becomes tougher to guard against insider attacks and easier for hackers to breach the system, said Stan Quintana, director of managed security services at AT&T Corp .

    "All these types of environments are requiring a higher level of security ... of data in transit," he said.

    The key to cutting down on damage from inevitable insider attacks is to constantly monitor data flow and train employees to guard passwords and access to computers, he said.

    He added that among the "best practices" AT&T advocates is that its customers periodically hack into their own networks.



     
      Today's Top News     Top World News
     

    FM: 8 freed hostages now in embassy, coming home soon

     

       
     

    Bank officials flee after US$120m go missing

     

       
     

    Iran says US attack would be a strategic error

     

       
     

    Mayor sets out Olympic pledge for 2005

     

       
     

    China and India launch first strategic dialogue

     

       
     

    1.2 mln applicants crowd into exam rooms

     

       
      Qaeda ally declares all-out war on Iraqi election
       
      Suicide car bomb targets Allawi office in Baghdad
       
      Vietnam reports two more bird flu infections
       
      Majority of Japanese want troops out of Iraq
       
      Strong quake shakes Indonesia's Sulawesi
       
      US envoy acknowledges Iraq election woes
       
     
      Go to Another Section  
     
     
      Story Tools  
       
      News Talk  
      Are the Republicans exploiting the memory of 9/11?  
    Advertisement
             
    国产激情无码视频在线播放性色 | 中文字幕丰满乱孑伦无码专区| 婷婷四虎东京热无码群交双飞视频 | 午夜亚洲AV日韩AV无码大全| 无码AV中文字幕久久专区| 国产精品无码无片在线观看| 中文字幕人妻无码一区二区三区| 久久精品天天中文字幕人妻| 国99精品无码一区二区三区| 中文有码vs无码人妻| 欧美中文字幕无线码视频 | 亚洲视频中文字幕| AV无码精品一区二区三区| 永久免费av无码入口国语片| 日本不卡中文字幕| 最近中文字幕大全免费版在线| 国99精品无码一区二区三区| 亚洲AV永久纯肉无码精品动漫| 亚洲日韩在线中文字幕综合| 国产中文字幕在线视频| 亚洲综合中文字幕无线码| 无码国模国产在线无码精品国产自在久国产 | 日本精品自产拍在线观看中文| 中文字幕在线精品视频入口一区| 国产亚洲?V无码?V男人的天堂 | 国产在线拍偷自揄拍无码| 人妻精品久久久久中文字幕| 久草中文在线观看| xx中文字幕乱偷avxx| 天堂√最新版中文在线天堂| 无码中文字幕av免费放dvd| 中文字幕亚洲欧美日韩2019 | 日本一区二区三区精品中文字幕 | 忘忧草在线社区WWW中国中文| 久久久久亚洲AV无码专区网站| 成人毛片无码一区二区三区| 国产成人无码精品久久久免费| 国产成人无码免费网站| 无码专区6080yy国产电影| 中文字幕无码久久精品青草| 99久久无色码中文字幕人妻|