banner



Your old phone number is a hacker's dream — what you need to know

Your former telephone number is a hacker's dream — what you need to know

A hand dialing a phone number on an iPhone.
(Epitome credit: Africa Studio/Shutterstock)

If you've e'er changed your mobile telephone number, particularly in the past few years, then you may take created a huge security and privacy risk for yourself.

That's considering your old phone number creates a gateway for hackers, crooks and stalkers to take over your Google, Facebook, Amazon or Yahoo accounts, suspension into your online bank accounts and even stalk or blackmail y'all, Princeton researchers detailed in a new bookish paper and related website.

  • Serious Android flaw threatens hundreds of millions — what to practice
  • The best Android antivirus software
  • Plus: Samsung just reminded the globe why iPhones are better

This happens because many websites allow you log in with a telephone number instead of a user name, then permit you reset the password past sending a text to the phone number.

In other cases, banks or other fiscal services send two-factor-authentication (2FA) codes to the mobile number, letting crooks who've obtained your email address and password from data breaches go into the business relationship.

All told, this is however more evidence that the use of mobile telephone numbers for account and identity verification is creating a slow-motion privacy and security catastrophe.

How to foreclose your old telephone number from hacking you

To guard against this, the Princeton researchers, Kevin Lee and Arvind Narayanan, advise persons changing their numbers to not release the old numbers to the carriers, but to use a "number parking" service that volition concord the number for yous at a reasonable toll.

They also advise that anyone irresolute their number realize that you accept only 45 days before the old number is put dorsum into apportionment, during which fourth dimension yous need to unlink the old number from all your online accounts. (This story was before reported by Vice Motherboard.)

Just so many numbers to go effectually

Lee and Narayanan explained in their inquiry paper and website that discovered that of the three major U.South. carriers, Verizon and T-Mobile both let you go online to choose a new mobile number and present you with a list of bachelor possibilities. (AT&T does non.)

"In the United states," they wrote in their research paper, "when a subscriber gives up their 10-digit telephone number, it eventually gets reassigned to someone else."

The "aging" period for a previously used number to become unused is 45 days, as mandated by the FCC. After so, it is made available for reuse, and if it's one controlled by Verizon or T-Mobile, it will be listed on their websites.

At whatever given time, Lee and Narayanan figured, about 1 million recycled numbers are upwards for grabs, and "we estimate that an available number gets taken after 1.2 months."

Looking at the Verizon and T-Mobile websites, the researchers constitute it easy to distinguish between "new" numbers that had never been used and "recycled" numbers that had been.

New numbers were presented in a consecutive sequence that could wait like this:

  • (212) 555-1234
  • (212) 555-1236
  • (212) 555-1243
  • (212) 555-1249
  • (212) 555-1253
  • (212) 555-1260

Previously used numbers would present their last iv digits randomly:

  • (212) 555-1234
  • (212) 555-9249
  • (212) 555-2096
  • (212) 555-5884
  • (212) 555-3587
  • (212) 555-5841

(Area codes are tied to the prospective customer's location, and the eye three digits are substitution prefixes that are assigned to carriers in blocks.)

Lee and Narayanan looked at 259 available numbers from Verizon and T-Mobile, established that 215 had been previously used, and and then tried to see what they could practice with them.

Pandora's telephone number

The researchers plant that 171 of the recycled numbers, or 83%, were tied to at to the lowest degree 1 existing account with Amazon, AOL, Facebook, Google, Paypal or Yahoo. Each of those services lets you log in using your mobile phone number instead of your e-mail address or username.

Worse, Amazon, AOL, Paypal and Yahoo also allow you reset the countersign for an account by sending a verification text containing a 1-time passcode (OTP) to the associated mobile number — a situation that Lee and Narayan called "doubly insecure."

In other words, Lee and Narayanan could accept hijacked the accounts of 171 different people simply by using their one-time phone numbers.

"Accounts with this doubly insecure configuration... are at firsthand risk of takeover," they wrote in their newspaper.

Facebook and Google were ameliorate about this, as "SMS [account] recovery is immune only if SMS 2FA is not enabled."

Otherwise, you'd have to present a separate form of verification earlier getting that account-reset OTP, or accept the OTP sent to a backup email account. (Information technology's dangerous to employ SMS text letters in two-factor hallmark — other 2FA methods are much ameliorate.)

Pre-screening vulnerable numbers

Lee and Narayan didn't even demand to "merits" these numbers from T-Mobile or Verizon to practice this. They just had to see the available numbers on the carriers' websites. That would permit systematic attackers pre-screen available numbers for linked accounts.

"The attacker can and so obtain these numbers and reset the countersign on the accounts, and receive and correctly enter the OTP sent via SMS upon login," they wrote.

Information technology gets worse, though. Lee and Narayan plugged their recycled phone numbers into used two "people search" websites, BeenVerified and Intelius, to gather information about the numbers' previous owners.

Once again, 171 of those numbers yielded results — total names, email addresses, locations, street addresses, workplace information and social media accounts. An assaulter would go a skillful head offset on stealing those persons' identities, all from but having their old phone numbers.

Defeating two-factor hallmark

Lee and Narayan also plugged the phone numbers into HaveIBeenPwned, an online database that lets you check whether your email addresses, passwords and telephone numbers have been exposed in data breaches, information leaks and phishing attacks.

They found that 100 of the 259 numbers "were linked to leaked login credentials on the web, which could enable account hijackings that defeat SMS multi-factor authentication."

In other words, those numbers were associated with username-password combinations that had already been compromised and were available somewhere online.

With the login credentials plus the phone number, an aggressor could log into accounts that were protected by SMS-based 2FA, and so get the verification text with the one-fourth dimension-password — and completely take over the one-time number holder's e-mail, banking company or other online business relationship.

Stalker, spammer and blackmailers

Lee and Narayanan outlined possibly more dire scenarios, some of which are pretty horrifying to imagine. A person being stalked or harassed could alter their number to escape their tormentor, simply to have the stalker merits the old number in one case it became bachelor after the required 45-day "aging" menstruation.

Phishers and spammers could write downward available numbers, then text-spam the new number owners afterward the numbers are claimed. Crafty crooks could temporarily hold numbers, sign upwardly for Google, Facebook or Amazon, then release the numbers — and demand money from the next number owners who detect they can't properly fix up accounts on those services.

Fortunately, this research, which was presented to T-Mobile and Verizon in advance, is already yielding some results.

Both carriers added reminders to their number-change pages to remind subscribers that they had 45 days to unlink their old numbers from online accounts. Verizon too altered its number-alter pages so that you couldn't keep looking at available numbers incessantly.

Withal, this all serves as a reminder that phone numbers should non exist used as login credentials, as account verification or every bit proof of identity — menses.

  • More: The best identity theft protection services

Paul Wagenseil is a senior editor at Tom's Guide focused on security and privacy. He has also been a dishwasher, fry cook, long-booty driver, code monkey and video editor. He's been rooting around in the information-security space for more than 15 years at FoxNews.com, SecurityNewsDaily, TechNewsDaily and Tom'south Guide, has presented talks at the ShmooCon, DerbyCon and BSides Las Vegas hacker conferences, shown up in random TV news spots and fifty-fifty moderated a panel word at the CEDIA home-technology conference. You tin follow his rants on Twitter at @snd_wagenseil.

Source: https://www.tomsguide.com/news/phone-number-reuse-risks

Posted by: smithpustrythe.blogspot.com

0 Response to "Your old phone number is a hacker's dream — what you need to know"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel