Stories
Slash Boxes
Comments

SoylentNews is people

posted by chromas on Wednesday September 12 2018, @10:44PM   Printer-friendly
from the Czech-your-password dept.

Submitted via IRC for TheMightyBuzzard

A Czech court recently sentenced two hackers to three years in prison for accessing Vodafone customer's mobile accounts and use them to purchase 600,000 Czech Koruna worth of gambling services. Vodafone reportedly wants the hacked victim's to pay for these charges as they were using an easy password of "1234".

According to reporting from Czech news site idnes.cz, the hackers accessed mobile customer's accounts by using the password 1234. Once they were able to gain access, they ordered new SIM cards that they picked up from various branches. As they knew the phone number and password they were able to pick up the SIM card and install it in their phones without any other verification.

This allowed the attackers to charge over 600,000 Czech Koruna, or approximately 30K USD, for gambling services.

What do you lot think, should there be a blatant stupidity tax?

Source: https://www.bleepingcomputer.com/news/security/vodafone-tells-hacked-customers-with-1234-password-to-pay-back-money/


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 5, Insightful) by darkpixel on Wednesday September 12 2018, @11:43PM (7 children)

    by darkpixel (4281) on Wednesday September 12 2018, @11:43PM (#733906)

    Sure, we can have a stupidity tax. But let's charge Vodaphone. I have a 14-digit PIN I would *love* to use in order to be *secure*...but neither my bank nor my cell phone company allow anything longer than 4 digits.

    Starting Score:    1  point
    Moderation   +4  
       Insightful=3, Informative=1, Total=4
    Extra 'Insightful' Modifier   0  

    Total Score:   5  
  • (Score: 0) by Anonymous Coward on Wednesday September 12 2018, @11:50PM

    by Anonymous Coward on Wednesday September 12 2018, @11:50PM (#733907)

    Most insightful comment here.

  • (Score: 2) by inertnet on Wednesday September 12 2018, @11:56PM (2 children)

    by inertnet (4071) Subscriber Badge on Wednesday September 12 2018, @11:56PM (#733909) Journal

    Even worse, this site already has your PIN [deviantart.com].

    • (Score: 0) by Anonymous Coward on Thursday September 13 2018, @06:03AM (1 child)

      by Anonymous Coward on Thursday September 13 2018, @06:03AM (#734045)

      The comments on there are full of people who would be in the highest idiot-tax bracket. For example:

      I literally just wasted one+ hours of my life, making a script that then took 2 minutes more of my life to create a list of all the possible combinations...
      When in reality I should've just Googled it first to see if someone else already had a list...

      Why did I do this to my self ;~;

      I don't even know where to start with this, but at least he tried, unlike all the others who apparently can't count.

      • (Score: 1) by darkpixel on Friday September 14 2018, @12:29AM

        by darkpixel (4281) on Friday September 14 2018, @12:29AM (#734583)

        I'm not sure why it would take hours of his life.

        Bash:

        for n in {0000..9999}; do echo $n; done

        Node:

        const pad = require('pad');
        var i;
        for (i = 0; i < 10000; i++) {
        console.log(pad(4, i, '0'));
        }

        Python:

        for i in range(0, 9999):
            print(format(i, '04'))

        BASIC:

        10 PRINT "You're still programming in BASIC? Go fuck yourself."

  • (Score: 5, Insightful) by Fluffeh on Thursday September 13 2018, @12:29AM (1 child)

    by Fluffeh (954) Subscriber Badge on Thursday September 13 2018, @12:29AM (#733926) Journal

    But let's charge Vodaphone.

    That's spot on.Because in this case, it isn't the customers who got hacked, it is poor Vodafone processes and a lack of controls in place to mitigate the risk that has caused this. Were the customer passwords daft? Yes. But it was the company rules and processes that allowed this to happen, so Vodaphone can't pass the buck here when some (at least partly) clever crooks gamed the system and made everyone look stupid.

    I would say from a PR point of view, the best thing Vodafone could do would be to shut up and change their processes to try to stop this happening again. Also, given the crooks had access to accounts, how many personal voicemails were saved, was there any access to customer cloud data?

    Lastly, I'm also going to say that there must have been an AWFUL lot of customer accounts being TESTED to see if their password was 1234. Isn't a good part of intrusion security checking for anomalous traffic out of no-where? You would think a single IP suddenly trying to access thousands of accounts using a password of 1234 should sound alarm bells. This should have been picked up and shut down before a single SIM card was ordered or a single bet was placed.

    • (Score: 5, Insightful) by Mykl on Thursday September 13 2018, @03:24AM

      by Mykl (1112) on Thursday September 13 2018, @03:24AM (#733992)

      Vodafone can't claim that they are offering super security when there are a maximum of 10,000 passwords available. If, as the summary implies, the "hackers" just trawled the customer base with a set PIN, they'd be bound to pick up a number of accounts no matter which PIN they entered. 1234 was probably just picked because it was likely to have slightly more results than another random number

  • (Score: 3, Insightful) by bzipitidoo on Thursday September 13 2018, @02:44AM

    by bzipitidoo (4388) Subscriber Badge on Thursday September 13 2018, @02:44AM (#733973) Journal

    The one I love is truncating the password to 8 characters. More than one system I've encountered did that. Sure, it'll let you type in a longer password, but it only checks the first 8 characters. That's the Y2K of password security. The designers were too damned miserly to allow a few more bytes for a little bit longer password, as if it's still the 1970s when 256 bytes really was a significant amount of memory.

    I also giggle whenever an organization is able to tell me what my password was, when I claim to have forgotten it.

    And, wow, the insecurity of 1980s multiuser OSes was shocking. Did a lot of things that would be unthinkable today. Store all the passwords in plaintext, and leave them in memory after the password checker exits so that any other process that allocates memory and happens to receive that block can just read everyone's passwords. Yeah, that's what the mighty IBM mainframe did. The same sort of trick was probably possible with the disk. Change your password, forcing the password file to be updated, and maybe you could grab the memory that the IO system just used, or maybe you could grab the area on the disk where the old password file was stored.