TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Hacking the call records of millions of Americans

156 点作者 voxadam大约 1 个月前

11 条评论

twalkz大约 1 个月前
&gt; So surely the server validated that the phone number being requested was tied to the signed in user? Right? Right?? Well…no. It was possible to modify the phone number being sent, and then receive data back for Verizon numbers not associated with the signed in user.<p>Yikes. Seems like a pretty massive oversight by Verizon. I wish in situations like this there was some responsibility of the company at fault to provide information about if anyone else had used and abused this vector before it was responsibly disclosed.
dotty-大约 1 个月前
&gt; The Verizon Call Filter app uses the endpoint hxxps:&#x2F;&#x2F;clr-aqx.cequintvzwecid.com&#x2F;clr&#x2F;callLogRetrieval to lookup call history for the authenticated user and display it in the app.<p>Have you ever seen a more internal-looking domain name?
评论 #43569102 未加载
MPSFounder大约 1 个月前
I am hoping they paid a bounty for this (&gt; 20k). Otherwise doing the right thing isn&#x27;t right in my opinion. Their MBAs will not see a lesson to be learned, but something that is to be swept under the rug
评论 #43561279 未加载
评论 #43561009 未加载
devmtk大约 1 个月前
Crazy that this is possible at such a giant like Verizon. But it seems to happen more often than before.
评论 #43561027 未加载
评论 #43561085 未加载
adxl大约 1 个月前
Where was the pen testing?<p>Who is charge of security over there?<p>There need to be some answers, this is such an obvious and easily exploited security hole we need to ask what else is leaking from them?<p>Good that they fixed it quickly.
评论 #43569582 未加载
chatmasta大约 1 个月前
Call logs are printed on every billing statement by default. I believe it may even include SMS messages in some cases.<p>This data has likely proliferated widely throughout the company, subsidiaries and contractors, to reside on an unknowable number of systems. I would assume call record metadata is fully compromised at this point.<p>That’s not to take away from the finding in the blog – I’m merely commenting on the question in its conclusion, about the implications of a barely know technology vendor controlling the vulnerable server holding this data.
评论 #43570082 未加载
ycombinatrix大约 1 个月前
&gt;I did not test a number which had it disabled; I can’t rule out whether or not all Verizon numbers could have been impacted<p>Seems like the problem could be even bigger than described
vivzkestrel大约 1 个月前
i have always wondered something about this kind of hacking. How do you guys come up with these ideas. Should I download the top 100 apps from the AppStore or Playstore and try to reverse them or introspect their requests and see if I hit a jackpot. Perhaps I can report a bug bounty and maybe score some credit from the company to whom the app belongs. There are millions of apps across both stores. Perhaps find a way to introspect all of them? No seriously, do you do this full time. Is ethical hacking your job or how does this work? How do you randomly go about finding stuff that nobody has found out before
评论 #43569733 未加载
评论 #43567599 未加载
metalman大约 1 个月前
it&#x27;s odd that this is called &quot;hacking&quot; as there is no formal procedure or rules around granting access to phone records, and the huge number of &quot;scandles&quot; involving the abuse of phone records and the open use in tracking phones for assasination of foreign nationals cant be done without the casual access to all phone records, so there can be no doubts about an ongoing situation that continiously violates everyones right to private comunication. the headline is best described as a test of complacency. why bother?
grg0大约 1 个月前
How isn&#x27;t this the breaking news story of this and future weeks to come? The government likes to spread a lot of FUD about how foreign nation states can interfere with citizens, but when there is an actual vulnerability in such corporate turds as Verizon that actually allows the foreign nation to spy on you, nobody in the media bats an eye.<p>Of course, the answer is that the corporations own both Congress and the media.
coolThingsFirst大约 1 个月前
How did he intercept what API calls a mobile app was making?
评论 #43564002 未加载
评论 #43608788 未加载