Some of the stuff that was extracted from the unencrypted traffic in the link:
- T-Mobile backhaul: Users' SMS, voice call contents and internet traffic content in plain text.
- AT&T Mexico cellular backhaul: Raw user internet traffic
- TelMex VOIP on satellite backhaul: Plaintext voice calls
- U.S. military: SIP traffic exposing ship names
- Mexico government and military: Unencrypted intra-government traffic
- Walmart Mexico: Unencrypted corporate emails, plaintext credentials to inventory management systems, inventory records transferred and updated using FTP
This is insane!
While it is important to work on futuristic threats such as Quantum cryptanalysis, backdoors in standardized cryptographic protocols, etc. - the unfortunate reality is that the vast majority of real-world attacks happen because basic protection is not enabled. Good reminder not take our eyes off the basics.
feraloink
today at 9:21 AM
In https://satcom.sysnet.ucsd.edu/ Has The Issue Been Fixed section:
>we re-scanned with their permission and were able to verify a remedy had been deployed: T-Mobile, WalMart, and KPU.
The fact that critical infrastructure (e.g. utility companies using satellite links for remote-operated SCADA) was exposed is really scary too.
> Real-time military object telemetry with precise geolocation,
identifiers, and live telemetry
Oops
NoiseBert69
today at 8:39 AM
Pulls out the bamboo whip
Another round of OpSec training
alfiedotwtf
today at 7:53 AM
> This is insane!
Not as insane as it was in the early 2000s…
> while link-layer
encryption has been standard practice in satellite TV for decades
Before Snowden, I would say 99% of ALL TCP traffic I saw on satellites was in unadulterated plain-text. Web and email mostly.
… the pipe was so fast, you could only pcap if you had a SCSI hard drive!
CGMthrowaway
today at 5:04 AM
Is there a git repo that lets one read this stuff in real time yet?