{"id":13527,"date":"2018-10-05T10:45:29","date_gmt":"2018-10-05T18:45:29","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/10\/05\/news-7294\/"},"modified":"2018-10-05T10:45:29","modified_gmt":"2018-10-05T18:45:29","slug":"news-7294","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/10\/05\/news-7294\/","title":{"rendered":"A &#8216;Scarily Simple&#8217; Bug Put Millions of Cox Cable Customer Accounts at Risk"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5bb79c18a8af293117556135\/master\/pass\/Phones-929661164.jpg\"\/><\/p>\n<p><strong>Credit to Author: Louise Matsakis| Date: Fri, 05 Oct 2018 18:17:58 +0000<\/strong><\/p>\n<p><span class=\"lede\">Cybersecurity researchers regularly <\/span>disclose <a href=\"https:\/\/www.wired.com\/tag\/cybersecurity\/\">the bugs<\/a> they find in different applications and websites across the internet. Sometimes, these vulnerabilities are <a href=\"https:\/\/www.wired.com\/story\/foreshadow-intel-secure-enclave-vulnerability\/\">incredibly complicated<\/a> to exploit, evidence more of a researcher&#x27;s expertise than something the average consumer should worry about. In other scenarios, analysts find simple holes that a novice could use to steal information. This is a case of the latter.<\/p>\n<p>Earlier this month, a duo of researchers discovered a dead-simple insecurity on the website for Cox Communications, an US cable and internet provider with around <a href=\"http:\/\/newsroom.cox.com\/company-overview\" target=\"_blank\">six million customers<\/a>. The problem they discovered would have allowed attackers to take over user accounts and gain access to sensitive data like billing information. Cox Communications patched the previously unreported vulnerability after WIRED reached out, and there&#x27;s no evidence any customer information was compromised.<\/p>\n<p class=\"paywall\">The insecurity related to how Cox Communications previously allowed customers to reset their online account passwords. In addition to answering a security question or responding to an email, people could elect to receive a phone call, with an automated voice reading them a special code. But a hacker could change the phone number associated with the account from the webpage, using only a customer&#x27;s User ID or their cox.net email address, allowing them to intercept the code themselves. Then, they could reset the account and gain access to billing and other customer information. If they were simply interested in stealing information, rather than a specifically targeted attack, they could also guess random usernames.<\/p>\n<p class=\"paywall\">&quot;Cox takes the security of its customers\u2019 accounts very seriously, and we promptly address any identified vulnerabilities. Once Cox was made aware of this issue, we acted quickly to resolve it,&quot; a spokesperson for the company said in a statement. &quot;While our investigation continues, we do not believe this vulnerability was used outside of the test conducted by the security researcher. If individual customers were impacted, Cox will notify them.&quot;<\/p>\n<p class=\"paywall\">The spokesperson declined to specify exactly what customer data may have been vulnerable, and whether every Cox customer has an online account. (It&#x27;s possible only those who choose to pay their bill or manage their service online were affected.)<\/p>\n<p class=\"paywall\">&quot;Usually account takeovers have much more convoluted and complex steps, but this is the first one I discovered that was scarily simple,&quot; says Nicholas &quot;Convict&quot; Ceraolo, one of the security researchers, who along with his partner Ryan &quot;Phobia&quot; Stevenson, discovered the vulnerability. The same pair <a href=\"https:\/\/www.buzzfeednews.com\/article\/nicolenguyen\/spectrum-time-warner-cable-security-flaw\" target=\"_blank\">found<\/a> a similar flaw on the website for TV and internet provider Spectrum, which was reported in August. It would have allowed attackers to take over accounts with only a customer&#x27;s IP address.<\/p>\n<p class=\"paywall\">Spectrum and Cox also aren\u2019t the only cable providers to suffer from similar security issues this year. Also in August, a separate researcher found <a href=\"https:\/\/www.buzzfeednews.com\/article\/nicolenguyen\/a-comcast-security-flaw-exposed-millions-of-customers\" target=\"_blank\">two vulnerabilities<\/a> in the website for Comcast Xfinity, which inadvertently exposed customers\u2019 partial addresses and the last four digits of their Social Security number.<\/p>\n<p class=\"paywall\">By gaining access to your cable or internet account, an attacker wouldn\u2019t necessarily be able to do much harm. But using the sensitive personal information they found there, including your home address, they might be able to impersonate you elsewhere, like to your bank. In the past, hackers have used personally identifying details to carry out attacks like <a href=\"https:\/\/www.wired.com\/story\/sim-swap-attack-defend-phone\/\">SIM-swapping<\/a>, where they masquerade as you to your cell phone provider. Then, they can port your information over to a new smartphone they control. Thankfully in this case, it appears no Cox accounts were compromised, and the vulnerability has been fixed.<\/p>\n<p class=\"related-cne-video-component__dek\">It\u2019s 2017! It\u2019s time to start using an encrypted messaging app. Why? Using end-to-end encryption means that no one can see what you\u2019re sharing back and forth.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/cox-communications-vulnerability\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5bb79c18a8af293117556135\/master\/pass\/Phones-929661164.jpg\"\/><\/p>\n<p><strong>Credit to Author: Louise Matsakis| Date: Fri, 05 Oct 2018 18:17:58 +0000<\/strong><\/p>\n<p>The most straightforward insecurities can sometimes be the riskiest. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-13527","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13527","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13527"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13527\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13527"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13527"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13527"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}