{"id":14256,"date":"2019-01-07T11:10:07","date_gmt":"2019-01-07T19:10:07","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/01\/07\/news-8008\/"},"modified":"2019-01-07T11:10:07","modified_gmt":"2019-01-07T19:10:07","slug":"news-8008","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/01\/07\/news-8008\/","title":{"rendered":"Australia&#8217;s Early Warning Network compromised"},"content":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Mon, 07 Jan 2019 17:59:03 +0000<\/strong><\/p>\n<p>An early warning network designed to notify subscribers about dangerous weather in Australia has been compromised. The hacker sent many bogus messages via phone, SMS, and email, telling users that the service had been hacked.<\/p>\n<p>Early Warning Network, a service used by local governments to send notifications about weather hazards, found itself firing these rogue missives into the void late on Saturday evening. They haven&#8217;t revealed how many people received a message, but they caught the attack quickly and shut it down.<\/p>\n<h3>A warning from Early Warning Network<\/h3>\n<p>The <a href=\"http:\/\/www.ewn.com.au\" target=\"_blank\" rel=\"noopener\">website<\/a> says:<\/p>\n<blockquote>\n<p><em>At around 930pm EDT 5th January, the EWN Alerting system was illegally accessed with a nuisance message sent to a part of EWNs database. This was sent out via email, text message and landline. EWN staff at the time were able to quickly identify the attack and shut off the system limiting the number of messages sent out. Unfortunately, a small proportion of our database received this alert<\/em><\/p>\n<\/blockquote>\n<p>The text sent to subscribers read as follows:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/smsalert.jpg\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26787\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/early-warning-network-compromised\/attachment\/smsalert\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/smsalert.jpg\" data-orig-size=\"423,195\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"sms alert\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/smsalert-300x138.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/smsalert.jpg\" class=\"aligncenter size-full wp-image-26787\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/smsalert.jpg\" alt=\"sms alert\" width=\"423\" height=\"195\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/smsalert.jpg 423w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/smsalert-300x138.jpg 300w\" sizes=\"auto, (max-width: 423px) 100vw, 423px\" \/><\/a><\/p>\n<blockquote>\n<p><em>EWN has been hacked. Your personal data is not safe. Trying to fix the security issues. Email [address] if you wish to unsubscribe.<\/em><\/p>\n<\/blockquote>\n<p>If you were on the receiving end of the email version, you would have found it to be identical:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/mailalert.jpg\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26788\" data-permalink=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/early-warning-network-compromised\/attachment\/mailalert\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/mailalert.jpg\" data-orig-size=\"628,289\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"email alert\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/mailalert-300x138.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/mailalert-600x276.jpg\" class=\"aligncenter size-medium wp-image-26788\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/mailalert-300x138.jpg\" alt=\"email alert\" width=\"300\" height=\"138\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/mailalert-300x138.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/mailalert-600x276.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/mailalert.jpg 628w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center\">Click to enlarge<\/p>\n<p>Some people in EWN&#8217;s\u00a0<a href=\"http:\/\/www.ewn.com.au\/alerts\/ewn-hacked-privacy-alert-2019-01-05-400002.weather\" target=\"_blank\" rel=\"noopener\">comments sections<\/a>\u00a0reported receiving phone calls simply stating \u201cYou have been hacked,\u201d which would be a little alarming, to say the least. An Early Warning Network shouldn&#8217;t come with a warning, but this is where we&#8217;re at.<\/p>\n<h3>How did they do it?<\/h3>\n<p>The alert service has so far confirmed that the attack took place from inside Australia, and the rogue message was the result of <a href=\"https:\/\/www.facebook.com\/early.warning.network\/posts\/1988465077927790\" target=\"_blank\" rel=\"noopener\">login credentials obtained without permission<\/a>. There\u2019s no other information available at time of writing, but it does seem likely that this was a targeted spear phish.<\/p>\n<p>EWN have also stated that user information wasn\u2019t at risk:<\/p>\n<blockquote>\n<p><em>The unauthorized alert sent on Saturday night was undertaken by an unauthorized person using illicitly gained credentials to login and post a nuisance spam-notification to some of our customers. The link used in this alert were non-harmful and your personal information was not compromised in this event. Investigations are continuing with the Police and Australian Cyber Security Centre involved<\/em><\/p>\n<\/blockquote>\n<p>This directly contradicts the hacker\u2019s claim that \u201cyour personal data is not safe.\u201d It is also claimed that the links in the emails and SMS messages were not harmful.<\/p>\n<h3>What was the point?<\/h3>\n<p>Given the flat denial of user data being put at risk, it seems this is more about reputation damage. Perhaps someone has a weirdly specific grudge against a lifesaving service, or maybe it\u2019s just a trollish prank done for cheap laughs. Either way, it\u2019s an incredibly careless thing to do.<\/p>\n<p>In the Phlippines, <a href=\"https:\/\/www.phivolcs.dost.gov.ph\/\" target=\"_blank\" rel=\"noopener\">PHIVOLCS<\/a> warn about seismic activity and volcano eruptions, while <a href=\"http:\/\/bagong.pagasa.dost.gov.ph\/\" target=\"_blank\" rel=\"noopener\">PAGASA<\/a> deal with weather systems, typically via media alerts and social media. These are high-end setups, almost always government run. In the US, a variety of warnings are available under <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wireless_Emergency_Alerts\" target=\"_blank\" rel=\"noopener\">wireless emergency alerts<\/a>, which can include everything from <a href=\"https:\/\/www.fcc.gov\/consumers\/guides\/emergency-alert-system-eas\" target=\"_blank\" rel=\"noopener\">weather safety to AMBER alerts<\/a>. Early warning systems can save thousands\u2014as was evident by the lack of systems in place to warn tourists and locals about the Boxing Day tsunami in 2004, which claimed more than 200,000 lives.<\/p>\n<p>That&#8217;s why alert system tampering is always a bad idea. If people unsubscribe as a result of this attack, they could potentially put their lives in danger. EWN is not a huge organisation, and this attack on their systems and reputation could have a <a href=\"https:\/\/www.abc.net.au\/news\/2019-01-07\/emergency-text-service-hacked-warning-about-personal-data-sent\/10688748\" target=\"_blank\" rel=\"noopener\">huge impact<\/a>. It\u2019s no wonder police are quick to investigate the attack taking place on this particular network.<\/p>\n<h3>What can the affected organisation do now?<\/h3>\n<p>Given there\u2019s no further information as to how credentials were obtained, we can only offer an educated guess. If our hunch from earlier is correct, and it <em>is<\/em> a targeted phish, then some staff training may be needed. Additionally, they shouldn\u2019t be relying on \u201cjust\u201d a password to keep things safe.<\/p>\n<p>Even the longest password around is a chocolate fireguard if someone manages to swipe it. That\u2019s where <a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/09\/two-factor-authentication-2fa-secure-seems\/\" target=\"_blank\" rel=\"noopener\">two-factor authentication<\/a>\u00a0(2FA) comes into play. If more than one person has to share a single login, there&#8217;s a number of ways to get around that, too. Some password managers let groups share logins without revealing the password. If you haven&#8217;t thought about <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/05\/dont-need-27-different-passwords\/\" target=\"_blank\" rel=\"noopener\">beefing up password security<\/a>, now is as good a time as ever.<\/p>\n<h3>Lasting ramifications<\/h3>\n<p>Most people have seen an article about <a href=\"https:\/\/www.tomsguide.com\/us\/highway-signs-easily-hacked,news-18915.html\" target=\"_blank\" rel=\"noopener\">hacked road signs at some point<\/a>, and probably suppressed the odd giggle or two. There are good arguments for not doing that; there are <em>great<\/em> arguments for not messing with emergency alert systems.<\/p>\n<p>It remains to be seen if the person responsible for this will be caught. This is definitely not a great situation for anyone reliant on the integrity of these networks in bad weather regions. Will anyone even believe the next message sent out? And how much trouble will the person who did this be in, should fatalities occur? Our feeling is, a slap on the wrist is not enough.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/early-warning-network-compromised\/\">Australia&#8217;s Early Warning Network compromised<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/early-warning-network-compromised\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Mon, 07 Jan 2019 17:59:03 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/early-warning-network-compromised\/' title='Australia's Early Warning Network compromised'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/shutterstock_402429238.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>An Australian Early Warning System notifying subscribers of severe weather alerts was compromised over the weekend, with messages sent across a variety of formats. What did the hackers get up to? And why did they do it?<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/privacy\/\" rel=\"category tag\">Privacy<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/2fa\/\" rel=\"tag\">2fa<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/compromise\/\" rel=\"tag\">compromise<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/danger\/\" rel=\"tag\">danger<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/early-warning-network\/\" rel=\"tag\">early warning network<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/early-warning-system\/\" rel=\"tag\">early warning system<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/email\/\" rel=\"tag\">email<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/login\/\" rel=\"tag\">login<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/pagasa\/\" rel=\"tag\">PAGASA<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phivolcs\/\" rel=\"tag\">PHIVOLCS<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phonemail\/\" rel=\"tag\">phonemail<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/sms\/\" rel=\"tag\">sms<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/two-factor-authentication\/\" rel=\"tag\">two-factor authentication<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/weather\/\" rel=\"tag\">weather<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/early-warning-network-compromised\/' title='Australia's Early Warning Network compromised'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/early-warning-network-compromised\/\">Australia&#8217;s Early Warning Network compromised<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10598,18865,4503,2762,20597,20598,11222,18313,433,2331,20599,5897,11706,10606,434],"class_list":["post-14256","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-2fa","tag-compromise","tag-cybercrime","tag-danger","tag-early-warning-network","tag-early-warning-system","tag-email","tag-login","tag-pagasa","tag-phivolcs","tag-phonemail","tag-privacy","tag-sms","tag-two-factor-authentication","tag-weather"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14256","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14256"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14256\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14256"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}