If you are going to hack a phone system, do you really want to hack the Department of Homeland Security?
That’s what happened this weekend when someone made hundreds of illegal calls from a FEMA PBX to theMiddle East and Asia.
It appears that it was the usual culprits of poor change control and misconfigurations left FEMA’s digital doors open.
All of this is according to an Associated Press story I read on MSNBC.com last night.
According to the AP’s Eileen Sullivan and Ted Bridis, the attacker placed more than 400 calls on the hacked FEMA phone system to places such as Afghanistan, Saudi Arabia, India and Yemen.
Here’s the kicker, from an IT security perspective, from the AP story quoting a FEMA spokesperson:
FEMA’s chief information officer is investigating who hacked into the system and where exactly the calls were placed to. At this point it appears a “hole†was left open by the contractor when the voicemail system was being upgraded, Olshanski said. Olshanski did not know who the contractor was or what hole specifically was left open, but he assured the hole has since been closed.
This illustrates an excellent, yet often overlooked, point. Despite all of the attention we spend focusing on zero-day vulnerabilities and exotic exploits and attacks – many times it’s simply poor change control procedures, lack of urgency to patch, or carelessness that gets an organization bitten.
Fortunately, in this case, it only appears to have been $12,000 in illegal calls to the Middle East and Asia, and some egg of the face of FEMA and the DHS.