AGL 38.18 Decreased By ▼ -0.22 (-0.57%)
AIRLINK 142.98 Increased By ▲ 7.98 (5.91%)
BOP 5.07 Decreased By ▼ -0.02 (-0.39%)
CNERGY 3.77 Decreased By ▼ -0.02 (-0.53%)
DCL 7.56 Decreased By ▼ -0.03 (-0.4%)
DFML 44.48 Increased By ▲ 0.03 (0.07%)
DGKC 76.25 Decreased By ▼ -1.15 (-1.49%)
FCCL 26.95 Increased By ▲ 0.07 (0.26%)
FFBL 52.00 Decreased By ▼ -0.97 (-1.83%)
FFL 8.52 Decreased By ▼ -0.02 (-0.23%)
HUBC 125.51 Increased By ▲ 1.71 (1.38%)
HUMNL 9.99 Increased By ▲ 0.05 (0.5%)
KEL 3.74 Increased By ▲ 0.01 (0.27%)
KOSM 8.15 Increased By ▲ 0.07 (0.87%)
MLCF 34.75 Increased By ▲ 1.05 (3.12%)
NBP 58.71 Increased By ▲ 0.22 (0.38%)
OGDC 154.50 Increased By ▲ 4.55 (3.03%)
PAEL 25.15 Increased By ▲ 0.45 (1.82%)
PIBTL 5.93 Increased By ▲ 0.08 (1.37%)
PPL 118.31 Increased By ▲ 6.66 (5.97%)
PRL 24.38 Increased By ▲ 0.48 (2.01%)
PTC 12.00 Decreased By ▼ -0.10 (-0.83%)
SEARL 56.00 Decreased By ▼ -0.89 (-1.56%)
TELE 7.05 Increased By ▲ 0.05 (0.71%)
TOMCL 34.99 Decreased By ▼ -0.16 (-0.46%)
TPLP 6.98 Decreased By ▼ -0.07 (-0.99%)
TREET 13.98 Decreased By ▼ -0.18 (-1.27%)
TRG 46.10 Decreased By ▼ -0.13 (-0.28%)
UNITY 26.00 Decreased By ▼ -0.08 (-0.31%)
WTL 1.21 No Change ▼ 0.00 (0%)
BR100 8,822 Increased By 86.7 (0.99%)
BR30 26,723 Increased By 466.7 (1.78%)
KSE100 83,532 Increased By 810.2 (0.98%)
KSE30 26,710 Increased By 328 (1.24%)

Computer hackers have taken to stealing data the easy way - by eavesdropping on phone and e-mail conversations to find the keys to seemingly impregnable networks, security experts say. The danger of attacks with insider information was illustrated earlier this month with the arrest of a California man accused of breaking into mobile phone network T-Mobile USA Inc's database and reading e-mails and files of the US Secret Service, and by the exploits of a hacker who breached a hospital's database and changed mammogram results.
The nature of threats to network security has changed as sophisticated hackers learned to tap into sensitive information flowing through telecommunications' servers, especially those that provide wireless and Internet access.
"Telecom providers are probably one of the main targets for malicious attackers because they control communications for everybody," said Ralph Echemendia, head of Intense School, which trains executives in network security risks.
Hackers may con their way into a phone network by posing as phone company tech employees to get passwords into the network. Then they could essentially tap phones or search for personal data like text files or even camera phone photos.
"(Hackers) will sit there and listen in, waiting to get valuable information," Echemendia said. "Once they have a foothold on one system they go through the same process to find other hosts."
Security experts at Intrusic Inc captured 4,466 passwords and 103 master passwords allowing global access to corporate databases while monitoring one Internet service provider for a 24-hour period, Intrusic President Jonathan Bingham said.
"It's like stealing candy from a baby," Bingham said. "The malicious attacker will assume the identity of a person whose password they have stolen through this passive sniffing and they end up entering this organisation as a legitimate user."
Once inside, it takes the hacker seconds to set up back doors that allow access to the database at any time to do more spying, data theft or worse.
Most hackers, however, are after information - passwords, social security numbers and birth dates - that they can sell or use to penetrate bank and credit card accounts, Forrester Research Inc analyst Laura Koetzle said.
"Telecoms and cable companies are pretty high on the list simply because of their huge customer bases," Koetzle said. "If they can crack T-Mobile's database they can get user names and passwords for (millions of) subscribers at all once."
In a statement, T-Mobile, a Deutsche Telekom AG unit, said it "quickly put in safeguards to prevent further access and began an investigation" after a hacker broke into its internal computer systems in 2003 and accessed data on 400 customers.
As more companies shift business functions to the Internet and allow workers to access secure systems from off-site, it becomes tougher to guard against insider attacks and easier for hackers to breach the system, said Stan Quintana, director of managed security services at AT&T Corp.
"All these types of environments are requiring a higher level of security of data in transit," he said.

Copyright Reuters, 2005

Comments

Comments are closed.