home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,127 of 2,445   
   Mike Powell to All   
   Verizon security flaw cou   
   03 Apr 25 10:16:00   
   
   TZUTC: -0500   
   MSGID: 854.consprcy@1:2320/105 2c53e003   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   Verizon security flaw could allow hackers to view entire call history   
      
   Date:   
   Thu, 03 Apr 2025 13:22:00 +0000   
      
   Description:   
   Verizon fixed the flaw in March 2025, but users should still be on their   
   guard.   
      
   FULL STORY   
      
   A bug in a Verizon API allowed malicious actors to view other peoples    
   incoming call logs until it was fixed.    
      
   Cybersecurity researcher Evan Connelly found the bug in Call Filter, a free   
   app Verizon ships with all iOS and Android devices sold directly through the   
   telco to help users block spam calls, identify unknown numbers, and avoid   
   robocalls.    
      
   Given Verizons large subscriber base, the app likely has millions of users,    
   as it offers features like spam detection, caller ID, personal block lists,   
   and automatic blocking of high-risk calls. Call Filter also has a premium   
   version which adds spam lookup, custom controls, and caller ID for unknown   
   numbers.    
      
   Targeting journalists    
      
   As Connelly explained, the app connects to an API endpoint where it retrieves   
   the logged-in users incoming call history, and then displays it in the app.   
   However, due to a misconfiguration in the API, the users phone number is not   
   verified, meaning that any user could request the data for anyone else.    
      
   Connelly tested the iOS version, but claims the problem is platform-agnostic,   
   since the bug resides in the API, instead of the app itself.    
      
   Seeing someones call log might not seem like much at first, but Connelly    
   warns that it could be a powerful surveillance tool, especially against   
   high-profile targets such as journalists, government opponents, dissidents,   
   and similar.    
      
   "Call metadata might seem harmless, but in the wrong hands, it becomes a   
   powerful surveillance tool. With unrestricted access to another user's call   
   history, an attacker could reconstruct daily routines, identify frequent   
   contacts, and infer personal relationships," Connelly said.    
      
   Verizon addressed the flaw sometime in March 2025, but we dont know for how   
   long this information was exposed, so users should still take extra care.    
      
    Via BleepingComputer   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/verizon-security-flaw-could-allow-hacke   
   rs-to-view-entire-call-history   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30   
   SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca