A hacker broke into a Homeland Security Department telephone system over the weekend and racked up around $12,000 in calls to the Middle East and Asia.
This type of hacking is very low-tech and “old school,” said John Jackson, a St. Louis-based security consultant. It was popular 10 to 15 years ago. Telecommunications security administrators now know to configure security settings, such as having individual users create unique passwords and not continue to use the password assigned to users in the initial setup.
“In this case it’s sort of embarrassing that it happened to FEMA themselves — FEMA being a child of DHS, with calls going to the Middle East,” Johnson said.
Afghanistan, Saudi Arabia, India and Yemen are among the countries calls were made to, Olshanski said. Most of the calls were about three minutes long, but some were as long as 10 minutes.
Sprint caught the fraud over the weekend and halted all outgoing long-distance calls from FEMA’s National Emergency Training Center in Emmitsburg.
FEMA’s chief information officer is investigating who hacked into the system and where exactly the calls were placed to. At this point it appears a “hole” was left open by the contractor when the voicemail system was being upgraded, Olshanski said. Olshanski did not know who the contractor was or what hole specifically was left open, but he assured the hole has since been closed.
In 2003, Homeland Security and the FBI investigated multiple reports about private industry being breached by these types of hackers.
“This illegal activity enables unauthorized individuals anywhere in the world to communicate via compromised U.S. phone systems in a way that is difficult to trace,” according to a department information bulletin from June 3, 2003.