Submitted by BasedSweet t3_10opq9o in technology
grumpymosob t1_j6gt5ql wrote
our work phones are non stop robocalls. Fuck anyone who enables this shit. sending their crap straight to my voicemail so I have to dig through their garbage advertising to get messages from the vendors I need to deal with. google twilio all of them they should have to pay damages for lost revenue and lose their right to phone and internet connections. The cost in productivity to small business in this country is huge easily in the billions and these assholes never stop. All they are doing is hoping for that one senile old person they can take advantage of and the fcc does nothing.
Badtrainwreck t1_j6gwhou wrote
So when they were debating outlawing spoofing phone numbers they said that it’s protecting prank calls to allow people to change their number, obviously we know it’s the donors who operate the robocalls that politicians wanted to save, but my answer to this is simple.
You shouldn’t be able to spoof your number without paying a 1$ tax. That way prank calls can continue and robocalls are forced away from this. Then use that $1 tax for funding emergency service dispatchers because their funds are drying up from changes to the cellphone industry.
DirkBabypunch t1_j6h1swb wrote
Why are we worried about protecting prank calls? I don't see anything wrong with them getting caught in the crossfire.
EelTeamNine t1_j6hfjmo wrote
For real? That can't be a real argument
RudeMorgue t1_j6ih30v wrote
Seriously. F them.
SeniorJuniorDev t1_j6j3w0n wrote
Radio DJs sweating
d-givens t1_j6iqhl1 wrote
I use Twilio for SIP trunking. You can’t spoof numbers with them. You’re required to use a caller ID that matches a number on your account.
CondescendingShitbag t1_j6l0g8c wrote
This is supposed to be a mandatory requirement for all VoIP providers thanks to the FCC's STIR/SHAKEN policy of 2019. Remains to be seen how effective the policy will actually be in practice.
AmHoomon t1_j6ks805 wrote
Sooooo how are they abusing our lines then?
drawkbox t1_j6lsn93 wrote
These scammers must be either swapping out the numbers regularly, using one time verified numbers or they have some holes in twilio that are getting around this.
Would seem that most patterns for detecting this would be pretty obvious, twilio is just letting it slide probably for that revenue. Now that they got an FCC hit, revenue is threatened, and they will have to close the hole or stop allowing these patterns.
There might be a reason to constantly swap out numbers, but not many... Those should be highly looked at like when you make an app and have background geolocation services on, Apple really prods you to make sure you aren't abusing that. Twilio just seems to let this slide.
The fact that they have these plausible deniability policies that are letting scammers slide, probably due to more political spam demand, is another reason to not trust them for SMS/Authenticator authentication codes over Twilio SMS or Authy app.
There was a big Authy hack not too long ago.
Twilio and Authy also hacked recently. This also affected Okta/Auth0 and companies that rely on those dependencies like DoorDash.
Anyone still using Authy over Google Authenticator or Microsoft Authenticator is not doing good opsec. Twilio has always been sketch. This breach is damaging.
> U.S. messaging giant Twilio has confirmed hackers also compromised the accounts of some Authy users as part of a wider breach of Twilio’s systems. Authy is Twilio’s two-factor authentication (2FA) app it acquired in 2015.
> Twilio’s breach earlier this month, which saw malicious actors accessing the data of more than 100 Twilio customers after successfully phishing multiple employees, keeps growing in scale. Researchers this week linked the attack on Twilio and others to a wider phishing campaign by a hacking group dubbed “0ktapus,” which has stolen close to 10,000 employee credentials from at least 130 organizations since March.
> Now, Twilio has confirmed that Authy users were also impacted by the breach.
> In an update to its incident report on August 24, Twilio said that the hackers gained access to the accounts of 93 individual Authy users and registered additional devices, effectively allowing the attackers to generate login codes for any connected 2FA-enabled account.
> The company said it has “since identified and removed unauthorized devices from these Authy accounts” and is advising affected Authy users, which it has contacted, to review linked accounts for suspicious activity. It’s also recommending that users review all devices tied to their Authy accounts and disable “allow Multi-device” in the Authy application to prevent new device additions.
Okta breached as a result of the Twilio/Authy breach
> Identity giant Okta on Thursday also confirmed it was compromised as a result of the Twilio breach. The company said in a blog post that the hackers — which it refers to as “Scatter Swine” — spoofed Okta login pages to target organizations that rely on the company’s single sign-on service. Okta said that when the hackers gained access to Twilio’s internal console, they obtained a “small number” of Okta customer phone numbers and SMS messages that contained one-time passwords. This marks the second time Okta has reported a security incident this year.
> In its analysis of the phishing campaign, Okta said that Scatter Swine hackers likely harvested mobile phone numbers from data aggregation services that link phone numbers to employees at specific organizations. At least one of the hackers called targeted employees impersonating IT support, noting that the hacker’s accent “appears to be North American.” This may align with this week’s Group-IB investigation, which suggested one of the hackers involved in the campaign may reside in North Carolina.
DoorDash also caught up in it
> DoorDash also confirmed this week that it was compromised by the same hacking group. The food delivery giant told TechCrunch that malicious hackers stole credentials from employees of a third-party vendor that were then used to gain access to some of DoorDash’s internal tools. The company declined to name the third-party, but confirmed the vendor was not Twilio.
The_Yogurtcloset t1_j6ijnrf wrote
Just a note, malware can be a source of robocalls. Make sure your work computers are clean!
[deleted] t1_j6i6q7k wrote
[removed]
drawkbox t1_j6ls1h4 wrote
Yeah they target work phones because people have to answer more frequently. A message or call that is sent to a work phone that goes opened/unanswered then it looks like someone is slacking.
Most personal phones people just let go to message or just delete (without opening to evade image based tracking) unknown numbers, with business or work most numbers are new or unknown.
Sucks how they target them. Any phone number or text recipient they send to that answers/views will get more and more and more spam.
Viewing a single comment thread. View all comments