Company that routes SMS for all major US carriers was hacked for five years
Syniverse hasn't revealed whether text messages were exposed.
Syniverse isn’t revealing more details
When contacted by Ars today, a Syniverse spokesperson provided a general statement that mostly repeats what's in the SEC filing. Syniverse declined to answer our specific questions about whether text messages were exposed and about the impact on the major US carriers.
"Given the confidential nature of our relationship with our customers and a pending law enforcement investigation, we do not anticipate further public statements regarding this matter," Syniverse said.
The SEC filing is a preliminary proxy statement related to a pending merger with a special-purpose acquisition company that will make Syniverse a publicly traded firm. (The document was filed by M3-Brigade Acquisition II Corp., the blank-check company.) As is standard with SEC filings, the document discusses risk factors for investors, in this case including the security-related risk factors demonstrated by the Syniverse database hack.
Syniverse routes messages for 300 operators
Syniverse says its intercarrier messaging service processes over 740 billion messages each year for over 300 mobile operators worldwide. Though Syniverse likely isn't a familiar name to most cell phone users, the company plays a key role in ensuring that text messages get to their destination.
Syniverse's importance in SMS was highlighted in November 2019 when a server failure caused over 168,000 messages to be delivered nearly nine months late. The messages were in a queue and left undelivered when a server failed on February 14, 2019, and finally reached their recipients in November when the server was reactivated.
We asked AT&T, Verizon, and T-Mobile today whether the hacker had access to people's text messages, and we will update this article if we get any new information.
Update: T-Mobile provided Ars a statement saying that it has "no indication" that text messages or other types of personal information were exposed. "We are aware of a security incident involving one of [our] third-party vendors, Syniverse. They provide reconciliation services for payments made between carriers. The breach impacted numerous carriers, including T-Mobile, however we have no indication that any personal information, call record details or text message content of T-Mobile customers were impacted. We will continue to investigate and work with Syniverse to close any vulnerabilities identified," T-Mobile said. . .
Syniverse's SEC filing was submitted on September 27 and discussed yesterday in an article in Vice's Motherboard section. According to Vice, a "former Syniverse employee who worked on the EDT systems" said those systems contain information on all types of call records. Vice also quoted an employee of a phone company who said that a hacker could have gained access to the contents of SMS text messages.
Vice wrote:
Syniverse repeatedly declined to answer specific questions from Motherboard about the scale of the breach and what specific data was affected, but according to a person who works at a telephone carrier, whoever hacked Syniverse could have had access to metadata such as length and cost, caller and receiver's numbers, the location of the parties in the call, as well as the content of SMS text messages.
"Syniverse is a common exchange hub for carriers around the world passing billing info back and forth to each other," the source, who asked to remain anonymous as they were not authorized to talk to the press, told Motherboard. "So it inevitably carries sensitive info like call records, data usage records, text messages, etc. [...] The thing is—I don't know exactly what was being exchanged in that environment. One would have to imagine though it easily could be customer records and [personal identifying information] given that Syniverse exchanges call records and other billing details between carriers."
No comments:
Post a Comment