By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
10alert.com10alert.com
  • Threats
    • WordPress ThreatsDanger
    Threats
    A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include…
    Show More
    Top News
    CryptoLocker is Bad News
    8 months ago
    Debunking the myths of malware and antivirus programs
    8 months ago
    Security Week 38: Cisco routers under attack, bug in AirDrop, CoinVault cryptohawkers aressted
    8 months ago
    Latest News
    Triangulation: Trojan for iOS | Kaspersky official blog
    2 days ago
    Wordfence Intelligence Weekly WordPress Vulnerability Report (May 22, 2023 to May 28, 2023)
    2 days ago
    Safeguards against firmware signed with stolen MSI keys
    4 days ago
    WPDeveloper Addresses Privilege Escalation Vulnerability in ReviewX WordPress Plugin
    4 days ago
  • Fix
    Fix
    Troubleshooting guide you need when errors, bugs or technical glitches might ruin your digital experience.
    Show More
    Top News
    Surface Pro 4 teardown: Get a closer look at the components
    8 months ago
    How to reset Windows Update components on Windows 10
    8 months ago
    Windows 11 build 22610 with new changes in Dev and Beta Channels
    8 months ago
    Latest News
    How automatically delete unused files from my Downloads folder?
    4 months ago
    Now you can speed up any video in your browser
    4 months ago
    How to restore access to a file after EFS or view it on another computer?
    4 months ago
    18 Proven Tips to Speed Up Your WordPress Site and Improve SEO | 2023 Guide
    5 months ago
  • How To
    How ToShow More
    Dynamic data collection with Zaraz Worker Variables
    Dynamic data collection with Zaraz Worker Variables
    1 day ago
    Reduce latency and increase cache hits with Regional Tiered Cache
    Reduce latency and increase cache hits with Regional Tiered Cache
    2 days ago
    Cloudflare is deprecating Railgun
    Cloudflare is deprecating Railgun
    2 days ago
    What is two-factor authentication | Kaspersky official blog
    5 days ago
    Acer refreshes Windows 11 PCs for work and play: Swift Edge 16 and Predator Triton 16
    1 week ago
  • News
    News
    This category of resources includes the latest technology news and updates, covering a wide range of topics and innovations in the tech industry. From new…
    Show More
    Top News
    How to enable Hibernate on Windows 11
    1 month ago
    How to change memory allocation for WSA on Windows 11
    3 weeks ago
    How to write in different fonts in Telegram
    8 months ago
    Latest News
    How to add CPU, GPU, RAM widgets on Windows 11
    2 days ago
    How to create virtual drive (VHD, VHDX, Dev Drive) on Windows 11
    5 days ago
    How to enable Taskbar End Task option to close apps on Windows 11
    5 days ago
    How to check USB4 devices specs from Settings on Windows 11
    5 days ago
  • Glossary
  • My Bookmarks
Reading: Hijacking online accounts through voicemail
Share
Notification Show More
Aa
Aa
10alert.com10alert.com
  • Threats
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
  • Threats
    • WordPress ThreatsDanger
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
Follow US
AppsThreats

Hijacking online accounts through voicemail

Tom Grant
Last updated: 13 October
Tom Grant 8 months ago
Share
5 Min Read

Who uses voicemail these days? “No one” is probably the first response on most people’s lips. That answer is both right and wrong. True, not many people use voicemail now, yet many mobile subscribers have the service — and it’s still in good working order, even if somewhat neglected.

Contents
How to hack PayPal and WhatsApp through voicemailHow to guard against voicemail-based hacking

And remember: Just because you don’t use your voicemail doesn’t mean no one else does. In his report “Compromising online accounts by cracking voicemail systems” at DEF CON 26, security researcher Martin Vigo demonstrated that voicemail might be of interest to intruders looking to hack into your online accounts.

In fact, most operators allow access to your voice mailbox not only from your phone, but also using an external phone number — in which case access is protected with a PIN. However voicemail PINs are often far from secure. A lot of subscribers use default codes set by the operator — usually either the last digits of the phone number or something simple like 1111 or 1234.

Moreover, even if the subscriber bothers to change the PIN, the probability of it being guessed is still fairly high: As another research shows, when it comes to thinking up PINs, people are even less inventive than they are with passwords.

First, the PIN is likely to consist of four digits, even if it’s technically possible to make it longer. Second, many users opt for easy-to-remember strings of four identical digits or combinations such as 1234, 9876, 2580 (the middle vertical row on the phone keypad), and the like. PINs beginning with 19xx are also very popular. Knowing these quirks makes it quicker and simpler to crack a voice mailbox.

There is no need to comb through all combinations manually — the job can be done by a script that calls the voicemail number and enters different combinations in tone mode. That means brute-forcing voicemail is not only possible, but also quite resource-light. “So what?” you might say, “There’s nothing valuable in my voicemail.” Or so you think.

How to hack PayPal and WhatsApp through voicemail

When resetting a password, many of the largest online services offer, among other options, to call you on the phone number specified in your profile and supply a verification code.

The attacker’s task is merely to figure out the voicemail PIN and wait until the victim’s phone is turned off or out of range (for example, in airplane mode). Then they simply initiate a password reset in the online service and select as the verification option a call that will go straight to voicemail.

Martin Vigo demonstrated how this technique can be used to hijack a WhatsApp account.

Some online resources employ a slightly different verification process: The service redials the phone number that is associated with the account and prompts the user to enter the numbers displayed on the password reset page as verification. This can be bypassed, however, with the help of a simple trick that involves setting the voicemail greeting message to a recording of the keypad tones that correspond to the digits in the reset code.

One online service with this kind of verification system is PayPal. Martin Vigo successfully cracked that, too:

The above are just a couple of examples. In fact, many more services use an automated voice call to an associated phone number to verify a password reset or to transmit a one-time two-factor authentication code.

How to guard against voicemail-based hacking

  • Consider disabling voicemail altogether; it has little practical use anyway;
  • Use a secure PIN, if you do need voicemail. For a start, it should be longer than four digits. The more, the better. Next, the combination should be hard to guess, and preferably random.
  • Don’t indiscriminately give out the phone number that your online accounts are associated with. The harder it is to match your online identity with a phone number, the better.
  • Try not to associate your phone number with an online service at all if it’s not a precondition or required for two-factor authentication.
  • Use two-factor authentication — ideally an app such as Google Authenticator or a hardware device such as YubiKey.

Source: kaspersky.com

Translate this article

TAGGED: Authentication, Phishing, Security, Threats, WhatsApp, YouTube
Tom Grant October 13, 2022 October 7, 2022
Share this Article
Facebook Twitter Reddit Telegram Email Copy Link Print

STAY CONECTED

24.8k Followers Like
253.9k Followers Follow
33.7k Subscribers Subscribe
124.8k Members Follow

LAST 10 ALERT

Dynamic data collection with Zaraz Worker Variables
Dynamic data collection with Zaraz Worker Variables
Apps 1 day ago
How to add CPU, GPU, RAM widgets on Windows 11
News 2 days ago
Reduce latency and increase cache hits with Regional Tiered Cache
Reduce latency and increase cache hits with Regional Tiered Cache
Apps 2 days ago
Cloudflare is deprecating Railgun
Cloudflare is deprecating Railgun
Apps 2 days ago
Triangulation: Trojan for iOS | Kaspersky official blog
Threats 2 days ago

Recent Posts

  • Dynamic data collection with Zaraz Worker Variables
  • How to add CPU, GPU, RAM widgets on Windows 11
  • Reduce latency and increase cache hits with Regional Tiered Cache
  • Cloudflare is deprecating Railgun
  • Triangulation: Trojan for iOS | Kaspersky official blog

You Might Also Like

Dynamic data collection with Zaraz Worker Variables
Apps

Dynamic data collection with Zaraz Worker Variables

1 day ago
Reduce latency and increase cache hits with Regional Tiered Cache
Apps

Reduce latency and increase cache hits with Regional Tiered Cache

2 days ago
Cloudflare is deprecating Railgun
Apps

Cloudflare is deprecating Railgun

2 days ago
Threats

Triangulation: Trojan for iOS | Kaspersky official blog

2 days ago
Show More

Related stories

How to Use Cloudflare to Secure Your WordPress Site
How To Starting Chrome from the command line
How to fix error 0x80070057 in Chrome?
Windows 10 How To Disable Slide to Shutdown
Windows search not working (FIX)
How to watch movies and TV series for free on Kinopoisk?
Previous Next

10 New Stories

Wordfence Intelligence Weekly WordPress Vulnerability Report (May 22, 2023 to May 28, 2023)
Safeguards against firmware signed with stolen MSI keys
WPDeveloper Addresses Privilege Escalation Vulnerability in ReviewX WordPress Plugin
How to create virtual drive (VHD, VHDX, Dev Drive) on Windows 11
How to enable Taskbar End Task option to close apps on Windows 11
How to check USB4 devices specs from Settings on Windows 11
Previous Next
Hot News
Dynamic data collection with Zaraz Worker Variables
How to add CPU, GPU, RAM widgets on Windows 11
Reduce latency and increase cache hits with Regional Tiered Cache
Cloudflare is deprecating Railgun
Triangulation: Trojan for iOS | Kaspersky official blog
10alert.com10alert.com
Follow US

© 10 Alert Network. All Rights Reserved.

  • Privacy Policy
  • Contact
  • Customize Interests
  • My Bookmarks
  • Glossary
Go to mobile version
adbanner
AdBlock Detected
Our site is an advertising supported site. Please whitelist to support our site.
Okay, I'll Whitelist
Welcome Back!

Sign in to your account

Lost your password?