• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • January 27th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Hacking News

Securus firm that lets US Cops track cellphone users has been hacked

May 17th, 2018 Uzair Amir Hacking News 0 comments
Securus firm that lets US Cops track cellphone users has been hacked
Share on FacebookShare on Twitter

Securus has not confirmed the breach but evidence suggests that they have been pwned.

A couple of days ago the Dallas, Texas-based prison technology company Securus made headlines for assisting the Police in the United States to perform real-time cell phone tracking of mobile users in the country.

Now, reportedly, Securus has suffered a data breach in which an unknown hacker has stolen its data. The hacker managed to steal login credentials of 2,800 customers including usernames, emails, poorly hashed passwords, phone number, and security questions.

Although we at HackRead cannot confirm the breach on our behalf, Joseph Cox of Motherboard, on the other hand, was in contact with the hacker who shared a sample data with the website. The data was then tested and confirmed legit by Cox – This means Securus has been pwned.

Moreover, a quick analysis of the stolen data has revealed that it contains information from 2011 forward while the impacted customers include city police and sheriff departments from Indianapolis, Phoenix, and Minneapolis.

For those who are unaware of how Securus works, it is a prison telecom firm that helps law enforcement monitor the majority of cell phones in the US. By using the web interface that leverages its location API, Securus is able to successfully access cell-site databases in real-time. These records are then used to obtain cell phone data to enable tracking.

Securus Allows Cops to Perform Real-time Tracking of Cell Phone Users in the US

George Avetisov, CEO of HYPR, commented on the issue and said that, “There is an expectation they are sharing data but not with explicit disclosure that there is risk or that the data are used by third parties and this is exactly why sensitive data belongs in the hands of those to whom it belongs: its owners. This is yet another example of how centralization of data inevitably results in unauthorized access due to hacking or accidental loss.”

Travis Jarae, CEO of OWI, said that “the Securus hack once again shows that people are focused solely on results and not on the vulnerabilities of the technologies used to produce them. In front of the Supreme Court right now is the case of Carpenter v. U.S., which is exploring the constitutionality of police officers working with third-parties to obtain mobile location data without a warrant. It will be interesting to see the impact this latest news about Securus plays in the outcome, expected later this summer.”

This is not the first time when a firm making recent headline has been hacked a few days after. Previously, the Israeli smartphone cracking firm Cellebrite was hacked days after news about its capabilities went public. In the attack, hackers leaked 800 GB of the firm’s data which confirmed its in-house hacking capabilities.

In March this year, a US-based firm Grayshift announced it created a tool called GrayKey which can crack any iPhone including iPhone 8 and iPhone X. One of its customers even bought the GrayKey device for $15,000, however on April 26th, 2018 GrayShift reportedly suffered a data breach after its code was stolen and extorted by unknown malicious hackers.

Image credit: Depositphotos

  • Tags
  • Cellebrite
  • GrayShift
  • hacking
  • internet
  • Prison
  • security
  • Securus
  • Spying
  • Surveillance
  • USA
Facebook Twitter LinkedIn Pinterest
Previous article StalinLocker ransomware: Put unlock code or say goodbye to your data
Next article Meet MEWKit, a tricky phishing attack draining Ethereum wallets
Uzair Amir

Uzair Amir

I am an Electronic Engineer, an Android Game Developer and a Tech writer. I am into music, snooker and my life motto is 'Do my best, so that I can't blame myself for anything.'

Related Posts
SonicWall hacked after 0-day flaws exploited by hackers

SonicWall hacked after 0-day flaws exploited by hackers

Massive privacy risk as hacker sold 2 million MyFreeCams user records

Massive privacy risk as hacker sold 2 million MyFreeCams user records

Malwarebytes says it was also breached by SolarWinds hackers

Malwarebytes says it was also breached by SolarWinds hackers

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Transferring Whatsapp data from iPhone to Android with MobileTrans
How To

Transferring Whatsapp data from iPhone to Android with MobileTrans

16
World's Most 'Resilient Malware' Botnet Emotet Taken Down
Cyber Crime

World's Most 'Resilient Malware' Botnet Emotet Taken Down

50
Top Cybersecurity Threats to Watch in 2021
Cyber Crime

Top Cybersecurity Threats to Watch in 2021

41

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us