By scanning for ports utilized by two systems commonly used in emergency alerts, the hacktivist says he found millions of IP addresses. He then scanned through them for a list of keywords likely to be used in such alert systems, and narrowed that down to thousands.
“I social engineered some manufacturers of these to give me either the service password or the default password, and after trying a few IPs, I was in,” he says. “I was disgusted. This is federal infrastructure, this isn’t a printer left open.”
He posted evidence on Twitter in late November showing a screen enabling him to generate EAS (Emergency Alert System) messages, including Child Abduction Emergencies, Civil Emergency Messages, or Evacuation Immediate [sic] alerts.
The hacktivist believes the system access points are available on the open internet for use by proper authorized personnel, but are easily accessible by people able to socially engineer the manufacturers of the systems.
“You can get whatever you need to gain full access – not to all, as most are updated – but a scary majority,” he says. “This reminds me of the banking systems, they run COBOL because they are too lazy and cheap to upgrade to something more secure and we get left with very old people who know how to program COBOL working on the banking and insurance infrastructure. I think the federal government needs to set up proper training for set up and usage of these devices, and make it illegal to operate if you have not been trained.”
“In the wrong hands, this can and will only incite panic.”
Virtrux believes he could have used his access to the system to send out messages to millions of people. “Theoretically I can send anything from a volcano warning to the entire U.S. to an AMBER alert. If I really wanted, I can send out custom messages too,” he says. “As for Canada, I’m sure the same is possible: custom messages to country-wide levels of emergency.”
That could have huge implications. “In the wrong hands, this can and will only incite panic,” he says. “I wouldn’t go as far as to say the wrong message sent out can theoretically start a war but I don’t think it’s all that impossible.”
The hacktivist has not reported the breach to the U.S. or Canadian governments, though Input approached both for comment before publication of this story. He justified not alerting both governments by saying they wouldn’t act as quickly as they would if alerted by the media. “With my previous experience on state and federal infrastructure, nothing usually gets done,” he says. “You have to jump through a million hoops for someone to take you seriously, or it takes months and months for the government to contact manufacturers, force the manufacturers to issue a warning to change all passwords immediately, and actually somehow get the owners of these machines to change the passwords.”