U.S. markets close in 4 hours 26 minutes
  • S&P 500

    4,308.95
    -36.77 (-0.85%)
     
  • Dow 30

    33,960.80
    -353.87 (-1.03%)
     
  • Nasdaq

    14,354.86
    -78.97 (-0.55%)
     
  • Russell 2000

    2,195.01
    -33.35 (-1.50%)
     
  • Crude Oil

    77.41
    -1.52 (-1.93%)
     
  • Gold

    1,757.40
    -3.50 (-0.20%)
     
  • Silver

    22.39
    -0.22 (-0.96%)
     
  • EUR/USD

    1.1537
    -0.0064 (-0.55%)
     
  • 10-Yr Bond

    1.5190
    -0.0100 (-0.65%)
     
  • GBP/USD

    1.3557
    -0.0069 (-0.51%)
     
  • USD/JPY

    111.3540
    -0.1180 (-0.11%)
     
  • BTC-USD

    54,613.27
    +4,622.06 (+9.25%)
     
  • CMC Crypto 200

    1,323.92
    +60.82 (+4.82%)
     
  • FTSE 100

    7,003.22
    -73.88 (-1.04%)
     
  • Nikkei 225

    27,528.87
    -293.25 (-1.05%)
     

Major SMS routing company says it was the victim of a five-year hack

·Weekend Editor
·1 min read

A cornerstone of text messaging has been vulnerable for half a decade. Ars Technica reports that Syniverse, which routes billions of SMS chats for hundreds of carriers in the US and abroad, has used an SEC filing to disclose a hack that lasted for five years.

The company discovered in May 2021 that someone had "unauthorized access" to its operational and IT systems since May 2016, and during that time had "several" opportunities to access network databases. The intruders compromised logins for Syniverse's Electronic Data Transfer environment for about 235 carriers, according to the company.

The routing firm wouldn't say if the attackers obtained messages or otherwise violated users' privacy. In a statement to Ars, Syniverse generally kept to what it revealed in the SEC filing. The company said it hadn't found evidence of an "intent to disrupt" operations, and there was "no attempt to monetize" activity. The company couldn't rule out future discoveries, however, and a Motherboard source said the EDT space included call record information. The intruders could have obtained text message content, the source added.

We've asked AT&T, T-Mobile and Verizon (Engadget's former parent company) if the attackers could have compromised texts passing through their networks. Syniverse said it fixed the security flaws and notified all customers when legally required, but that "no additional action" was necessary at this stage.

While that response suggests the practical damage might be limited, there's still cause for concern here — the attackers might have had access to massive volumes of sensitive messages while an important custodian was unaware. If nothing else, this is a reminder that mobile security depends as much on partner companies as it does carriers and phone makers.