How I compromised 1500 accounts/month with no technical skill

Molx32
7 min readJun 26, 2024

--

Feel free to check my personnal blog where I post those articles. Check the free version of this post here. Have a nice reading .

A little bit of context

For the past few months, I investigated what I call Public SMS Service (PSS), which are simple websites proposing virtual phone numbers for free, to receive SMSs e.g. SMS To Me. This is used by many people for testing purposes and privacy. But SMS received on these phone numbers can be read by anyone, and that’s what I did.

If you take a look at SMS To Me or similar websites, you probably won’t see any sensitive information. So why would I spend months investigating those messages? Because I once saw something like this.

Hi redacted@gmail.com, your new access code is 458953. You can now connect on https://REDACTED.com.

Free credentials!

I quickly configured an anonymization pipeline and accessed the account. The website was a cryptocurrency application that allowed users to access their different wallets. I had access to personal information and to a significative amount of 65 Bitcoins. I had three hypothesis in mind:

  1. This is a human mistake — The person owning the account used a Public SMS Service (PSS) ignoring what the consequences could be.
  2. This is a development environment — In this case, the account is not a real one, or at least this is a test account, with mocking data.
  3. This is some kind of aggressive honeypot — Since the message is received on a PSS, and that it leaks the three key information needed to access the account (website, username and password), it seemed too obvious not to be a honeypot.

In the end, the domain was created three months ago, and all features were not implemented yet, so it probably was a development environment.

The security risks

Sometimes, people use this kind of public phone numbers to register on web applications, to avoid sharing their real phone number. This is a mistake! As a end users, we don’t know what SMS the application could send to the PSS :

  • A SMS with a password reset URL
  • A SMS with a URL leaking various informations e.g. an order summary.
  • A SMS with a URL to access the user account, directly authenticated.

Anyways, that triggered my attention, so I developped a Python Flask web app to help me parse and analyze SMSs I could find on https://receive-smss.com/ (I chose this website because it was easy to automate).

SMS Explorer ✉️👀

I’ll probably publish the app and post about it to explain what is does, but real quick :

  • It collects all SMSs and extract URLs (and domains)
  • It analyzes domains and tag them as interesting
  • It automates data collection by navigating to URLs

Here is a simplified DB scheme.

# SMS
id | content | url | has_data
1 | Hello, [...] | https://domain1.net/some/path | True
2 | Hello, [...] | https://domain2.net/some/path | True
3 | Hello, [...] | https://domain3.net/some/path | False
4 | Some ad | - | False


# TARGETS
id | domain | is_interesting | is_automated
1 | domain1.net | True | True
2 | domain2.net | True | True
3 | domain3.net | True | False


# DATA
id | url | data
1 | https://domain1.net/some/path | {"some":"json"}
2 | https://domain2.net/some/path | {"some":"json"}

After adding some metadata and waiting a few week, the interface looks like this.

Before getting to the data leak, here are some statistics.

  • 4% of SMSs contain URL, the 96% remaining are mainly garbage.
  • The SMS rate is approximately 2200 SMS/hour
  • Most SMSs are received on UK phone numbers. Actually, if we divide this count by the number of phone numbers available by country, Indian phone numbers are the most active ones.
  • More than 50% of SMSs that contain a URL are scams or ads.

I collected millions of SMSs at different states of the development, and it requires a tremendous amount of time to analyze all the different targets, so I can’t tell how much URLs lead to data leaks or account takeovers.

The airline hack

Before we start :

  • ⚠️I started collecting SMS approximately 6 months ago. I estimated the total leaked users to 1500 users per month which gives at least total of 9000 records leaked.
  • ⚠️ Since this is still confidential, let’s name the company AirLine.

I was excited to work of my final version on SMS Explorer, and I wanted to work on a case I observed a few days ago : the AirLine case. By using a quick search, I retrieved a list a hundreds of SMSs looking like this.

Thank you for flying with us. Please, rate your experience : https://sub.airline.tld/rEDaCt3d — AirLine

SMS Explorer — Search feature

When navigating to the URL, we are redirected to a survey, hosted at https://airline.qualtrics.com. For your information, Qualtrics is a SaaS solution to create various things, including surveys. The URL looks like this :

https://airline.qualtrics.com/jfe/form/Un1Qu3_1D3nt1f13R?param1=a&par[…]

Here is a table summarizing all URL parameters.

Qualtrics parameters

As you can see, there is all the reservation-related information, which I double checked with web apps like https://flightstats.com/. Beyond personal information which represent itself a data leak, there are two fields that can be exploited : PNR (Passenger Name Record) and PLN (Passenger Last Name), which if you didn’t guess are credentials to login into AirLine web application (like many airlines, if not all)!

Credentials!

Here is the information we can retrieve.

List of flights for a given PNR
PNR detailed information

You can see on the pictures that some fields are obsfuscated with stars *, but they are actually in clear text in the session storage. The only thing that can’t be retrieved is the payment card information.

Session storage data

Impact

So an attacker can connect to manage their flights, even if the flight already occured. What can be achieved once connected?

  • Access more data, such as birth date and future/past flights.
  • Take over the account by editing contact and password resetting.
  • Contact the AirLine support to make a change on the flight (first name, last name, and so on). This would allow an attacker to pay only for a change rather than a flight (still it may be very expansive).
  • Add extra services, and cause a price increase for the end customer (the real user may need to re-validate payment, so not sure for this).

A funny thing is that the survey is meant to get a feedback about reservation, check-in, in-flight meal, arrival and exit, but it seems to be sent immediately after tickets are bought i.e. before the flight date.

Fixing the issue

In order for me to understand how the survey works I created a test survey available here that reads a URL parameter Name and display its value in the first question. Example with a survey for Molx, or for Bender.

This way of doing things is actually approved by Qualtrics, but the issue is that too many parameters are passed here. The PNR only would be enough for AirLine to match its travelers database, and to prevent accounts to be compromised.

Responsible disclosure

I contacted a national CERT which quickly acknowledged, and the issue took a few months to be fixed : now I don’t see any SMS asking for feedbacks, but I guess new SMS will be sent, in a safe way let’s hope.

Final thought

Although it is a user mistake to use public phone numbers to register on web applications, it is possible to filter such phone numbers when registering travelers. On the other hand, using such phone number (when data is not leaked) is a good way of improving end user privacy.

This first post is some kind of introduction for my SMS Explorer web app which should be release this year. Until then, I will probably post about how I compromised other targets again with no technical skill!

Thanks for reading.

--

--

Molx32
Molx32

Written by Molx32

I am a cybersecurity engineer, mainly working on Microsoft solutions.