Bug allowed free access to Sirius radio service
It could be a sign of the start of satellite radio piracy
IDG News Service - Sirius XM Radio has quietly fixed a bug in its satellite radio system that since 2002 had provided a way for former subscribers to gain free access to the Sirius service, according to security vendor TippingPoint Technologies.
TippingPoint found out about the issue when it was reported to the company's Zero Day Initiative, which pays hackers for technical details on security bugs, said Terri Forslof, TippingPoint's manager of security response. The company relayed its information on the issue to Sirius on July 10, she added.
The situation shines a light on what could become a new problem for the radio network after the July merger of Sirius and XM Satellite Radio: satellite piracy. Industry watchers say that with a combined audience of more than 18.5 million Sirius XM subscribers, pirates may now have the incentive they need to create illegal devices that can receive Sirius XM signals.
The July 10 problem, which Sirius has apparently now resolved, according to TippingPoint, involved the deactivation process used to cancel subscriptions. "It's really an oversight on Sirius' side," Forslof said. "It's just kind of sloppy, and in the end it really hurts their bottom line."
For example, the flaw could have been exploited to build black-market satellite radio receivers that would never be deactivated, Forslof said. Although TippingPoint doesn't know how many people may have been aware of the issue, the person who reported the bug to TippingPoint said that "multiple people were doing this," according to Forslof.
TippingPoint, a division of 3Com Corp., described the severity of the issue as "medium" on its Web site, but the flaw doesn't affect the security of Sirius users, Forslof said. Also, it doesn't affect devices designed to use XM Satellite Radio.
Sirius XM had little to say about TippingPoint's findings. "Sirius XM does not comment on security issues though we do invest in our technologies to insure our service is protected for our subscribers," the company said in an e-mailed statement. "We are confident in the effectiveness of our technology."
It isn't clear exactly when Sirius fixed the bug or for how long it was possible to exploit it. Sirius first began offering service under that name in 2002, and the bug apparently existed then, according to TippingPoint.
A search of online forums turned up anecdotal evidence that some Sirius subscribers may have been able to evade the company's deactivation signals, as well as at least one reference to a cracked Sirius Sportster radio, selling for $400.
Whether that $400 Sportster works is doubtful, said Jim Shelton, an independent consultant who finds and tests illegal satellite equipment. He said he hasn't seen Sirius or XM devices for sale recently from the sources he uses for his investigations. "If there was something legitimate out there, I would have come across it by now," he said.
- Deep Security +VMware vSphere with Operations Management Most midsize organizations are highly virtualized on VMware, and while this has produced significant savings, it also has created new challenges when it...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- DDoS Infographic: How Are Attacks Evolving? For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger?...
- How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks Threat sharing networks have been around for a long time, however they have typically been "invitation-only", available to only large companies, or those...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Malware and Vulnerabilities White Papers | Webcasts