Sunday, July 21, 2024

Paid Insiders Upload a Malware in AT&T Network and Unlocks Over 2 Million AT&T Phones

A recruiter from AT&T charged in a 14-count, U.S to have a paid insiders to planting malware on telecommunications giant AT&T Network for committing unauthorized access and computer networks to unlock cellphones.

Muhammad Fahd, 34, was arrested in Hong Kong on Feb. 4, 2018, and extradited to the United States for the indictment that alleges how Fahd recruited several paid insiders and granted permission to use computer credentials.

These sensitive credentials granted access to disable AT&T’s proprietary locking software that prevents ineligible phones from being removed from AT&T’s network.

This software feature was misused by insiders and resulted in millions of phones being removed from AT&T service and payment plans that lead to company loss million of dollars.

Paid Insiders were worked in AT&T’s Bothell Customer Service Center to Plant Malware, and Illegally unlock Cell Phones by planting malware.

According to DOJ, Muhammad Fahd is charged with conspiracy to commit wire fraud, conspiracy to violate the Travel Act and the Computer Fraud and Abuse Act, four counts of wire fraud, two counts of accessing a protected computer in furtherance of fraud, two counts of intentional damage to a protected computer, and four counts of violating the Travel Act.

Muhammad and his co-conspirators spend more than $1 million in bribes over five years to install malware and spying devices.

A Phone that purchased by customer under interest-free installment plan from AT&T needs to agree to enter a service contract which prevents users to use only AT&T wireless network.

AT&T used proprietary software that prevents users to access any other networks other than AT&T networks, in case, the phone will be “unlocked” the customers will be allowed to use any network rather than AT&T.

If the phone is fraudulently unlocked without AT&T authorization, customers switched to other services and allowing them from being easily sold.

Fahd and those who worked with him are accused of recruiting AT&T employees to help unlock phones from the inside, paying one worker as much as $428,500 over five years.

Department of Justice indictment unsealed, Fahd allegedly would send the employees batches of international mobile equipment identity (IMEI) numbers for cell phones that were not eligible to be removed from AT&T’s network. The employees would then unlock the phones. 

Even if some of the paid insiders will be terminated, other insiders will aid Fahd in develop and installing additional tools to unlock the phone that he suggests from a remote location.

The bribes deliver to the insiders both in person and via payment systems such as Western Union. The charges contained in the indictment are only allegations. A person is presumed innocent until proven guilty beyond a reasonable doubt in a court of law. DOJ said.

Sponsored:  – Manage all the Endpoint networks from a single Console.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Also Read:

An In-Depth Look of IMSI Catcher – A Device for Law Enforcement Agencies to Track Cell Phones

Hoverwatch – The Simple Yet Potent Application to Track a Cell Phone


Latest articles

Hackers Claiming Dettol Data Breach: 453,646 users Impacted

A significant data breach has been reported by a threat actor known as 'Hana,'...

CrowdStrike Update Triggers Widespread Windows BSOD Crashes

A recent update from cybersecurity firm CrowdStrike has caused significant disruptions for Windows users,...

Operation Spincaster Disrupts Approval Phishing Technique that Drains Victim’s Wallets

Chainalysis has launched Operation Spincaster, an initiative to disrupt approval phishing scams that have...

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal

Threat actors often attack VMware ESXi servers since they accommodate many virtual machines, which...

TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs

Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and...

macOS Users Beware Of Weaponized Meeting App From North Korean Hackers

Meeting apps are often targeted and turned into weapons by hackers as they are...

Hackers Exploiting Legitimate RMM Tools With BugSleep Malware

Since October 2023, MuddyWater, which is an Iranian threat group linked to MOIS, has...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles