• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
at&t phone unlocking malware ring costs carrier $200m

AT&T Phone-Unlocking Malware Ring Costs Carrier $200M

You are here: Home / Latest Cyber Security Vulnerabilities / AT&T Phone-Unlocking Malware Ring Costs Carrier $200M
September 17, 2021

With the assist of destructive insiders, a fraudster was equipped to set up malware and remotely divorce iPhones and other handsets from the carrier’s U.S. network — all the way from Pakistan.

The ringleader of a 7-year phone-unlocking and malware plan will head to the clink for 12 many years, according to the Office of Justice, after effectively compromising AT&T’s inside networks to install credential-thieving malware.

The perp, just one Muhammad Fahd of Pakistan and Grenada, was convicted of grooming AT&T personnel at a Bothell, Wash. contact centre to get component in the scam. He and his now-deceased co-conspirator bribed staff to very first use their AT&T credentials to sever telephones from the AT&T network for shoppers who have been even now less than contract — which means all those consumers could take their newly impartial phones to one more service. And then later on, Fahd requested his accomplices in the call heart to put in personalized malware and “hacking resources that permitted him to unlock telephones remotely from Pakistan,” in accordance to courtroom paperwork.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


In all, the 35-year-outdated Fahd properly defrauded AT&T out of a lot more than $200 million in misplaced subscription charges immediately after divorcing almost 2 million cell phones from the carrier, the DoJ discussed.

“Unlocking a phone properly removes it from AT&T’s network, thereby allowing the account holder to avoid getting to pay AT&T for service or to make any payments for invest in of the phone,” it mentioned.

Recruiting Insider Threats

It all began in the summer time of 2012, when Fahd qualified an AT&T worker by means of Facebook employing the alias “Frank Zhang,” He supplied the employee “significant sums of money” in return for taking aspect in his scheme, and asked the particular person to recruit other AT&T staff to the ring as effectively.

He also gave directions on how to launder the bribery revenue: “Fahd instructed the recruited workforce to established up phony businesses and financial institution accounts for these organizations, to receive payments and to create fictitious invoices for every deposit produced into the bogus businesses’ financial institution accounts to produce the overall look that the cash was payment for real solutions,” according to the DoJ.

About a year later on, in the spring of 2013, items bought a little more durable for Fahd & Co. immediately after AT&T carried out a new unlocking method. Undeterred, Fahd employed a software developer to design and style malware that would let him to “unlock telephones more competently and in bigger numbers.” The malware was set up in stealth on AT&T’s possess networks, thanks again to the destructive insiders he experienced recruited.

“At Fahd’s ask for, the staff members provided private facts to Fahd about AT&T’s laptop process and unlocking treatments to aid in this course of action,” in accordance to the sentencing files. “Fahd also had the workers set up malware on AT&T’s pcs that captured info about AT&T’s computer procedure and the network obtain credentials of other AT&T workforce. Fahd furnished the information to his malware developer, so the developer could tailor the malware to work on AT&T’s personal computers.”

Of training course, this sort of entry could have been employed for distinctive kinds of cyberattacks, these as ransomware or wide-scale espionage endeavours, but Fahd’s only objective seemed to be the cell phone heist. AT&T’s forensic investigation confirmed that in all, 1.9 million telephones had been unlocked, costing AT&T $200 million in potential cellular telephone subscriptions. Appropriately, Fahd was purchased to pay that back again as restitution, alongside with his prison sentence.

A 2015 lawsuit by AT&T towards the implicated contact-heart employees elaborated a little bit on the gambit. The “customer-facing” component was operate by means of a shady, now-defunct corporation referred to as Swift Unlocks, which marketed phone-unlocking expert services for individuals. When anyone requested an unlock, Swift Unlocks would oblige, getting the unlock codes using the malware-enabled remote access to AT&T’s methods.

AT&T personnel had been paid out $2,000 just about every two weeks for facilitating the energy, according to the lawsuit, with two of the prime individuals “earning” $10,500 and $20,000 respectively. AT&T identified the malware all over October 2013, firing the staff involved. Finally, the whole operation was traced back to Fahd and

At the sentencing hearing U.S. District Judge Robert S. Lasnik for the Western District of Washington pointed out that Fahd had fully commited a “terrible cybercrime about an extended time period.”

Fahd was indicted in 2017 and arrested in Hong Kong in 2018. He was extradited and appeared in U.S. District Court in Seattle in August 2019. He pleaded responsible to conspiracy to dedicate wire fraud very last September.

Connect with-heart and in-shop employees continue to present a conduit for fraud – irrespective of whether knowingly, as in this scenario, or unknowingly, as viewed in some SIM-jacking efforts. AT&T has had its share of problems, together with experiencing a $224 million lawful obstacle right after shop staff members were caught in a SIM-swapping ring.

Rule #1 of Linux Security: No cybersecurity option is feasible if you never have the principles down. JOIN Threatpost and Linux security pros at Uptycs for a Dwell roundtable on the 4 Golden Regulations of Linux Security. Your top rated takeaway will be a Linux roadmap to finding the essentials proper! REGISTER NOW and sign up for the LIVE celebration on Sept. 29 at Midday EST. Joining Threatpost is Uptycs’ Ben Montour and Rishi Kant who will spell out Linux security very best techniques and choose your most urgent questions in true time.

 


Some sections of this report are sourced from:
threatpost.com

Previous Post: «owner of ddos for hire sites found guilty of hacking Owner of DDoS for hire sites found guilty of hacking offences
Next Post: Ditch the Alert Cannon: Modernizing IDS is a Security Must-Do ditch the alert cannon: modernizing ids is a security must do»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.