{"id":9195,"date":"2020-07-04T06:25:47","date_gmt":"2020-07-04T03:25:47","guid":{"rendered":"https:\/\/forklog.media\/?p=9195"},"modified":"2020-07-06T10:39:40","modified_gmt":"2020-07-06T07:39:40","slug":"att-faces-lawsuit-over-alleged-sim-swapping-leading-to-massive-cryptocurrency-theft","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/att-faces-lawsuit-over-alleged-sim-swapping-leading-to-massive-cryptocurrency-theft\/","title":{"rendered":"AT&#038;T Faces Lawsuit Over Alleged SIM Swapping Leading to Massive Cryptocurrency Theft\u00a0"},"content":{"rendered":"<p>AT&amp;T has been involved in a lawsuit alleging that its employees facilitated the hijacking of a client\u2019s SIM card, which then allowed attackers to steal crypto the client\u2019s cryptocurrency. The telecom giant is yet to defend in court over another similar lawsuit going back to 2018.<\/p>\n<p><!--more--><\/p>\n<p>According to the <a href=\"https:\/\/www.courtlistener.com\/recap\/gov.uscourts.cacd.761970\/gov.uscourts.cacd.761970.1.0_1.pdf\">complaint<\/a> filed by a California-based business and technology advisor Seth Shapiro, at least $1.8 million worth of crypto stored in his wallet was stolen in an attack that involved active help from AT&amp;T employees.<\/p>\n<h2>What Happened<\/h2>\n<blockquote><p><b><i>\u201cOn at least four occasions between May 16, 2018, and May 18, 2019, AT&amp;T employees obtained unauthorized access to Mr. Shapiro\u2019s AT&amp;T wireless account, viewed his confidential and proprietary personal information, and transferred control over Mr. Shapiro\u2019s AT&amp;T wireless number from Mr. Shapiro\u2019s phone to a phone controlled by third-party hackers in exchange for money,\u201d <\/i><\/b><i>the complaint claims.<\/i><b><i> \u201cThe hackers then utilized their control over Mr. Shapiro\u2019s AT&amp;T wireless number\u2014including control secured through cooperation with AT&amp;T employees\u2014to access his personal and digital finance accounts and steal more than $1.8 million from Mr. Shapiro.\u201d\u00a0<\/i><\/b><\/p><\/blockquote>\n<p>On May 16, 2018, Seth Shapiro was at the conference in New York. He noticed that his phone had no connection to the AT&amp;T network. Suspecting a security breach, Shapiro contacted the company to address the problem and told the customer service agent that he holds \u201clarge amounts of digital currency\u201d that may be at risk. After waiting on hold, Mr. Shapiro was told to turn off his phone and visit an AT&amp;T shop to get help. At the shop, he was advised to get a new phone with a new SIM, which he immediately did. The service has been restored and AT&amp;T reportedly told Shapiro that they have noted malicious activity and assured that such a thing won\u2019t happen again.<\/p>\n<p>Yet, it happened again before Seth Shapiro had left the AT&amp;T shop. This time, he had to wait for about 45 minutes to get help as the employees were busy with other clients.<\/p>\n<blockquote><p><b><i>\u201cIn that time, third-party individuals were able to use their control over Mr. Shapiro\u2019s AT&amp;T cell phone number to access Mr. Shapiro\u2019s personal and financial accounts and rob him of approximately $1.8 million, all while Mr. Shapiro stood helplessly in the AT&amp;T store asking for the company\u2019s help,\u201d <\/i><\/b><i>the complaint reads.<\/i><\/p><\/blockquote>\n<p>Aside from the stolen coins, hackers gained access to Shapiro\u2019s accounts on crypto-exchanges<\/p>\n<blockquote><p><b><i>\u201cBy utilizing their control over Mr. Shapiro\u2019s AT&amp;T cell phone number\u2014and the control of additional accounts (such as his email) secured through that number by utilizing two-factor authentication\u2014these third-party hackers were able to access Mr. Shapiro\u2019s accounts on various cryptocurrency exchange platforms, including the accounts he controlled on behalf of his business venture. The hackers then transferred Mr. Shapiro\u2019s currency from Mr. Shapiro\u2019s accounts into accounts that they controlled. In all, they stole more than $1.8 million from Mr. Shapiro in the two consecutive SIM swap attacks on May 16, 2018.\u201d<\/i><\/b><\/p><\/blockquote>\n<h2>SIM Swap Attack<\/h2>\n<p>The attack in question is referred to as a <i>SIM swap<\/i>. Normally, cellphone companies can reassign a client\u2019s phone number and whatever comes with it to a different SIM card, which is useful if a person lost their phone and needs to restore their number with a new device and SIM.<\/p>\n<p>An attacker who has some personal information about a victim may be able to trick the company into cutting the actual SIM card off the network and connecting the attacker\u2019s phone instead. By doing so, they hijack all communications for this particular number, including text messages received as part of a two-factor authentication procedure.<\/p>\n<p>To pull off a SIM swap attack, a bad actor would need to either collect sufficient personal data of the victim to effectively mimic them when contacting the mobile carrier\u2019s support. Another way is to have associates within the company who would agree to make the illegitimate swap. The complaint claims that AT&amp;T employees have been involved:<\/p>\n<blockquote><p><b><i>\u201cCriminal investigations into the May 2018 breaches to Mr. Shapiro\u2019s AT&amp;T account and the resulting theft revealed that at least two AT&amp;T employees, acting in the scope of their employment, accessed and permitted others to access Mr. Shapiro\u2019s AT&amp;T account and the confidential information contained therein.\u201d<\/i><\/b><\/p><\/blockquote>\n<p>AT&amp;T confirmed the involvement of its employees in two SIM swaps in Shapiro\u2019s case. Yet, the complaint further alleges that the two employees have facilitated 41 unauthorized swaps in total just in May 2018.<\/p>\n<h2>Aftermath<\/h2>\n<p>On November 1, 2018, Seth Shapiro\u2019s AT&amp;T SIM has been swapped again and his Google accounts with sensitive information compromised. Several more SIM swap attacks followed through 2018 and 2019, reportedly causing substantial financial and psychological harm to the Shapiro family.<\/p>\n<p>On February 10, 2019, Mr. Shapiro received an anonymous threat text via the same AT&amp;T wireless account. The sender demanded $800 in exchange for non-disclosure of Shapiro\u2019s personal information and noted that they still have an AT&amp;T representative \u201cready to hand over\u201d the account.<\/p>\n<p>As a result of this series of attacks, apart from \u201clife savings\u201d of $1.8 million in cryptocurrency, Shapiro lost access to a number of his accounts with crypto-exchanges and services like PayPal and Google. The complaint also notes that he had to end his venture and lay off his employees because some of the stolen funds were raised for the business.<\/p>\n<p>Notably, AT&amp;T <a href=\"https:\/\/www.theregister.com\/2018\/08\/15\/att_sued_cryptocurrency\/\">faced<\/a> a similar SIM swap lawsuit regarding the attacks on a Bitcoin investor Michael Terpin. The investor sued the company for $240 million over the $24 he allegedly lost because of AT&amp;T\u2019s failure to follow \u201cits own agreed security protocol.\u201d The company denied all allegations and tried to dismiss the case, albeit <a href=\"https:\/\/www.theregister.com\/2020\/02\/26\/crypto_theft_att_judge\/\">unsuccessfully<\/a>.<\/p>\n<p><b>Follow us on <\/b><a href=\"https:\/\/twitter.com\/forklogmedia\"><b>Twitter<\/b><\/a><b> and <\/b><a href=\"https:\/\/www.facebook.com\/forklogmedia\"><b>Facebook<\/b><\/a><b> and join our <\/b><a href=\"https:\/\/t.me\/forklogmedia\"><b>Telegram channel<\/b><\/a><b> to know what\u2019s up with crypto and why it\u2019s important.<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>AT&amp;T has been involved in a lawsuit alleging that its employees facilitated the hijacking of a client\u2019s SIM card, which then allowed attackers to steal crypto the client\u2019s cryptocurrency. The telecom giant is yet to defend in court over another similar lawsuit going back to 2018.<\/p>\n","protected":false},"author":6,"featured_media":9197,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"human_written","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[43,549,773],"class_list":["post-9195","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-hackers","tag-scam","tag-smartphones"],"aioseo_notices":[],"amp_enabled":true,"views":"748","promo_type":"1","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/9195","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=9195"}],"version-history":[{"count":2,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/9195\/revisions"}],"predecessor-version":[{"id":9199,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/9195\/revisions\/9199"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/9197"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=9195"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=9195"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=9195"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}