FYI

Identity thieves hijack cellphone accounts to go after virtual currency

Originally published August 21, 2017 at 6:15 pm Updated August 21, 2017 at 10:56 pm

Joby Weeks, a Bitcoin entrepreneur who lost his phone number and about a million dollars’ worth of virtual currency last year, in Arvada, Colo., on Aug. 8, 2017. So-called phone porting attacks are exposing a vulnerability that could be exploited against anybody with valuable emails or other digital files. “Everybody I know in the cryptocurrency space has gotten their phone number stolen,” Weeks said. (MATTHEW STAVER/NYT)

Hackers have been calling up wireless carriers and asking them to transfer control of a victim’s phone number to a device under the control of the hackers. They can then reset the passwords on every account that uses the phone number as a security backup.

By

Nathaniel Popper

The New York Times

Hackers have discovered that one of the most central elements of online security — the mobile phone number — is also one of the easiest to steal.

In a growing number of online attacks, hackers have been calling up Verizon, T-Mobile US, Sprint and AT&T and asking them to transfer control of a victim’s phone number to a device under the control of the hackers.

Once they get control of the phone number, they can reset the passwords on every account that uses the phone number as a security backup — as services like Google, Twitter and Facebook suggest.

“My iPad restarted, my phone restarted and my computer restarted, and that’s when I got the cold sweat and was like, ‘OK, this is really serious,’” said Chris Burniske, a virtual-currency investor who lost control of his phone number late last year.

A wide array of people have complained about being successfully targeted by this sort of attack, including a Black Lives Matters activist and the chief technologist of the Federal Trade Commission. The commission’s own data shows that the number of phone hijackings has been rising. In January 2013, there were 1,038 such incidents reported; by January 2016, that number had increased to 2,658.

But a particularly concentrated wave of attacks has hit those with the most obviously valuable online accounts: virtual-currency fanatics like Burniske.

Within minutes of getting control of Burniske’s phone, his attackers had changed the password on his virtual-currency wallet and drained the contents — some $150,000 at today’s values.

Most victims of these attacks in the virtual-currency community have not wanted to acknowledge it publicly for fear of provoking their adversaries. But in interviews, dozens of prominent people in the industry acknowledged that they had been victimized in recent months.

“Everybody I know in the cryptocurrency space has gotten their phone number stolen,” said Joby Weeks, a bitcoin entrepreneur.

Weeks lost his phone number and about $1 million worth of virtual currency late last year, despite having asked his mobile phone provider for additional security after his wife and parents lost control of their phone numbers.

The attackers appear to be focusing on anyone who talks on social media about owning virtual currencies or anyone who is known to invest in virtual currency companies, such as venture capitalists. And virtual currency transactions are designed to be irreversible.

Accounts with banks and brokerage firms and the like are not as vulnerable to these attacks because these institutions can usually reverse unintended or malicious transactions if they are caught within a few days.

But the attacks are exposing a vulnerability that could be exploited against almost anyone with valuable emails or other digital files — including politicians, activists and journalists.

Last year, hackers took over the Twitter account of DeRay Mckesson, a leader of the Black Lives Matters movement, by first getting his phone number.

In a number of cases involving digital-money aficionados, the attackers have held email files for ransom — threatening to release naked pictures in one case, and details of a victim’s sexual fetishes in another.

The vulnerability of even sophisticated programmers and security experts to these attacks sets an unsettling precedent for when the assailants go after less technologically savvy victims. Security experts worry that these types of attacks will become more widespread if mobile-phone operators do not make significant changes to their security procedures.

“It’s really highlighting the insecurity of using any kind of telephone-based security,” said Michael Perklin, chief information security officer at the virtual currency exchange ShapeShift, which has seen many of its employees and customers attacked.

Mobile-phone carriers have said they are taking steps to head off the attacks by making it possible to add more complex personal identification numbers, or PINs, to accounts, among other steps.

But these measures have not been enough to stop the spread and success of the culprits.

After a first wave of phone-porting attacks on the virtual-currency community last winter, which was reported by Forbes, their frequency appears to have ticked up, Perklin and other security experts said.

In several recent cases, the hackers have commandeered phone numbers even when the victims knew they were under attack and alerted their cellphone provider.

Adam Pokornicky, a managing partner at Cryptochain Capital, asked Verizon to put extra security measures on his account after he learned that an attacker had called in 13 times trying to move his number to a new phone.

But just a day later, he said, the attacker persuaded a different Verizon agent to change Pokornicky’s number without requiring the new PIN.

A spokesman for Verizon, Richard Young, said that the company could not comment on specific cases, but that phone porting was not common.

“While we work diligently to ensure customer accounts remain secure, on occasion there are instances where automated processes or human performance falls short,” he said. “We strive to correct these issues quickly and look for additional ways to improve security.”

Perklin and other people who have investigated recent hacks said the assailants generally succeeded by delivering sob stories about an emergency that required the phone number to be moved to a new device — and by trying multiple times until a gullible agent was found.

“These guys will sit and call 600 times before they get through and get an agent on the line that’s an idiot,” Weeks said.

 

 

 

Speaking Fees Meet Politics for Clintons. Former president spoke to groups with issues before State Department

$153 million in Bill and Hillary Clinton speaking fees, documented

Uber and Its Executives Are Fined in France

Google Appeals French Privacy Ruling

NationStar Mortgage Settles Class Action Lawsuit for Robo Dialing

Did the FED participate in Currencies Wars during the Great Recession?

Oracle and LifeLock Settle Deception Charges by the FTC for $100 million

Towers of Secrecy: Piercing the Shell Companies behind Beverly Hills GiGa Manions

The Department of Homeland Security (DHS) has been giving private U.S. companies Free Penetration Tests

The (over) Sharing Act

A Boom in Private Equity’s Secondary Market

White House Proposes Broad Consumer Data Privacy Bill

 

 

 

 

 
 

Copyright &Trademark 2004-2017 Registration Number: 3257358, 3347108