Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
AT&T Communications Privacy Security United States

AT&T Employees Took Bribes To Plant Malware on the Company's Network (zdnet.com) 74

AT&T employees took bribes to unlock millions of smartphones, and to install malware and unauthorized hardware on the company's network, the Department of Justice said yesterday. From a report: These details come from a DOJ case opened against Muhammad Fahd, a 34-year-old man from Pakistan, and his co-conspirator, Ghulam Jiwani, believed to be deceased. The DOJ charged the two with paying more than $1 million in bribes to several AT&T employees at the company's Mobility Customer Care call center in Bothell, Washington. The bribery scheme lasted from at least April 2012 until September 2017. Initially, the two Pakistani men bribed AT&T employees to unlock expensive iPhones so they could be used outside AT&T's network. The two recruited AT&T employees by approaching them in private via telephone or Facebook messages. Employees who agreed, received lists of IMEI phone codes which they had to unlock for sums of money. Employees would then receive bribes in their bank accounts, in shell companies they created, or as cash, from the two Pakistani men.
This discussion has been archived. No new comments can be posted.

AT&T Employees Took Bribes To Plant Malware on the Company's Network

Comments Filter:
  • Why one earth would someone accept anything other than cash for this? Direct deposit? Dummy corporation? All traceable by people with a lot more skill than the average customer service representative.

    • by gweihir ( 88907 ) on Tuesday August 06, 2019 @11:47AM (#59050808)

      Why one earth would someone accept anything other than cash for this?

      Well, small time criminals that get caught are not very smart. Countless ones have been caught because they left a paper trail of because they suddenly spend much more money than they should have. The only good way to do this is cash-only, no records, and spend the money slowly and carefully in ways hard to trace to you.

      But remember there is a confirmation bias here: These _were_ caught. I would not be surprised if there was much more of this kind of corruption, just perpetrated in a smarter way.

  • Comment removed based on user account deletion
    • by Anonymous Coward

      Will they be charged as well? What are their names and nationality?

      My guess is that they were immigrants as well, because they do work that Americans won't do.

    • Will they be charged as well? What are their names and nationality?

      I don't have names or nationalities, but I did get a long list of them. Each one was identified as "damn kid".

  • by gweihir ( 88907 ) on Tuesday August 06, 2019 @11:43AM (#59050782)

    The only thing that can protect you here is loyal employees. Treat your employees badly and some will be willing to do something like this and the others will not care enough to notice. There is no technological measure and no other way to really protect you against this threat.

    • by bws111 ( 1216812 ) on Tuesday August 06, 2019 @11:50AM (#59050822)

      Yeah, it was 'being treated badly' and not $1M that made the employees do it. Yeah.

      • Yeah, it was 'being treated badly' and not $1M that made the employees do it. Yeah.

        "Torture", it's called. Well, "emotional torture waiting for the money", but the T word is in it!

    • by Anonymous Coward

      No, detecting malware that is under remote control and detecting rogue access points on your internal network is IT security 101. There's no need to blame it on HR or employee feels. This was a massive failure by AT&T's network security group.

      • by gweihir ( 88907 )

        You have no idea how hard it is to separate legitimate traffic from non-legitimate traffic in a large corporate network.

  • Meh (Score:4, Funny)

    by DarkRookie2 ( 5551422 ) on Tuesday August 06, 2019 @11:48AM (#59050814)

    AT&T estimated it lost revenue of more than $5 million/year from Fahd's phone unlocking scheme.

    Their revenue is $170.756 billion. Boo-hoo.

    • AT&T estimated it lost revenue of more than $5 million/year from Fahd's phone unlocking scheme.

      Their revenue is $170.756 billion. Boo-hoo.

      That's .003%! That's HUUUUUGE!

  • Two Points (Score:3, Informative)

    by Anonymous Coward on Tuesday August 06, 2019 @11:49AM (#59050820)

    One, the title mentions malware while the TFS makes no mention of it - so good work /. editors.

    Two, the malware as described in the TFA:
    According to court documents unsealed yesterday, this malware appears to be a keylogger, having the ability "to gather confidential and proprietary information regarding the structure and functioning of AT&T's internal protected computers and applications.
    The DOJ said Fahd and his co-conspirator then created a second malware strain that leveraged the information acquired through the first. This second malware used AT&T employee credentials to perform automated actions on AT&T's internal application to unlock phone's at Fahd's behest, without needing to interact with AT&T employees every time.

    Which to me sounds more benign than the typical AT&T malware.

  • Unlocking a phone. LMAO. Hope he doesn't get too much time for that.

  • AT&T unlocked my iPhone when I called customer service and asked nicely. Free.

  • The employees are hired to lie to customers and put unrequested charges on their bills. (They did it to me and friends.) Of course such employees are easily bribed to do evil to the company itself. Being evil is their job requirement.

  • Yet when AT&T puts crap on your phone it's somehow OK.

  • Ive been pointing out that this is not only going on, but the majority of this, is happening from India, and it appears that it is for Russia.
    What I have found interesting is how many ppl have called me racists for speaking of what I have seen, which shows why we have such serious security issues in the west, esp. America.
    • BTW, the current question should be, who are these 2 working for? They were picked up in Hong Kong, but was that final, or just a through-way?

Remember, UNIX spelled backwards is XINU. -- Mt.

Working...