- Crypto Theft in New York – How a Moroccan Duped an American for $500,000 - August 17, 2023
- White Hacker Turns Black: $9M Crypto Heist - August 15, 2023
- Clop Group - August 15, 2023
A security flaw in AT&T’s email inboxes allowed an unidentified group of attackers to steal up to $20 million in cryptocurrencies. Using an unnamed source, TechCrunch writes about it.
How the Hackers Exploit Vulnerabilities
According to reports, hackers have discovered a means to access the email accounts of all AT&T operators. These include the websites bellsouth.net, att.net, and sbcglobal.net. An unnamed insider claims that hackers have unrestricted access to the intranet of AT&T staff members.
Hackers create unique keys after obtaining privileged access permissions that enable them to access the victim’s email account without using a password. Additionally, the publication claims that hackers have the ability to reset victims’ passwords on cryptocurrency trading platforms Coinbase and Gemini.
The unauthorized access was confirmed by AT&T, who also guaranteed that they had already taken steps to strengthen the system’s security. How many users of the cell operator’s network have been compromised is unclear, though.
Other Cases
It’s unknown how long the attackers had access to the secure network. One of the victims claims that since November 2022, unlawful access has been continuously documented. According to the article, hackers boast about their accomplishments in the Telegram group. The attackers stated that they have access to the whole database of AT&T employees in one of the posts.
A flaw in the SMS multi-factor authentication system allowed hackers to gain access to the accounts of around 6,000 users, according to a letter sent to consumers by the American cryptocurrency exchange Coinbase in October 2021. It wasn’t made clear who provided the SMS services in question. The exchange was attacked between March and May of 2021.
The customer’s email address, password, and phone number linked to their account were all necessary for the hacker to use. However, it is still unknown how the criminals obtained such detailed information about their targets.