Supply Chain Market Research - SCMR LLC
  • Blog
  • Home
  • About us
  • Contact

Fool’s Game

4/14/2022

0 Comments

 

Fool’s Game
​

​Last summer T-Mobil (TMUS) confirmed that its customer data had been hacked, with personal data from more than 54 million customers being revealed in the attack.  The hack exposed names, SSNs, driver license information and credit card application data for many customers and shortly after the attack the data was offered on the dark web for ~$270,000 in Bitcoin.  T-Mobile began an investigation right after the hack and according to court documents, went as far as to try to buy back the data from the hackers.  While T-Mobile is not specifically mentioned in the court documents (called “company 3”) the data was said to have belonged to a major telecommunications company and wireless network operator in the US, which timing-wise, matched the T-Mobile breach.
T-Mobile, through a 3rd party agent, transferred $50,000 of bitcoin to get a sample of the offered data and then another $150,000 in bitcoin to get the full dataset while posing as an interested buyer, with the objective of taking the breached data off the market.  Under the arrangement, the hacker would then destroy his copy, although it turns out that the hackers continued to try to sell the information after the T-Mobile purchase was made.  It is not unusual for a company to try to bargain in ransomware attacks, but unusual that T-Mobile and the 3rd party negotiator would expect the hackers to live up to their end of the bargain.  That said, it seems that the indictment here is for the person who acted as a ‘middleman’ between T-Mobile’s 3rd party and the actual hacker, who billed himself as an ‘Official Middleman Service’, having done the same for other hacks.  He was not actually involved in the hacks, but the US is petitioning the UK to allow the ‘middleman’ to be extradited to the US to face charges that he ran a website that supported the buying and selling of hacked data for a fee.
The FBI used the website and its ‘middleman’ services to purchase US tax information includingSSNs, tax ID numbers, bank account numbers and passwords for $4,000 in bitcoin from the site and after extensive research discovered that the middleman was running the dark web site where hacked information was being bought and sold..  The FBI also discovered that the site’s domain was registered by the middleman when he was 14 years old, which he continued to re-register each year, along with mirror sites that he noted to clients would be available if the site was ever raided.  Through the FBI purchase, the site and its owner were all linked to the many illegal transactions and eventually the indictment was granted.
While this sounds like fodder for a novel or movie (Bob Odenkirk to play the “middleman’?) it shows what goes on in what media calls the ‘dark web’.  Such ‘services’ have been around for almost as long as the internet itself, and through considerable complexity are able to operate almost anonymously, especially with the advent of cryptocurrency.  Most folks think it takes significant computer knowledge to ‘get on the dark web’ but it certainly does not, and hackers routinely share exploits and code about ways in which they have succeeded in hacking a site or company.
The T-Mobile hack was such a large one that it attracted considerable attention and governmental resources, but such goes on every day, and every time you fill out an account form, request information, or even put in a contact e-mail, you add to that vast sea of information that hackers find so intriguing, and services that offer to ‘immunize’ you from identity theft would have to go back in time to when you were born to erase any trail of information that could be used to build an identity profile.  Companies have a responsibility to protect your information, and some take that seriously, but asking for your first roommates name does not protect your information from someone who hacks into their servers.  There is no way to fully protect your information from hackers if it has been propagated to the cloud or remote servers, but expecting a hacker to ‘destroy the original’ after payment is a fool’s game.  There is no honor among thieves.
   
0 Comments

    Author

    We publish daily notes to clients.  We archive selected notes here, please contact us at: ​[email protected] for detail or subscription information.

    Archives

    May 2025
    April 2025
    March 2025
    February 2025
    January 2025
    January 2024
    November 2023
    October 2023
    September 2023
    August 2023
    June 2023
    May 2023
    February 2023
    January 2023
    December 2022
    November 2022
    October 2022
    September 2022
    August 2022
    July 2022
    June 2022
    May 2022
    April 2022
    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    October 2021
    September 2021
    August 2021
    July 2021
    June 2021
    May 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    October 2020
    July 2020
    May 2020
    November 2019
    April 2019
    January 2019
    January 2018
    August 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    November 2016
    October 2016
    September 2016

    Categories

    All
    5G
    8K
    Aapl
    AI
    AMZN
    AR
    ASML
    Audio
    AUO
    Autonomous Engineering
    Bixby
    Boe
    China Consumer Electronics
    China - Consumer Electronics
    Chinastar
    Chromebooks
    Components
    Connected Home
    Consumer Electronics General
    Consumer Electronics - General
    Corning
    COVID
    Crypto
    Deepfake
    Deepseek
    Display Panels
    DLB
    E-Ink
    E Paper
    E-paper
    Facebook
    Facial Recognition
    Foldables
    Foxconn
    Free Space Optical Communication
    Global Foundries
    GOOG
    Hacking
    Hannstar
    Headphones
    Hisense
    HKC
    Huawei
    Idemitsu Kosan
    Igzo
    Ink Jet Printing
    Innolux
    Japan Display
    JOLED
    LEDs
    Lg Display
    Lg Electronics
    LG Innotek
    LIDAR
    Matter
    Mediatek
    Meta
    Metaverse
    Micro LED
    Micro-LED
    Micro-OLED
    Mini LED
    Misc.
    MmWave
    Monitors
    Nanosys
    NFT
    Notebooks
    Oled
    OpenAI
    QCOM
    QD/OLED
    Quantum Dots
    RFID
    Robotics
    Royole
    Samsung
    Samsung Display
    Samsung Electronics
    Sanan
    Semiconductors
    Sensors
    Sharp
    Shipping
    Smartphones
    Smart Stuff
    SNE
    Software
    Tariffs
    TCL
    Thaad
    Tianma
    TikTok
    TSM
    TV
    Universal Display
    Visionox
    VR
    Wearables
    Xiaomi

    RSS Feed

Site powered by Weebly. Managed by Bluehost