‘Got that boomer!’: How cyber-criminals steal one-time passcodes for SIM swap attacks and raiding bank accounts
Reading Time: 4 minutesThe incoming phone call flashes on a victim’s phone. It may only last a few seconds, but can end with the victim handing over codes that give cybercriminals the ability to hijack their online accounts or drain their crypto and digital wallets.
‘This is the PayPal security team here. We’ve detected some unusual activity on your account and are calling you as a precautionary measure,’ the caller’s robotic voice says. ‘Please enter the six-digit security code that we’ve sent to your mobile device.’
The victim, ignorant of the caller’s malicious intentions, taps in the six-digit code they just received by text message into their phone keypad.
‘Got that boomer!’ a message reads on the attacker’s console.
In some cases, the attacker might also send a phishing email with the aim of capturing the victim’s password. But oftentimes, that code from their phone is all the attacker needs to break into a victim’s online account. By the time the victim ends the call, the attacker has already used the code to log in to the victim’s account as if they were the rightful owner.
But a bug in Estate’s code exposed the site’s backend database, which was not encrypted. Estate’s database contains details of the site’s founder and its members, and line-by-line logs of each attack since the site launched, including the phone numbers of victims that were targeted, when, and by which member.
The backend database provides a rare insight into how a one-time passcode interception operation works. Services like Estate advertise their offerings under the guise of providing an ostensibly legitimate service for allowing security practitioners to stress-test resilience to social engineering attacks, but fall in a legal gray space because they allow their members to use these services for malicious cyberattacks. In the past, authorities have prosecuted operators of similar sites dedicated to automating cyberattacks for supplying their services to criminals.
Some of the attacks also show efforts to hijack phone numbers by carrying out SIM swap attacks — one campaign was simply titled ‘ur getting sim swapped buddy’ — and threatening to dox victims.
Although Estate is careful not to outwardly use explicit language that could incite or encourage malicious cyberattacks, the database shows that Estate is used almost exclusively for criminality.
‘These kinds of services form the backbone of the criminal economy,’ said Allison Nixon, chief research officer at Unit 221B, a cybersecurity firm known for investigating cybercrime groups. ‘They make slow tasks efficient. This means more people receive scams and threats in general. More old people lose their retirement due to crime — compared to the days before these types of services existed.’
How Estate operates
Estate tried to keep a low profile by hiding its website from search engines and bringing on new members by word of mouth. According to its website, new members can sign in to Estate only with a referral code from an existing member, which keeps the number of users low to avoid detection by the upstream communications providers that Estate relies on.
Once through the door, Estate provides members with tools for searching for previously breached account passwords of their would-be victims, leaving one-time codes as the only obstacle to hijack the targets’ accounts. Estate’s tools also allow members to use custom-made scripts containing instructions for tricking targets into turning over their one-time passcodes.
Some attack scripts are designed instead to validate stolen credit card numbers by tricking the victim into turning over the security code on the back of their payment card.
According to the database, one of the biggest calling campaigns on Estate targeted older victims under the assumption that ‘Boomers’ are more likely to take an unsolicited phone call than younger generations. The campaign, which accounted for about a thousand phone calls, relied on a script that kept the cybercriminal apprised of each attempted attack.
‘The old f— answered!’ would flash in the console when their victim picked up the call, and ‘Life support unplugged’ would show when the attack succeeded.
The database shows that Estate’s founder is aware that their clientele are largely criminal actors, and Estate has long promised privacy for its members.
‘We do not log any data, and we do not require any personal information to use our services,’ reads Estate’s website, a snub to the identity checks that upstream telecom providers and tech companies typically require before letting customers onto their networks.
But that isn’t strictly true. Estate logged every attack its members carried out in granular detail dating back to the site’s launch in mid-2023. And the site’s founder retained access to server logs that provided a real-time window into what was happening on Estate’s server at any given time, including every call made by its members, as well as any time a member loaded a page on Estate’s website.
The database shows that Estate also keeps track of email addresses of prospective members. One of those users said they wanted to join Estate because they recently ‘started buying ccs’ — referring to credit cards — and believed Estate was more trustworthy than buying a bot from an unknown seller. The user was later approved to become an Estate member, the records show.
The exposed database shows that some members trusted Estate’s promise of anonymity by leaving fragments of their own identifiable information — including email addresses and online handles — in the scripts they wrote and attacks they carried out.
Veteran security reporter Brian Krebs, who previously reported on a one-time passcode operation in 2021, said these kinds of criminal operations make clear why you should ‘never provide any information in response to an unsolicited phone call.’
‘It doesn’t matter who claims to be calling: If you didn’t initiate the contact, hang up. If you didn’t initiate the contact, hang up,’ Krebs wrote. That advice still holds true today.
But while services that offer using one-time passcodes still provide better security to users than services that don’t, the ability for cybercriminals to circumvent these defenses shows that tech companies, banks, crypto wallets and exchanges, and telecom companies have more work to do.
Unit 221B’s Nixon said companies are in a ‘forever battle’ with bad actors looking to abuse their networks, and that authorities should step up efforts to crack down on these services.
‘The missing piece is we need law enforcement to arrest crime actors that make themselves such a nuisance,’ said Nixon. ‘Young people are deliberately making a career out of this, because they convince themselves they’re ‘just a platform’ and ‘not responsible for crime’ facilitated by their project.’
‘They hope to make easy money in the scam economy. There are influencers that encourage unethical ways to make money online. Law enforcement needs to stop this.’
Ref: techcrunch
MediaDownloader.net -> Free Online Video Downloader, Download Any Video From YouTube, VK, Vimeo, Twitter, Twitch, Tumblr, Tiktok, Telegram, TED, Streamable, Soundcloud, Snapchat, Share, Rumble, Reddit, PuhuTV, Pinterest, Periscope, Ok.ru, MxTakatak, Mixcloud, Mashable, LinkedIn, Likee, Kwai, Izlesene, Instagram, Imgur, IMDB, Ifunny, Gaana, Flickr, Febspot, Facebook, ESPN, Douyin, Dailymotion, Buzzfeed, BluTV, Blogger, Bitchute, Bilibili, Bandcamp, Akıllı, 9GAG