A court document T-Mobile didn't want customers to see has been made public

Hackers chose T-Mobile because it was an easy target.

0comments
t-mobile Greenberg Glusker $33 million sim swap
A T-Mobile store in California. | Image Credit - Wave7 Research

Earlier this year, we reported that law firm Greenberg Glusker secured $33 million from T-Mobile on behalf of SIM swap attack victim Joseph "Josh" Jones. T-Mobile allegedly sought to keep the wider details confidential, but the judgment has been made public.

Jones was a crypto bigshot and a T-Mobile customer from October 2014 until March 2020. On February 21, 2020, a seventeen-year-old Canadian hacker and his online accomplice stole cryptocurrency "worth nearly $37 million at the time and worth around $53 million today" from Jones by taking control of his T-Mobile number.

The SIM swap attack allowed the attackers to receive any communication, including One-Time Passwords (OTPs) meant for him. This enabled them to access and drain his cryptocurrency account.

T-Mobile discovered and reversed the swap within 16 minutes, but by that time, the damage had already been done.

T-Mobile did nothing to secure Jones's account in the week following the attack. Seven days after the attack, the cybercriminal even left a note in the internal system, which read: "My name is . . . I stole $45 mil from you lolol[.]"

T-Mobile had known about SIM swap attack since 2016, but prevention wasn't a priority


T-Mobile had known about SIM swap attacks affecting its customers since 2016. By March 2018, it knew that the attacks caused financial harm to customers.

SIM swap attacks involved a combination of tricking and bribing employees to get into T-Mobile's systems. From 2016 through February 2020, 27,000 T-Mobile customers were victims of such attacks.

The SIM swap community saw T-Mobile as an easy target. The attack on Jones wouldn't have been attempted if he had a different provider, according to one of the hackers.

Publicly available systems and programs were used to perpetrate the crime. The process was freely discussed in Discord chats.

–SIM Swapper who stole crypto from Jones

T-Mobile had fewer guardrails than other carriers, and its employees received little training to recognize, prevent, disable, or report such attacks. Once authenticated by T-Mobile, hackers were able to stay logged in for weeks at a time. The company didn't even check for location red flags.

Recommended Stories
–SIM Swapper

T-Mobile's Terms & Conditions used language that sought to exonerate it from unauthorized breaches. Preventing SIM swaps wasn't a priority for T-Mobile.

T-Mobile employees were aware of the attack on Jones as it was being carried out, but did nothing to stop it. That's because they had known that the same bad actor was previously involved in similar attacks.

Does this shake your confidence in T-Mobile?

 

No attempts were made to disable the SIM card associated with those attacks. Even though T-Mobile's policy said that a SIM deactivated due to fraud couldn't be reused, tools existed to reverse the deactivation. The hacker took advantage of that. T-Mobile had no procedure for permanently deactivating a SIM card associated with fraudulent activity.

T-Mobile defended itself by claiming that at that time it had 53 million customers but only around 100 employees working on fraud prevention.

T-Mobile had a SIM Block feature, but it was only available to customers who had already been victims of SIM swaps. Employees weren't allowed to offer it to customers who inquired about it. The company didn't educate customers about preventing unauthorized SIM Swaps and discouraged employees from spreading awareness about SIM fraud.

Jones was previously encouraged by T-Mobile to set up a security passcode, warned about a number port-out scam, and requested to consider using an alternative to text-for-pin authentication. However, a security password couldn't have necessarily prevented the attack.

It was concluded that "it was foreseeable that T-Mobile’s acts and omissions would result in theft of Jones’s cryptocurrency." However, since Jones didn't do everything in his power to prevent the damage, T-Mobile was only held liable for 50 percent of his damages. As a result, the Arbitrator awarded $26,569,963.60 to Jones.

T-Mobile has, in recent times, beefed up its defence against SIM swap attacks. The company disabled self-service SIM swaps in 2022 and reenabled them only recently.

This may partially explain why the company didn't want the details of the $33 million award to be made public. Regardless, customers should rest easy knowing that such attacks are improbable now, but if something does happen, they can always count on the government to make T-Mobile compensate.


"Iconic Phones" is coming this Fall!


Rediscover some of the most unique and memorable phones of the last two decades! "Iconic Phones" is a beautifully illustrated book that we've been working on for over a year - and it's coming out in just a couple short month!

"Iconic Phones: Revolution at Your Fingertips" is a must-have coffee table book for every phone lover out there. Covering the stories of more than 20 fan-favorite phones, it takes you on a memorable journey through the technological revolution that shaped our lives. Sign up now to secure an early discount price!

LEARN MORE AND SIGN UP FOR EARLY BIRD DISCOUNTS HERE

Google News Follow
Follow us on Google News
Loading Comments...

Latest Discussions

by Markymark5.0 • 7
by Stanislav Serbezov • 4
by Nenad • 2

Recommended Stories

FCC OKs Cingular\'s purchase of AT&T Wireless