How Pakistan Cyber Cop Nabbed Big Time Phone Hacker

RiazHaq

Senator (1k+ posts)
http://www.riazhaq.com/2015/03/how-pakistan-cyber-cop-nabbed-big-time.html


Pakistan's cyber security chief Mir Mazhar Jabbar tracked down and arrested Noor Aziz Uddin and his accomplices last month in Karachi. Noor was on FBI's Most Wanted list for stealing $50 million by international phone hacking that targeted small businesses in many countries around the world.




How Did Noor Do It?

Noor gathered business cards of small businesses and used them to target private branch exchange (PBX) switches by dialing into voicemail accounts and guessing passwords. One he guessed the voicemail passwords correctly, he would use the voicemail to forward calls to premium phone numbers that he owned. Then he and his many accomplices repeatedly dialed the hacked PBX numbers which forwarded to his premium phone lines earning him millions of dollars over several years. The premium phone line charges were in the range of several dollars a minutes.

The FBI’s official indictment doesn’t name specific entities, but it lists examples: One business in Livingston, New Jersey, was hacked for $24,120. Another, in Englewood, New Jersey, was charged $83,839, according to a story in International Business Times. Noor and his accomplices netted over $50 million over 4-year period from 2008 to 2012 by this scheme.

How Was Noor Caught:

Early in 2015, Pakistan's Federal Investigation Agency (FIA) found the cell phone number used by Noor personally. Upon getting hold of the phone number, Jabbar contacted the wireless service provider with a court order. The carrier then gave him access to the phone's GPS coordinates. And that's how Jabbar reached Noor's doorstep last month.



Source: Communication Fraud Control Association


How Big is the Phone Hacking Fraud?

Widespread use of Voice over IP (VoIP) by small businesses has created a huge opportunity for phone hackers. Communications Fraud Control Association, a telecom trade group based in New Jersey, estimated the PBX fraud at $4.42 billion in 2013.


Summary:

Growing access to technology is opening up new opportunities for criminals in both physical and cyber worlds. Noor Aziz Uddin case shows that the technology used by criminals to commit crimes can also be used by governments to fight such crimes. It requires law enforcement to stay one or two steps ahead of the criminals to beat them at their own game.

http://www.riazhaq.com/2015/03/how-pakistan-cyber-cop-nabbed-big-time.html

 
Last edited by a moderator:

RiazHaq

Senator (1k+ posts)
New Delhi: A Pakistani cyber security firm, which has worked with the authorities in that country, has been found stealing information from the Indian government and defence establishments, a report by a US-based security firm FireEye (founded by Pakistani-American Ashar Aziz) said today.




The Pakistani cyber firm accessed computers of bureaucrats through malware and targeted Indian establishments using leased US hosting services, FireEye said.


"An Islamabad-based IT security firm called Tranchulas, which claims to have helped prepare the Pakistani government for cyber warfare, bombarded officials in Indian government organizations with emails containing malicious software, or malware," it said.


The report reveals that India remains a vulnerable target for cyber-attacks even after documents leaked by whistleblower Edward Snowden exposed widespread spying by US National Security Agency.


The firm used terms like 'Sarabjit Singh', 'Devyani Khoragade' and 'Salary hikes for government employees' in the subject line to lure officials into opening attachments containing the malware.


The malware, identified by FireEye, has been active since early 2013 with the name of a Tranchulas employee, Umair Aziz, in its code.




FireEye said that since "July 2013, different variants of the malware with modified names have surfaced. It is indicated that it was common for cyber attackers to use servers located in a different country to avoid detection".


http://zeenews.india.com/news/sci-t...irm-stealing-indian-data-fireeye_1560512.html
 

Back
Top