• Home Page
  • About Us
  • Advertise
  • Contact Us
  • My Account

TechVisibility

  • Home page
  • News
  • Computing
  • Reviews
  • Apps
  • Gaming
  • Mobile
  • Audio
  • Video
  • Gadgets
  • Electric Vehicles
  • More
    • Antivirus
    • Cameras
    • Phones
    • Security
    • Smart Home
    • Software
    • Streaming
    • TVs
    • Wearables
    • Web hosting
    • What To Watch
You are at :Home»Mobile»A Massive Hack Mimic Thousands Of Phones! 16,000 Customers Affected
Markus Spiske Iar on Unsplash

A Massive Hack Mimic Thousands Of Phones! 16,000 Customers Affected

Noah Gravel 20 Dec 2020 Mobile, Phones, Security Leave a comment 86 Views

Facebook Twitter linkedin Pinterest Tumblr WhatsAppt Telegram Email More

A new massive hack stole millions of dollars from online bank accounts. The hackers copied the smartphones of 16,000 users.

They used emulators to do the malicious act. IBM Trusteer researchers discovered the new massive hack.

The security experts claimed that the hackers used a network of mobile device emulators. Copying the users’ smartphones allowed them to steal millions of dollars from online banking accounts.

  • A Massive Hack Mimic Thousands Of Phones! 16,000 Customers Affected
    Freestock on Unsplash

They were able to pull off the massive online breach in just a few days. This just shows how specialized hackers are.

IBM Trusteer experts said that the attack’s scale was unlike anything they have seen before. The hackers used around 20 emulators to copy more than 16,000 phones from their victims.

After that, they breached these people’s online banking accounts. The security researchers claimed that one instance of the massive hack was very alarming.

Why is the massive hack alarming?

In one case, the hackers used a single emulator was able to spoof more than 8,100 devices. They then entered usernames and passwords into banking apps running on the emulators.

To give you an idea, legitimate developers use emulators to test how apps run on different smartphones. Going back, after hackers use these emulators, they initiate fraudulent money orders.

Doing this method allowed them to pull off the massive hack and steal millions of dollars from compromised devices.

  • Markus Spiske Iar on Unsplash

The hackers used device identifiers to bypass the protections banks use to block such attacks. These identifiers correspond to each compromised account holder.

The hackers also obtained the device IDs from the hacked devices. They pretended to be customers who were accessing their accounts from new phones.

The attackers were also able to bypass multi-factor authentication by accessing SMS messages.

What happens after the account was drained?

After the hackers drained an account, they would retire the spoofed device that accessed the account. When they are done with it, they’ll replace it with a new device.

The hackers also cycled through devices if they were rejected by a bank’s anti-fraud system.

IBM Trusteer researchers said they identified distinct attack legs from the hackers. They said that the attackers tend to wipe all the data and start a new hack after their operation was done.

The researchers believe that bank accounts were compromised using either malware or phishing attacks.

However, the security experts were not able to explain how the hackers managed to steal SMS messages and device IDs.

Most of the online banking accounts were located in the United States and Europe. The attackers intercepted communications between the spoofed devices and the banks’ application servers.

The method allowed them to monitor the progress of operations in real-time.

They also used logs and screenshots to track the operation over time. As the massive hack progressed, the researchers saw the attack techniques evolve as the crooks learned from previous mistakes.

The new massive attack is just one of the latest cyber breaches that happened these past few months. Previously, SolarWinds was also hacked by alleged Russian hackers. They next one compromised around 40 customers of Microsoft.

This just shows that the current pandemic gave way for hackers to evolve since most people are now doing tasks online.



Attack Customers Massive Mimic Phones 2020-12-20
Noah Gravel
Tags Attack Customers Massive Mimic Phones

Author

Posted by : Noah Gravel
Noah is a tech writer for TechVisibility with a passion for tech products.
Previous Article :

Keep Using Microsoft Apps For Free! Here’s The Trick!

Next Article :

Most Popular Podcasts Worldwide 2020

Related Articles

Huawei Y9 Prime 2019: An Impressive Smartphone

Huawei Y9 Prime 2019: An Impressive Smartphone

Jody G 30 Jul 2020
Five 2020 iPhone ‘All-New’ Apple iPhones Revealed

Five 2020 iPhone ‘All-New’ Apple iPhones Revealed

Jody G 08 Jun 2020
Hackers Can Get Your Tesla Model X Using This Bluetooth Attack!

Hackers Can Get Your Tesla Model X Using This Bluetooth Attack!

Noah Gravel 28 Nov 2020
Samsung Galaxy S21 Leak Covers Every Spec

Samsung Galaxy S21 Leak Covers Every Spec

Azriel B 15 Nov 2020
Samsung Galaxy S21 Advanced Saving Trick: How To Save $700!

Samsung Galaxy S21 Advanced Saving Trick: How To Save $700!

Noah Gravel 28 Dec 2020
Why You Should Have an Alternative Email

Why You Should Have an Alternative Email

Mike West 14 Feb 2021

Leave a Reply

  • Facebook Comments
  • Disqus Comments (0)
Specify a Disqus shortname at Social Comments options page in admin panel

Subscribe to our Channel

YouTube Videos

Youtubevideo Youtubevideo Youtubevideo Youtubevideo Youtubevideo Youtubevideo Youtubevideo Youtubevideo Youtubevideo Youtubevideo

Advertisement


TechVisibility


2493 Technology Drive
Hayward, CA 94545
800-601-4491
contact@techvisibility.com

Follow us

Newsletter

Recent Posts

  • Video Game Movies Are Getting Better and More Popular, Here’s Why

    Video Game Movies Are Getting Better and More Popular, Here’s Why

    Louise Tranate 25 Feb 2021
  • MacOS Big Sur 11.2.2 to Fix MacBook Pro and Air’s Third-Party USB-C Issues

    MacOS Big Sur 11.2.2 to Fix MacBook Pro and Air’s Third-Party USB-C Issues

    Noah Gravel 25 Feb 2021
  • Daft Punk: Did Someone Create A Game For Them?

    Daft Punk: Did Someone Create A Game For Them?

    Louise Tranate 25 Feb 2021
  • PUBG: New State’s Pre-Registration Details; What to Expect in New Troi Map

    PUBG: New State’s Pre-Registration Details; What to Expect in New Troi Map

    Noah Gravel 25 Feb 2021

Random Posts

Nintendo Switch’s Forgotten Games That Will Arrive in 2021!

Nintendo Switch’s Forgotten Games That Will Arrive in 2021!

Top 4 Must-Have Cake Design Tools

Top 4 Must-Have Cake Design Tools

6 Upcoming PC Games This November

6 Upcoming PC Games This November

Free Life-Changing Apps – 3 Habit Tracking Apps

Free Life-Changing Apps – 3 Habit Tracking Apps

The smarter choice for a security camera: Arlo Pro 3

The smarter choice for a security camera: Arlo Pro 3

Advertisement

  • Terms & Conditions
  • Privacy Policy
  • Cookies Policy
  • Accessibility Statement
  • Advertise
  • About Us
  • Contact Us
  • Do not sell my info
  • YouTube Videos
  • My Account
Copyright 2020, All Rights Reserved
Developed By IdealVisibility.com