• __ghost__@lemmy.ml
    link
    fedilink
    English
    arrow-up
    24
    arrow-down
    3
    ·
    edit-2
    9 months ago

    However, the former IT manager, Jonathan Katz, abused his managerial position and highly privileged account at a mobile telecommunications store to overcome security measures and perform unauthorized number ports.

    As someone who worked in mobile phone sales: there are tons of people making 30k/yr that have the same “highly privileged account” this guy did. He seems to be on the IT side which would make it easier to track. Retail employees do this all the time and usually for less money. People come in with a fake ID and someone’s social and they walk out with a new phone activated with their phone number. An example is being made out of him, but I guarantee this issue is more systemic

    If someone is willing to potentially trade their employment for $5k, the pay is probably low and the turnover is high. Aiding in identity theft is wrong, but five years in prison seems overkill

    • IllNess@infosec.pubOP
      link
      fedilink
      English
      arrow-up
      10
      ·
      9 months ago

      For carrying the unauthorized number porting, Katz received $1,000 in Bitcoin per SIM swap (total of $5,000), plus an (unspecified) percentage of the profits earned from the illicit access to the victims’ devices.

      The amount he made is $5,000 minumum.

      I think 1 year for every instance is fair. This could really ruin someone. At least stolen credit cards have protection. Stealing someone’s crypto wallet could mean that money is gone for good.

    • gaylord_fartmaster@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      ·
      edit-2
      9 months ago

      but five years in prison seems overkill

      I don’t know about that, I can’t think of a single company where a rogue employee could cause more harm with access to my data than my phone provider with a SIM swap. I’d rather have my email provider give open access to my account to someone than have my number ported to someone that can exploit it.

    • IllNess@infosec.pubOP
      link
      fedilink
      English
      arrow-up
      8
      ·
      9 months ago

      I didn’t notice that. All documentation just refers to the company as “Company-1”.

      I’m guessing the company made a deal they would cooperate if their name isn’t included in.

      Not sure how accurate but I found someone with the same name and age in Marlton, NJ on Spokeo.

      His two cell phone numbers say “AT&T Mobility”. His landline says Verizon. I’m going to guess he worked for AT&T. Could be wrong though.

    • hoshikarakitaridia@feddit.de
      link
      fedilink
      English
      arrow-up
      3
      ·
      9 months ago

      Isn’t this also going into cyberattack / responsible disclosure territory? They might be opening themselves up to a class action with this.

      • pelespirit@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        2
        ·
        9 months ago

        Right, I think the clients of the telecom company should know if someone was sim swapping their accounts. Then again, they might have already been told.

  • ResoluteCatnap@lemmy.ml
    link
    fedilink
    English
    arrow-up
    8
    ·
    edit-2
    9 months ago

    There was a darknet diaries episode on sim swaps recently that some of you might find interesting. Ep 112: Dirty Coms.

    from the episode: You also have to worry about current/former employees knowing how to use manager tablets, because those tablets can get stolen and then passed off to someone who knows what they’re doing to do a sim swap before the tablet gets locked out

    • IllNess@infosec.pubOP
      link
      fedilink
      English
      arrow-up
      4
      ·
      9 months ago

      Thank you. I never listened to Darknet Diaries.

      For anyone else reading this, Sim-swapping starts at 36:00 but I suggest you listen to the first part too. Very interesting.