Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

Four Arrested for Hacking Phone Systems to Fund Terrorism

The Philippines Criminal Investigation and Detection Group (CIDG) said on Saturday that with the help of the FBI, four people have been arrested and stand accused of running remote toll scam in order to fund terrorism.

The Philippines Criminal Investigation and Detection Group (CIDG) said on Saturday that with the help of the FBI, four people have been arrested and stand accused of running remote toll scam in order to fund terrorism.

AT&T Hackers Arrested in PhilippinesAccording to a statement from the CIDG, the three men who were arrested (and a female who was a live-in partner of one of the three) hacked the main trunk-lines for several AT&T customers, forcing the businesses to dial expensive toll numbers, which the men controlled.

The money collected from the hijacked calls would then be funneled to a group called Jemaah Islamiyah, who has been linked to the 2002 bombings in Bali, as well as al-Qaida.

CIDG director, Samuel Pagdilao, said the four arrests, stemmed from a complaint made by AT&T, adding that the scam resulted to almost $2-million in losses incurred by the company. AT&T would not confirm the losses incurred by the crime. In a statement made over the weekend, the telecom giant did it had reimbursed customers for their losses.

The FBI confirmed that it was involved with the investigation, and helped the Philippine agency build their case; they offered no additional comment on the investigation.

The CIDG said that the FBI has been investigating incessant hacking of telecommunication companies in the U.S. and abroad since 1999.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn about active threats targeting common cloud deployments and what security teams can do to mitigate them.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Cybercrime

Daniel Kelley was just 18 years old when he was arrested and charged on thirty counts – most infamously for the 2015 hack of...

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.