Threat Intelligence

7/6/2017
06:20 PM
50%
50%

Telecom Hacker Sentenced for Laundering Millions

Pakistani man sentenced to prison for hacking into PBX systems and generating millions of dollars via bogus premium phone calls and laundering the money.

A federal court sentenced a Pakistani telecom hacker to four years in prison, after he and his cohorts illegally infiltrated PBX systems run by companies and organizations to set up a fake premium phone service and laundered money, according to an FBI report.

Muhammad Sohail Qasmani was sent to prison for running the bogus premium phone service between November 2008 to December 2012 and generating more than $19.6 million. The money was laundered using 650 transferees in 10 different countries, according to the FBI.

As part of the scheme, the international group hacked into PBX telephone networks operated by companies and organizations. Once inside a company's PBX system, the group reprogrammed unused extensions to operate as a pay-per-minute premium service line. But instead, the group had dialers call the pay-per-minute numbers to rack up large phone bills, which the unsuspecting companies paid. Qasmani and his cohorts then collected those proceeds and laundered the money.

A major telecom provider discovered the fraud and reported it to the FBI. One of Qasmani's cohorts, Noor Aziz Uddin, is still at large.

Read more about the FBI sentencing here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-2668
PUBLISHED: 2018-06-22
389-ds-base before versions 1.3.5.17 and 1.3.6.10 is vulnerable to an invalid pointer dereference in the way LDAP bind requests are handled. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service.
CVE-2017-7466
PUBLISHED: 2018-06-22
Ansible before version 2.3 has an input validation vulnerability in the handling of data sent from client systems. An attacker with control over a client system being managed by Ansible, and the ability to send facts back to the Ansible server, could use this flaw to execute arbitrary code on the An...
CVE-2018-12648
PUBLISHED: 2018-06-22
The WEBP::GetLE32 function in XMPFiles/source/FormatSupport/WEBP_Support.hpp in Exempi 2.4.5 has a NULL pointer dereference.
CVE-2018-12641
PUBLISHED: 2018-06-22
An issue was discovered in arm_pt in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_arm_hp_template, demangle_class_name, demangle_fund_type, do_type, do_...
CVE-2018-12642
PUBLISHED: 2018-06-22
Froxlor through 0.9.39.5 has Incorrect Access Control for tickets not owned by the current user.