{"id":7574,"date":"2022-04-25T21:03:56","date_gmt":"2022-04-25T21:03:56","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=7574"},"modified":"2022-04-25T21:10:23","modified_gmt":"2022-04-25T21:10:23","slug":"t-mobile-admits-that-lapsus-stole-its-source-codes","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/t-mobile-admits-that-lapsus-stole-its-source-codes\/","title":{"rendered":"T-Mobile Admits that Lapsus$ Hack Group Stole Its Source Codes"},"content":{"rendered":"<h4>Information security specialist Brian Krebs found out that even before the arrests, the Lapsus$ hack group managed to compromise the telecom giant T-Mobile.<\/h4>\n<p>The company confirmed this information, saying that a few weeks ago, hackers penetrated the company&#8217;s network, gained access to internal tools and source codes. It is emphasized that at the same time, the attackers were unable to steal confidential information about <strong>T-Mobile<\/strong> customers.<\/p>\n<p>Let me remind you that we have already talked about the strange hack group Lapsus$, which blackmailed Nvidia, <a href=\"\/blogs\/source-codes-of-microsoft-products\/\">leaked the source codes of <strong>Microsoft<\/strong><\/a>, as well as <strong>Ubisoft<\/strong>, and <strong>Samsung<\/strong>, <a href=\"\/blogs\/okta-and-the-lapsus-attack\/\">compromised <strong>Okta<\/strong><\/a>, but fame for hackers was clearly more important than financial gain.<\/p>\n<p>The well-known investigative journalist <strong>Brian Krebs<\/strong>, who has specialized in information security for many years and has repeatedly exposed various hack groups and helped law enforcement officers in their investigations, <a href=\"https:\/\/krebsonsecurity.com\/2022\/04\/leaked-chats-show-lapsus-stole-t-mobile-source-code\/\" rel=\"noopener nofollow\" target=\"_blank\">reported on the <strong>T-Mobile<\/strong> hack<\/a>.<\/p>\n<p>Krebs, who got into the private chats of the group members, writes that the attack on <strong>T-Mobile<\/strong> took place some time ago, even before <a href=\"\/blogs\/arrest-of-lapsus-group\/\">the arrests of seven alleged <strong>Lapsus$<\/strong> members<\/a>, which UK law enforcement agencies reported at the end of March 2022.<\/p>\n<p>According to the chat logs, the VPN credentials that the group used for initial access were purchased and stored on the dark web, on sites such as Russian Market. The goal of the attackers was to compromise the accounts of <strong>T-Mobile<\/strong> employees, which ultimately allowed them to carry out SIM-swap attacks.<\/p>\n<p><a href=\"\/blogs\/wp-content\/uploads\/2022\/04\/lapsus_01.jpg\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"\/blogs\/wp-content\/uploads\/2022\/04\/lapsus_01.jpg\" alt=\"T-Mobile and hack group Lapsus$\" width=\"703\" height=\"756\" class=\"alignnone size-full wp-image-7575\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/lapsus_01.jpg 703w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/lapsus_01-279x300.jpg 279w\" sizes=\"auto, (max-width: 703px) 100vw, 703px\" \/><\/a><\/p>\n<div class=\"su-quote su-quote-style-default su-quote-has-cite\"><div class=\"su-quote-inner su-u-clearfix su-u-trim\">When Lapsus$ lost access to a T-Mobile employee&#8217;s account (due to the employee trying to log in or change their password), they simply found or bought a different set of T-Mobile VPN credentials. T-Mobile currently has about 75,000 employees worldwide.<span class=\"su-quote-cite\">Krebs notes.<\/span><\/div><\/div>\n<p>In addition to accessing an internal customer account management tool called Atlas, the hackers&#8217; discussions suggest they gained access to Slack and Bitbucket accounts, using the latter to download 30,000 source code repositories.<\/p>\n<p>At the same time, hackers were looking for <strong>T-Mobile<\/strong> accounts associated with the FBI and the US Department of Defence in Atlas (see screenshot below). To their disappointment, it turned out that additional verification procedures were needed to work with such accounts.<\/p>\n<p><a href=\"\/blogs\/wp-content\/uploads\/2022\/04\/lapsus_02.jpg\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"\/blogs\/wp-content\/uploads\/2022\/04\/lapsus_02-1024x553.jpg\" alt=\"T-Mobile and hack group Lapsus$\" width=\"640\" height=\"346\" class=\"alignnone size-large wp-image-7576\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/lapsus_02-1024x553.jpg 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/lapsus_02-300x162.jpg 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/lapsus_02-768x415.jpg 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/lapsus_02.jpg 1274w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>Interestingly, after failing to keep records of the FBI and other intelligence agencies, the leader of the group, a 17-year-old teenager from the UK, known by the nicknames <em>White<\/em>, <em>WhiteDoxbin<\/em> and <em>Oklaqq<\/em>, told other hackers to focus on stealing source codes and breaking the VPN connection with <strong>Atlas<\/strong>, which <em>WhiteDoxbin<\/em> considered &#8220;garbage&#8221;. The other members of the band were extremely unhappy with this decision. <\/p>\n<p><a href=\"\/blogs\/wp-content\/uploads\/2022\/04\/lapsus_03.jpg\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"\/blogs\/wp-content\/uploads\/2022\/04\/lapsus_03-1024x568.jpg\" alt=\"T-Mobile and hack group Lapsus$\" width=\"640\" height=\"355\" class=\"alignnone size-large wp-image-7577\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/lapsus_03-1024x568.jpg 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/lapsus_03-300x166.jpg 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/lapsus_03-768x426.jpg 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/lapsus_03.jpg 1315w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p>After the publication of Krebs&#8217;s article, <strong>T-Mobile<\/strong> representatives confirmed the hack. The company stated:<\/p>\n<div class=\"su-quote su-quote-style-default\"><div class=\"su-quote-inner su-u-clearfix su-u-trim\">A few weeks ago, our monitoring tools detected an attacker using stolen credentials to access internal systems hosting operational tools. The systems that were accessed contained no customer, government or other sensitive information, and we have no evidence that the attacker was able to obtain anything of value. Our systems and processes were running as normal, the attack was quickly stopped and stopped, and the compromised credentials used were retired.<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Information security specialist Brian Krebs found out that even before the arrests, the Lapsus$ hack group managed to compromise the telecom giant T-Mobile. The company confirmed this information, saying that a few weeks ago, hackers penetrated the company&#8217;s network, gained access to internal tools and source codes. It is emphasized that at the same time, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":7579,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[129,29,584,621],"class_list":{"0":"post-7574","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-brian-krebs","9":"tag-hackers","10":"tag-lapsus","11":"tag-t-mobile"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/04\/T-mobile.jpg","author_info":{"display_name":"Vladimir Krasnogolovy","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/krasnogolovy\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/7574","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=7574"}],"version-history":[{"count":6,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/7574\/revisions"}],"predecessor-version":[{"id":7584,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/7574\/revisions\/7584"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/7579"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=7574"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=7574"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=7574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}