

Hackers Are Turning Tech Support Into a Threat (msn.com) 38
Hackers have stolen hundreds of millions of dollars from cryptocurrency holders and disrupted major retailers by targeting outsourced call centers used by American corporations to reduce costs, WSJ reported Thursday. The attackers exploit low-paid call center workers through bribes and social engineering to bypass two-factor authentication systems protecting bank accounts and online portals.
Coinbase faces potential losses of $400 million after hackers compromised data belonging to 97,000 customers by bribing call center workers in India with payments of $2,500. The criminals also used malicious tools that exploited vulnerabilities in Chrome browser extensions to collect customer data in bulk.
TaskUs, which handled Coinbase support calls, shut down operations at its Indore, India facility and laid off 226 workers. Retail attacks targeted Marks & Spencer and Harrods with hackers impersonating corporate executives to pressure tech support workers into providing network access. The same technique compromised MGM Resorts systems in 2023. Call center employees typically possess sensitive customer information including account balances and recent transactions that criminals use to masquerade as legitimate company representatives.
Coinbase faces potential losses of $400 million after hackers compromised data belonging to 97,000 customers by bribing call center workers in India with payments of $2,500. The criminals also used malicious tools that exploited vulnerabilities in Chrome browser extensions to collect customer data in bulk.
TaskUs, which handled Coinbase support calls, shut down operations at its Indore, India facility and laid off 226 workers. Retail attacks targeted Marks & Spencer and Harrods with hackers impersonating corporate executives to pressure tech support workers into providing network access. The same technique compromised MGM Resorts systems in 2023. Call center employees typically possess sensitive customer information including account balances and recent transactions that criminals use to masquerade as legitimate company representatives.
Re: (Score:3, Insightful)
Karmacoin (Score:2)
Race to the bottom. (Score:3)
Have higher standards in hiring/outsourcing, and be willing to pay for those types of employees. When you're paying the same as the local McDonald's don't be surprised when you get fuckheads for applicants.
Data sovereignty (Score:2)
Some countries have data sovereignty regulations where personal, financial, medical and government data has to be
- hosted in the country
- accessible only by people inside the country
- on computers located in the country
- On computers not accessible by people outside of the country
https://en.wikipedia.org/wiki/... [wikipedia.org]
Re: Data sovereignty (Score:2)
Re: (Score:2)
Okay... and your point? We're not talking about any industries where data-sovereignty is a concern. The article is about private U.S. tech companies outsourcing their support to overseas companies to save money (like it says in sentence one of TFS), then being surprised when those outsourcers have less-than-honest employees. They're on the other side of the world from their clients, it's much less risk for them to not follow data security requirements.
Re: (Score:1)
Have higher standards in hiring/outsourcing, and be willing to pay for those types of employees. When you're paying the same as the local McDonald's don't be surprised when you get fuckheads for applicants.
You've probably never visited the developing world, a job in McDonald's is relatively high paying in places like India as you typically require a tertiary education for it. Collages run courses on working in fast food (hospitality or some such). A quick google suggests a McD's worker is on R14,000 p/m and call centre works starts at R15,000 p/m/
Your point stands though, even if working in McD's isn't an unskilled weekend job for a 16 yr old like it is in developed economies.
I find that where a company
You DO get what you pay for (Score:3)
Outsourcing to a third party will always lead to problems as they too want to make as much profit as possible.
How are bribes delivered? (Score:2)
How do they send the bribes to the call center workers? Or are they possibly screwing them as well and just convincing them they will receive something?
Re: (Score:1)
How do they send the bribes to the call center workers? Or are they possibly screwing them as well and just convincing them they will receive something?
Bitcoin? $2,500US converted to Indian Rupees is 2/3 of the annual median wage... That's plenty of incentive to figure out how to use bitcoin or some other crypto-currency.
Chrome browser extensions (Score:1)
Switch to Firefox.
When you pay techs $0.50 an hour (Score:2)
in a far off country where you can't sue, this should have been expected.
Re: (Score:3)
More than that, any competent bad actor is going to attack the weakest link in the chain. If that happens to be low-paid boiler room call center phoneslaps, then that's where the crosshairs are going to go.
It's no different than your complex password only being as complex as finding someone who knows it, and beating on them with a $10 hammer until they give it to you.
Re: (Score:2)
Re: (Score:2)
Thats not how "multi-factor" works (Score:3)
The attackers exploit low-paid call center workers through bribes and social engineering to bypass two-factor authentication systems protecting bank accounts and online portals.
If you can bypass it, it's not an authentication factor. If the secret isn't held by the user, it's not an authentication factor. If you could bribe the factor away, how is a factor? This is why I laugh at companies who think emailing you a code to enter the system is somehow a security metric of value. I have to generate the value, independent of the system, such as using a Yubi Key, or a TOTP authentication token. If the system provides it to me, it's meaningless.
Re: (Score:2)
I If you could bribe the factor away, how is a factor? ...I have to generate the value, independent of the system, such as using a Yubi Key, or a TOTP authentication token.
Because - and I can't believe I have to explain this - if you have the generated value so that you can validate your identity to the computer, there's no way the computer can verify whether I paid you $50,000 for that code. There's no way for the computer to validate whether the data exports I perform are for backup purposes, or to extort the company.
So, whether we're dealing with metal keys, or 8192-bit SSL certificates combined with a 24-character password and an iris scanner...the human holding the means
Re: (Score:2)
I know plenty of companies who have "multifactor" but the additional
Re: (Score:3)
Let me ask you this: What do you do if you somehow lost access to your Yubi-keys? Do you have any recovery methods at all? If so, that's your answer.
Re: (Score:3)
I've set things up so if I lose access, it's truly my fault.
Re: (Score:2)
I do something similar. One of my FIDO tokens is a Trezor device. This means that if I lose it, I load the BIP-39 passphrase, load the app, load the encrypted token sheet, and I'm back with those. Downside is that I have to have a working Trezor device. I also have a backup Yubikey stored offsite, but that won't help much if there is something catastrophic. This is why I try to not just have FIDO access only.
Key management here is tough. Too secure, you lose all your data. Have the core recovery keys
Re: (Score:2)
I’ve managed many help desks, and a constant high volume is “I forgot my password” or “I can’t access this please help me”. I get what you’re saying about putting responsibility in users hands, but the large paying customers are
Re: (Score:2)
Re: (Score:2)
Can you imagine the average chump putting in this much effort to stay secure?
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
So you never considered that an employee of the company can add / remove MFA methods from the account? I.e. "I will pay you $500 if you add this email account as a MFA on account X using the permissions you've been granted to remediate account access issues."
Of course email / SMS MFA is terrible. This has been known for a long time. But even if they're using TOTP or a hardware device like a Yubikey, there is nothing preventing a customer service agent empowered to make account changes to add the TOTP see
Re: (Score:2)
Re: (Score:2)
So you would rather have a world where you call customer service because you had a problem with your MFA device, and the answer is "too fucking bad, you're locked out of your retirement account forever because there's nothing we can do. Hope you didn't want your hundreds of thousands of dollars!"
Tell us you've never thought about the customer experience, without telling us you've never thought about the customer experience.
Re: (Score:2)
Re: (Score:2)
One company I worked for handled recoveries where all else fails in a simple way. If all was lost, they would send a registered letter to the person at their stored snail mail address. The letter had a recovery code on it. Yes, it would take days to get there, but registered mail is good enough for security, and would allow someone access to their stuff, even if it means waiting a week for that recovery code.
Re: (Score:2)
If you can bypass it, it's not an authentication factor.
Of course it is. It's like saying your password isn't a password because it can be reset and changed by the root account. The authentication remains an authentication factor. Just that no one needs to be authenticated for certain administrative actions to take place.
You're confusing authentication with a privileged instruction.
Re: (Score:2)