Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-plugin-hostgator domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the ol-scrapes domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home4/scienrds/scienceandnerds/wp-includes/functions.php:6114) in /home4/scienrds/scienceandnerds/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home4/scienrds/scienceandnerds/wp-includes/functions.php:6114) in /home4/scienrds/scienceandnerds/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home4/scienrds/scienceandnerds/wp-includes/functions.php:6114) in /home4/scienrds/scienceandnerds/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home4/scienrds/scienceandnerds/wp-includes/functions.php:6114) in /home4/scienrds/scienceandnerds/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home4/scienrds/scienceandnerds/wp-includes/functions.php:6114) in /home4/scienrds/scienceandnerds/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home4/scienrds/scienceandnerds/wp-includes/functions.php:6114) in /home4/scienrds/scienceandnerds/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home4/scienrds/scienceandnerds/wp-includes/functions.php:6114) in /home4/scienrds/scienceandnerds/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home4/scienrds/scienceandnerds/wp-includes/functions.php:6114) in /home4/scienrds/scienceandnerds/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":11500,"date":"2022-08-03T14:53:20","date_gmt":"2022-08-03T14:53:20","guid":{"rendered":"https:\/\/scienceandnerds.com\/2022\/08\/03\/a-man-made-millions-unlocking-t-mobile-phones-with-stolen-passwords\/"},"modified":"2022-08-03T14:53:21","modified_gmt":"2022-08-03T14:53:21","slug":"a-man-made-millions-unlocking-t-mobile-phones-with-stolen-passwords","status":"publish","type":"post","link":"https:\/\/scienceandnerds.com\/2022\/08\/03\/a-man-made-millions-unlocking-t-mobile-phones-with-stolen-passwords\/","title":{"rendered":"A man made millions unlocking T-Mobile phones with stolen passwords"},"content":{"rendered":"

Source: https:\/\/www.theverge.com\/2022\/8\/2\/23289699\/t-mobile-phone-unlocker-guilty-25-million<\/a>
\n
<\/br><\/code><\/p>\n

\n

A jury has found Argishti Khudaverdyan, a former owner of a T-Mobile store, guilty of using stolen credentials to unlock \u201chundreds of thousands of cellphones\u201d from August 2014 to June 2019 (via PCMag<\/em><\/a>). According to a press release from the Department of Justice<\/a> and an indictment filed earlier this year, Khudaverdyan made around $25 million from the scheme, which also involved bypassing carrier blocks put on lost or stolen cell phones.<\/p>\n

For years, he reportedly used several tactics to acquire the T-Mobile employee credentials needed to unlock phones, including phishing, social engineering, and even getting the carrier\u2019s IT department to reset higher-ups\u2019 passwords, giving him access. The DOJ says he accessed over 50 employees\u2019 credentials, and used them to unlock phones from \u201cSprint, AT&T and other carriers.\u201d <\/p>\n

According to the indictment, Khudaverdyan was able to access T-Mobile\u2019s unlocking tools over the open internet until 2017. After the carrier moved them onto its internal network, Khudaverdyan would allegedly use stolen credentials to access that network via Wi-Fi at T-Mobile stores.<\/p>\n

\n