KrebsOnSecurity recently reviewed a copy of the private chat messages between members of the LAPSUS$ cybercrime group in the week leading up to the arrest of its most active members last month. The logs show LAPSUS$ breached T-Mobile multiple times in March, stealing source code for a range of company projects. T-Mobile says no customer or government information was stolen in the intrusion.
LAPSUS$ is known for stealing data and then demanding a ransom not to publish or sell it. But the leaked chats indicate this mercenary activity was of little interest to the tyrannical teenage leader of LAPSUS$, whose obsession with stealing and leaking proprietary computer source code from the world’s largest tech companies ultimately led to the group’s undoing.
From its inception in December 2021 until its implosion late last month, LAPSUS$ operated openly on its Telegram chat channel, which quickly grew to more than 40,000 followers after the group started using it to leak huge volumes of sensitive data stolen from victim corporations.
But LAPSUS$ also used private Telegram channels that were restricted to the core seven members of the group. KrebsOnSecurity recently received a week’s worth of these private conversations between LAPSUS$ members as they plotted their final attacks late last month.
The candid conversations show LAPSUS$ frequently obtained the initial access to targeted organizations by purchasing it from sites like Russian Market, which sell access to remotely compromised systems, as well as any credentials stored on those systems.
The logs indicate LAPSUS$ had exactly zero problems buying, stealing or sweet-talking their way into employee accounts at companies they wanted to hack. The bigger challenge for LAPSUS$ was the subject mentioned by “Lapsus Jobs” in the screenshot above: Device enrollment. In most cases, this involved social engineering employees at the targeted firm into adding one of their computers or mobiles to the list of devices allowed to authenticate with the company’s virtual private network (VPN).
The messages show LAPSUS$ members continuously targeted T-Mobile employees, whose access to internal company tools could give them everything they needed to conduct hassle-free “SIM swaps” — reassigning a target’s mobile phone number to a device they controlled. These unauthorized sim swaps allow an attacker to intercept a target’s text messages and phone calls, including any links sent via SMS for password resets, or one-time codes sent for multi-factor authentication.
The LAPSUS$ group had a laugh at this screenshot posted by their leader, White, which shows him reading a T-Mobile news alert about their hack into Samsung. White is viewing the page via a T-Mobile employee’s virtual machine.
In one chat, the LAPSUS$ leader — a 17-year-old from the U.K. who goes by the nicknames “White,” “WhiteDoxbin” and “Oklaqq” — is sharing his screen with another LAPSUS$ member who used the handles “Amtrak” and “Asyntax.”
The two were exploring T-Mobile’s internal systems, and Amtrak asked White to obscure the T-Mobile logo on his screen. In these chats, the user “Lapsus Jobs” is White. Amtrak explains this odd request by saying their parents are aware Amtrak was previously involved in SIM swapping.
“Parents know I simswap,” Amtrak said. “So, if they see [that] they think I’m hacking.”
The messages reveal that each time LAPSUS$ was cut off from a T-Mobile employee’s account — either because the employee tried to log in or change their password — they would just find or buy another set of T-Mobile VPN credentials. T-Mobile currently has approximately 75,000 employees worldwide.
On March 19, 2022, the logs and accompanying screenshots show LAPSUS$ had gained access to Atlas, a powerful internal T-Mobile tool for managing customer accounts.
LAPSUS$ leader White/Lapsus Jobs looking up the Department of Defense in T-Mobile’s internal Atlas system.
After gaining access to Atlas, White proceeded to look up T-Mobile accounts associated with the FBI and Department of Defense (see image above). Fortunately, those accounts were listed as requiring additional verification procedures before any changes could be processed.
Faced with increasingly vocal pleadings from other LAPSUS$ members not to burn their access to Atlas and other tools by trying to SIM swap government accounts, White unilaterally decided to terminate the VPN connection permitting access to T-Mobile’s network.
The other LAPSUS$ members desperately wanted to SIM swap some wealthy targets for money. Amtrak throws a fit, saying “I worked really hard for this!” White calls the Atlas access trash and then kills the VPN connection anyway, saying he wanted to focus on using their illicit T-Mobile access to steal source code.
A screenshot taken by LAPSUS$ inside T-Mobile’s source code repository at Bitbucket.
Perhaps to mollify his furious teammates, White changed the subject and told them he’d gained access to T-Mobile’s Slack and Bitbucket accounts. He said he’d figured out how to upload files to the virtual machine he had access to at T-Mobile.
Roughly 12 hours later, White posts a screenshot in their private chat showing his automated script had downloaded more than 30,000 source code repositories from T-Mobile.
White showing a screenshot of a script that he said downloaded all available T-Mobile source code.
In response to questions from KrebsOnSecurity, T-Mobile issued the following statement:
“Several weeks ago, our monitoring tools detected a bad actor using stolen credentials to access internal systems that house operational tools software. The systems accessed contained no customer or government information or other similarly sensitive information, and we have no evidence that the intruder was able to obtain anything of value. Our systems and processes worked as designed, the intrusion was rapidly shut down and closed off, and the compromised credentials used were rendered obsolete.”
It is not clear why LAPSUS$ was so fixated on stealing source code. Perhaps LAPSUS$ thought they could find in the source clues about security weaknesses that could be used to further hack these companies and their customers. Maybe the group already had buyers lined up for specific source code that they were then hired to procure. Or maybe it was all one big Capture the Flag competition, with source code being the flag. The leaked chats don’t exactly explain this fixation.
But it seems likely that the group routinely tried to steal and then delete any source code it could find on victim systems. That way, it could turn around and demand a payment to restore the deleted data.
In one conversation in late March, a LAPSUS$ member posts screenshots and other data indicating they’d gained remote administrative access to a multi-billion dollar company. But White is seemingly unimpressed, dismissing the illicit access as not worth the group’s time because there was no source code to be had.
LAPSUS$ first surfaced in December 2021, when it hacked into Brazil’s Ministry of Health and deleted more than 50 terabytes of data stored on the ministry’s hacked servers. The deleted data included information related to the ministry’s efforts to track and fight the COVID-19 pandemic in Brazil, which has suffered a disproportionate 13 percent of the world’s COVID-19 fatalities. LAPSUS$’s next 15 victims were based either in Latin America or Portugal, according to cyber threat intelligence firm Flashpoint.
By February 2022, LAPSUS$ had pivoted to targeting high-tech firms based in the United States. On Feb. 26, LAPSUS$ broke into graphics and computing chip maker NVIDIA. The group said it stole more than a terabyte of NVIDIA data, including source code and employee credentials.
Dan Goodin at Ars Technica wrote about LAPSUS$’s unusual extortion demand against NVIDIA: The group pledged to publish the stolen code unless NVIDIA agreed to make the drivers for its video cards open-source. According to these chats, NVIDIA responded by connecting to the computer the attackers were using, and then encrypting the stolen data.
Like many high-tech firms whose value is closely tied to their intellectual property, NVIDIA relies on a number of technologies designed to prevent data leaks or theft. According to LAPSUS$, among those is a requirement that only devices which have been approved or issued by the company can be used to access its virtual private network (VPN).
These so-called Mobile Device Management (MDM) systems retrieve information about the underlying hardware and software powering the system requesting access, and then relay that information along with any login credentials.
In a typical MDM setup, a company will issue employees a laptop or smartphone that has been pre-programmed with a data profile, VPN and other software that allows the employer to track, monitor, troubleshoot or even wipe device data in the event of theft, loss, or a detected breach.
MDM tools also can be used to encrypt or retrieve data from connected systems, and this was purportedly the functionality NVIDIA used to claw back the information stolen by LAPSUS$.
“Access to NVIDIA employee VPN requires the PC to be enrolled in MDM,” LAPSUS$ wrote in a post on their public Telegram channel. “With this they were able to connect to a [virtual machine] that we use. Yes, they successfully encrypted the data. However, we have a backup and it’s safe from scum!!!”
NVIDIA declined to comment for this story.
On March 7, consumer electronics giant Samsung confirmed what LAPSUS$ had bragged on its Telegram channel: That the group had stolen and leaked nearly 200 GB of source code and other internal company data.
The chats reveal that LAPSUS$ stole a great deal more source code than they bragged about online. One of White’s curious fascinations was SASCAR, Brazil’s leading fleet management and freight security company. White had bought and talked his way into SASCAR’s systems, and had stolen many gigabytes worth of source code for the company’s fleet tracking software.
It was bad enough that LAPSUS$ had just relieved this company of valuable intellectual property: The chats show that for several days White taunted SASCAR employees who were responding to the then-unfolding breach, at first by defacing the company’s website with porn.
The messages show White maintained access to the company’s internal systems for at least 24 hours after that, even sitting in on the company’s incident response communications where the security team discussed how to evict their tormentors.
SASCAR is owned by tire industry giant Michelin, which did not respond to requests for comment.
The leaked LAPSUS$ internal chats show the group spent a great deal of time trying to bypass multi-factor authentication for the credentials they’d stolen. By the time these leaked chat logs were recorded, LAPSUS$ had spent days relentlessly picking on another target that relied on MDM to restrict employee logins: Iqor, a customer support outsourcing company based in St. Petersburg, Fla.
LAPSUS$ apparently had no trouble using Russian Market to purchase access to Iqor employee systems. “I will buy login when on sale, Russians stock it every 3-4 days,” Amtrak wrote regarding Iqor credentials for sale in the bot shops.
The real trouble for LAPSUS$ came when the group tried to evade Iqor’s MDM systems by social engineering Iqor employees into removing multi-factor authentication on Iqor accounts they’d purchased previously. The chats show that time and again Iqor’s employees simply refused requests to modify multi-factor authentication settings on the targeted accounts, or make any changes unless the requests were coming from authorized devices.
One of several IQOR support engineers who told LAPSUS$ no over and over again.
After many days of trying, LAPSUS$ ultimately gave up on Iqor. On Mar. 22, LAPSUS$ announced it hacked Microsoft, and began leaking 37 gigabytes worth of Microsoft source code.
Like NVIDIA, Microsoft was able to stanch some of the bleeding, cutting off LAPSUS$’s illicit access while the group was in the process of downloading all of the available source code repositories alphabetically (the group publicized their access to Microsoft at the same time they were downloading the software giant’s source code). As a result, LAPSUS$ was only able to leak the source for Microsoft products at the beginning of the code repository, including Azure, Bing and Cortana.
LAPSUS$ leader White drew attention to himself prior to the creation of LAPSUS$ last year when he purchased a website called Doxbin, a long-running and highly toxic online community that is used to “dox” or post deeply personal information on people.
Based on the feedback posted by Doxbin members, White was not a particularly attentive administrator. Longtime members soon took to harassing him about various components of the site falling into disrepair. That pestering eventually prompted White to sell Doxbin back to its previous owner at a considerable loss. But before doing so, White leaked the Doxbin user database.
White’s leak triggered a swift counterpunch from Doxbin’s staff, which naturally responded by posting on White perhaps the most thorough dox the forum had ever produced — including videos filmed just outside his home where he lives with his parents in the United Kingdom.
The past and current owner of the Doxbin — an established cybercriminal who goes by the handle “KT” — is the same person who leaked these private LAPSUS$ Telegram chat logs to KrebsOnSecurity.
In early April, multiple news outlets reported that U.K. police had arrested seven people aged 15-21 in connection with the LAPSUS$ investigation. But it seems clear from reading these leaked Telegram chats that individual members of LAPSUS$ were detained and questioned at different times over the course of several months.
In his chats with other LAPSUS$ members during the last week in March, White maintained that he was arrested 1-2 months prior in connection with an intrusion against a victim referred to only by the initials “BT.” White also appeared unconcerned when Amtrak admits that the City of London police found LAPSUS$ Telegram chat conversations on his mobile phone.
Perhaps to demonstrate his indifference (or maybe just to screw with Amtrak), White responds by leaking Amtrak’s real name and phone number to the group’s public Telegram channel. In an ALL CAPS invective of disbelief at the sudden betrayal, Amtrak relates how various people started calling their home and threatening their parents as a result, and how White effectively outed them to law enforcement and the rest of the world as a LAPSUS$ member.
The vast majority of noteworthy activity documented in these private chats takes place between White and Amtrak, but it doesn’t seem that White counted Amtrak or any of his fellow LAPSUS$ members as friends or confidants. On the contrary, White generally behaved horribly toward everyone in the group, and he particularly seemed to enjoy abusing Amtrak (who somehow always came back for more).
“Mox,” one of the LAPSUS$ members who shows up throughout these leaked chats, helped the group in their unsuccessful attempts to enroll their mobile devices with an airline in the Middle East to which they had purchased access. Audio recordings leaked from the group’s private Telegram channel include a call wherein Mox can be heard speaking fluently in Arabic and impersonating an airline employee.
At one point, Mox’s first name briefly shows up in a video he made and shared with the group, and Mox mentions that he lives in the United States. White then begins trying to find and leak Mox’s real-life identity.
When Mox declares he’s so scared he wants to delete his iCloud account, White suggests he can get Mox’s real name, precise location and other information by making a fraudulent “emergency data request” (EDR) to Apple, in which they use a hacked police department email account to request emergency access to subscriber information under the claim that the request can’t wait for a warrant because someone’s life is on the line.
White was no stranger to fake EDRs. White was a founding member of a cybercriminal group called “Recursion Team,” which existed between 2020 and 2021. This group mostly specialized in SIM swapping targets of interest and participating in “swatting” attacks, wherein fake bomb threats, hostage situations and other violent scenarios are phoned in to police as part of a scheme to trick them into visiting potentially deadly force on a target’s address.
The roster of the now-defunct “Infinity Recursion” hacking team, from which some members of LAPSUS$ hail.
The Recursion Team was founded by a then 14-year-old from the United Kingdom who used the handle “Everlynn.” On April 5, 2021, Everlynn posted a new sales thread to the cybercrime forum cracked[.]to titled, “Warrant/subpoena service (get law enforcement data from any service).” The price: $100 to $250 per request.
Everlynn advertising a warrant/subpoena service based on fake EDRs.
Bringing this full circle, it appears Amtrak/Asyntax is the same person as Everlynn. As part of the Recursion Team, White used the alias “Peter.” Several LAPSUS$ members quizzed White and Amtrak about whether authorities asked about Recursion Team during questioning. In several discussion threads, White’s “Lapsus Jobs” alias on Telegram answers “yes?” or “I’m here” when another member addresses him by Peter.
White dismissed his public doxing of both Amtrak and Mox as their fault for being sloppy with operational security, or by claiming that everyone already knew their real identities. Incredibly, just a few minutes after doxing Amtrak, White nonchalantly asks them for help in stealing source code from yet another victim firm — as if nothing had just happened between them. Amtrak seems soothed by this invitation, and agrees to help.
On Mar. 30, software consultancy giant Globant was forced to acknowledge a hack after LAPSUS$ published 70 gigabytes of data stolen from the company, including customers’ source code. While the Globant hack has been widely reported for weeks, the cause of the breach remained hidden in these chat logs: A stolen five-year-old access token for Globant’s network that still worked.
LAPSUS$ members marvel at a 5-year-old stolen authentication cookie still working when they use it against Globant to steal source code.
Globant lists a number of high-profile customers on its website, including the U.K. Metropolitan Police, software house Autodesk and gaming giant Electronic Arts. In March, KrebsOnSecurity showed how White was connected to the theft of 780 GB worth of source code from Electronic Arts last summer.
In that attack, the intruders reportedly gained access to EA’s data after purchasing authentication cookies for an EA Slack channel from the dark web marketplace “Genesis,” which offers more or less the same wares as the Russian Market.
One remarkable aspect of LAPSUS$ was that its members apparently decided not to personally download or store any data they stole from companies they hacked. They were all so paranoid of police raiding their homes that they assiduously kept everything “in the cloud.” That way, when investigators searched their devices, they would find no traces of the stolen information.
But this strategy ultimately backfired: Shortly before the private LAPSUS$ chat was terminated, the group learned it had just lost access to the Amazon AWS server it was using to store months of source code booty and other stolen data.
“RIP FBI seized my server,” Amtrak wrote. “So much illegal shit. It’s filled with illegal shit.”
White shrugs it off with the dismissive comment, “U can’t do anything about ur server seized.” Then Amtrak replies that they never made a backup of the server.
“FFS, THAT AWS HAD TMO SRC [T-Mobile source] code!” White yelled back.
The two then make a mad scramble to hack back into T-Mobile and re-download the stolen source code. But that effort ultimately failed after T-Mobile’s systems revoked the access token they were using to raid the company’s source code stash.
“How they noticed?” Amtrak asked White.
“Gitlab auto-revoked, likely,” White replied. “Cloning 30k repos four times in 24 hours isn’t very normal.”
Ah, the irony of a criminal hacking group that specializes in stealing and deleting data having their stolen data deleted.
It’s remarkable how often LAPSUS$ was able to pay a few dollars to buy access to some hacked machine at a company they wanted to break into, and then successfully parlay that into the theft of source code and other sensitive information.
What’s even more remarkable is that anyone can access dark web bot shops like Russian Market and Genesis, which means larger companies probably should be paying someone to regularly scrape these criminal bot services, even buying back their own employee credentials to take those vulnerable systems off the market. Because that’s probably the simplest and cheapest incident response money can buy.
The Genesis bot shop.
This entry was posted on Friday 22nd of April 2022 09:09 AM
Great informative article
My mind is boggled all up. Can I say disorganized teenage monsters?
My mind is appropriately boggled. Can I say immature disorganized teenagers?
These kids are quite the geniuses….
Ahhh kids these days
Would someone within this community of professionals and hangers-on please address the elrphantine and room-occupying “why”?
Why and WTF anyway?
Why…. do…. this??
Just to be the unhelpful malevolent jerk on the crew?
The main kid White has autism and the others might too or are probably socially awkward. Besides sloppy hacking they are useless as human beings. Just look at the texts, barely know how to communicate with each other.
This attitude is probably why they did it.
Exactly, why not engage them, redirecting these skills and hire them for system’s security? Never understand those who wish to dismiss others.
It’s a common myth that young hackers, even very smart ones, can or should be hired as white hats. It just doesn’t happen in the real world.
Innate talent is one thing, but aptitude is another. It’s not that much of a chore to train and educate people, that companies NEED to hire people who had talent as teenagers.
And WAY more important than cyber ability, is trustworthiness. I don’t care how good some kid is,… If they show any tendency for criminal behavior, they’re not getting a job at a good company. Certainly not a clearance to work on anything important.
Bribery and insider threat risks are bigger than the benefit of getting a smarter employee.
The FBI hires hackers and criminals all the time
Nope. That’s the myth.
It plays into their wishful thinking.
You impersonated here and lied about it.
Wishful thinking blathered ad nauseam.
City of London is the most expensive region in England.
I wonder if the guy arrested there has douchey parents who taught by example the entitled ways of people driven by primitive hollow desires for money and power above all else.
He might be like a scion of Beverly Hills running a worldwide extortion racket from the east wing of his parent’s seldom used third guest house.
City of London is like Wall St in New York — lots of banks and financial companies, almost nobody lives there. The City of London police were likely involved because a target had an office in the City, not because the kid lived there.
City of London Police lead on economic and cyber crime for the whole of the UK, it doesn’t reflect where the alleged perpetrators live.
I like how they thwart Nvidia’s hack back by backing up. Pretty good stuff from some angry teenagers.
> against a victim referred to only by the initials “BT.”
British Telecommunications..?
Check out the big brain on Brad.
> even buying back their own employee credentials to take those vulnerable systems off the market
Had to think about this one: to clarify – they would be buying a list of compromised access methods so that those paths can be revoked or re-secured.
I’m not too savvy, buuuut… Isn’t this like (in the pre-digital era) buying a *print* of an extortion photograph, rather than the actual negative? (Although negatives *could* be copied – maybe that’s just a Hollywood trope – but you get the idea.)
Similar, but a better comparison would be a picture of some unsecure area of their compound. The idea is that by gaining access to the information they can use the information to secure those access points. For instance if the data contains leaked authentication data, that data can be revoked or changed. Or if the data contains information about software vulnerabilities, hopefully those can be patched before anyone makes use of them. I don’t know how effective that strategy would be though. Seems like a smart hacker wouldn’t post the original access but just the other stuff they glean. That way if a company does download the data, they only patch the extra stuff the hacker found and not the crown jewel.
Pretty intense article here…kudos for Tmobile shutting the op down when they tried again but they have been targeted so much i am am still wondering what their net admin/Incident response people are doing all day. And they didnt disclose the unauthorized access to atlas…did they really miss it happening??
4/21/2022 my SIM card on my T-Mobile iPhone was cloned and all my crypto account passwords were reset using sms and I was locked out. I lost thousands of dollars and frankly I’m paranoid at this point. Considering going to the press with the truth that T-Mobile is hiding.
yesterday I spent 2 hours on the phone with ATT, Verizon, and T Mobile trying to set up a simple phone plan with recurring payments, all three failed miserably for unique reasons, im not too surprised at your comment. Amazing what a multi billion dollar company can’t do.
All while you’re on hold, constantly hearing “Your security is our top priority” from a robotic voice.
No one should be doing anything with their crypto on a f’ing cellphone. There’s so many security holes and vulnerabilities, you’re just asking to get it taken.
Edvin, me too! I called T-Mobile and they didnt even bother to send me a new SIM Card. My robinhood and Uphold account was drained! We should ban together! We should have been made aware of this breach!!
Wow! Great article, Brian. And just to think these were just basically script kiddies. Just imagine what the GRU or Mossad could do…
From some of the comments above one supposes that some of the commentors were never teenagers themselves.
Meaning what? It’s ok?
@Steve
Meaning what exactly? That it’s all ok?
Basically, yes. Civilized countries have a separate juvenile justice system in which those under 18 don’t receive much punishment.
POV : you’re a Fortune 500 company pwn’d by a group of teenagers
hahaha
I think it is the most amazing read I had in months. Our information is completely exposed and simple social engineering can overcome multi defenses when determined teenagers test them. Kerbs On Security is really great and unique. There is no other source that let you realize how data security works and fails in the real world.
I agree! Brian is doing an amazing job!
There have been many mentions of “source code” being downloaded. What do they intend to do with it.
Is this the actual C/C++/whatever code? Outside of an operating system, that is probably some of the most convoluted code ever created and modified to support(?) a vast telecommunications company. Would they even be able to compile it, let along run a copy of it. There would have to be an immense requirement of servers, network interconnections, etc. I doubt that even the engineers who attempt to maintain this collection of equipment could list all the equipment needed, not withstanding the various admin/user names and passwords and the attendant permissions.
Are they smart enough to read and understand the code to attempt to locate holes in the system?
One of their demands on NVidea was that they open source GPU drivers. Lots of hacker types feel that all code should be open source as a matter of principle.
Benedict Thompson, Southampton UK hacker
Ben Thompson
Oliver Read
Yep. University of Warwick, not their finest moment
Don’t forget that important bits of the human “higher” brain doesn’t finish axonal myelination until a kid is in his mid-20’s. That means, basically, that the frontal cortex (including the all-important Prefrontal) is basically *offline* until then! The frontal cortex is the main way that the brain tells the individual that, “they should do the better (but harder) thing” – not *requires* this of the individual, but ony *suggests* the better thing. These kids don’t even have that in their thought process. But, of course, there are also the families, which can be hugely destructive toward children. (e.g., Sapolsky [2005])
Spend less time setting up your router, and more time surfing, streaming and gaming. Get Set Up in 5 Easy Steps. Belkin router easy setup in 3 easy steps. visit http://setupbelkinrange.com
I appreciate the information and advice you have shared.
Awesome work Brian!
Any chance it’s possible to have a copy of the chats / you can release them to the public?
Comments are closed.
Mailing List
Search KrebsOnSecurity
Recent Posts
Spam Nation
A New York Times Bestseller!
Thinking of a Cybersecurity Career?
Read this.
All About Skimmers
Click image for my skimmer series.
Story Categories
The Value of a Hacked PC
Badguy uses for your PC
Badguy Uses for Your Email
Your email account may be worth far more than you imagine.
Most Popular Posts
Why So Many Top Hackers Hail from Russia
Category: Web Fraud 2.0
Innovations from the Underground
ID Protection Services Examined
Is Antivirus Dead?
The reasons for its decline
The Growing Tax Fraud Menace
File ’em Before the Bad Guys Can
Inside a Carding Shop
A crash course in carding.
Beware Social Security Fraud
Sign up, or Be Signed Up!
How Was Your Card Stolen?
Finding out is not so easy.
Krebs’s 3 Rules…
…For Online Safety.
source
—
Note that any programming tips and code writing requires some knowledge of computer programming. Please, be careful if you do not know what you are doing…