Verizon PTT Service Reportedly Hacked

Threat Actor: @cyberphant0m | @cyberphant0m
Victim: Verizon | Verizon
Price: $200,000
Exfiltrated Data Type: Sensitive data including API credentials, personal information, server logs

Key Points :

  • The threat actor claims to have fully compromised Verizon’s Push-to-Talk (PTT) service.
  • A total of 328GB of data is allegedly available for sale.
  • The data includes API access credentials, F5 credentials, and PTT call logs with personal information.
  • Additional data includes IMSIs, SIM keys, SIM numbers, and extensive server logs.
  • The actor is reportedly offering potential buyers to contact them via Telegram.

A recent post on a dark web forum has raised alarms, with a threat actor alleging a breach of Verizon’s Push-to-Talk (PTT) service. The actor, using the pseudonym “@cyberphant0m,” claims to have fully compromised Verizon’s PTT platform, offering a trove of sensitive data for sale at a staggering price of $200,000.

According to the post, the breach allegedly encompasses a massive 328GB of data. The information supposedly includes API access credentials, multiple F5 credentials, PTT call logs containing personal information such as phone numbers, emails, and addresses, as well as IMSIs, SIM keys, and SIM numbers. The threat actor further claims to have access to server logs, over 400 local host machine logs, and full SQL administrative access, which reportedly contains credentials and extensive logs.

While these claims remain unverified, the threat actor appears to be offering potential buyers the opportunity to contact them through Telegram.

The post Verizon PTT Service Allegedly Breached appeared first on Daily Dark Web.