www.vice.com
Open in
urlscan Pro
151.101.1.132
Public Scan
Submitted URL: http://www.vice.com/en/article/dy7yyy/my-cash-app-hacked-hackers-stealing-money
Effective URL: https://www.vice.com/en/article/dy7yyy/my-cash-app-hacked-hackers-stealing-money
Submission Tags: falconsandbox
Submission: On September 02 via api from US — Scanned from DE
Effective URL: https://www.vice.com/en/article/dy7yyy/my-cash-app-hacked-hackers-stealing-money
Submission Tags: falconsandbox
Submission: On September 02 via api from US — Scanned from DE
Form analysis
2 forms found in the DOM<form><label class="sr-only" for="search-bar__input">Input for searching articles, videos, shows</label><input type="text" id="search-bar__input" role="searchbox" value="" placeholder="Search articles, videos, shows" required=""><button type="submit"
role="button" aria-label="Search" class="nav-bar__search-bar__button"><svg width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg">
<path fill-rule="evenodd" clip-rule="evenodd"
d="M6.55892 10.7328C8.86408 10.7328 10.7328 8.86408 10.7328 6.55892C10.7328 4.25376 8.86408 2.38506 6.55892 2.38506C4.25376 2.38506 2.38506 4.25376 2.38506 6.55892C2.38506 8.86408 4.25376 10.7328 6.55892 10.7328ZM6.55892 13.1178C10.1813 13.1178 13.1178 10.1813 13.1178 6.55892C13.1178 2.93653 10.1813 0 6.55892 0C2.93653 0 0 2.93653 0 6.55892C0 10.1813 2.93653 13.1178 6.55892 13.1178Z"
fill="white"></path>
<path fill-rule="evenodd" clip-rule="evenodd" d="M14.5219 15.9015C14.3906 16.0328 14.1777 16.0328 14.0464 15.9015L9.18249 11.0376L11.0376 9.18249L15.9015 14.0464C16.0328 14.1777 16.0328 14.3906 15.9015 14.5219L14.5219 15.9015Z" fill="white">
</path>
</svg></button></form>
<form class="user-newsletter__form" novalidate="">
<div class="user-newsletter__form__wrap"><input type="email" name="email" id="email" class="user-newsletter__form__input" value="" placeholder="Your email address"><label class="user-newsletter__form__label" for="email">Your Email:</label> </div>
<button aria-label="newsletter submit button" type="submit" class="vice-button vice-button--black user-newsletter__submit">Subscribe</button>
</form>
Text Content
Advertisement Sign InCreate Account + English VICE * Video * TV * News * Tech * Rec Room * Food * World News * The 8:46 Project * Games * Music * Health * Money * Drugs * Identity * Entertainment * Environment * Travel * Horoscopes * Sex * VICE Magazine * The Gender Spectrum Collection VICE * * * Sign InCreate Account * Video * TV * Podcasts * Apps * VICE Voices * Newsletters * Rec Room Input for searching articles, videos, shows * * * * * * * * News * Tech * Rec Room * Food * World News * The 8:46 Project * Games * Music * Health * Money * Drugs * Identity * Entertainment * Environment * Travel * Horoscopes * Sex * VICE Magazine * The Gender Spectrum Collection * About * Jobs * Partner * VICE Voices * Content Funding on VICE * Security Policy * Privacy & Terms * Accessibility Statement * Do Not Sell My Info © 2022 VICE MEDIA GROUP HACKERS ARE BREAKING INTO AND EMPTYING CASH APP ACCOUNTS Multiple users of the hugely popular Cash App have reported hackers stealing their funds, and fraudsters are selling access to accounts on the dark web. by Joseph Cox August 24, 2022, 1:49pm * Share * Tweet * Snap Image: NurPhoto/Contributor Hacking. Disinformation. Surveillance. CYBER is Motherboard's podcast and reporting on the dark underbelly of the internet. See More → Hackers are breaking into unsuspecting victims’ Cash App accounts, a massively popular payment app, and stealing hundreds of dollars, according to victims Motherboard spoke to. In one person’s case, they said, Cash App has not reimbursed them for the stolen funds. “It’s scary!” Liz Shelby, who said their son was a victim of the hacking, told Motherboard in an online chat. “My son saved up some cash for a small vacation with his grandma. We put it in his Cash App before he left. He called me on Aug. 9, and told me that his money was gone.” Shelby said that after she looked at the account she found that someone else had logged into it and sent themselves the money. Shelby said she’s been emailing Cash App support, without success. Advertisement “I’m not getting anywhere and I’m sure my son will never get his money back,” she added. > Do you know anything else about Cash App, Venmo, or similar fraud? We'd love > to hear from you. Using a non-work phone or computer, you can contact Joseph > Cox securely on Signal on +44 20 8133 5190, Wickr on josephcox, or > email joseph.cox@vice.com. Cash App is one of the most popular payment services apps, with over 50 million downloads from the Google Play Store. Cash App also gained some infamy for large scale cash giveaways on social media. The app is owned by payment services company Block, which was formerly known as Square. Jack Dorsey runs the company. Marvis Herring, another target, told Motherboard that hackers attempted to steal $1,400, in the form of two installments of $700. In those cases, Herring believes his bank blocked the fraudulent transactions. Motherboard saw many other people reporting on social media that their Cash App accounts had been compromised in some way. Sign up for Motherboard’s daily newsletter for a regular dose of our original reporting, plus behind-the-scenes content about our biggest stories. “The main thing I thought was weird is that I went to change my account password and there really isn't a password for Cash App accounts,” Herring added. When users sign up to Cash App, they can use either an email address or a phone number to open an account. After doing so, they receive a login code sent to either of those. Advertisement On fraud websites, dark web marketplaces, and social media, multiple people appear to be selling login details associated with Cash App accounts. Some of these peoples’ listings specify that the logs contain the email address and password for a linked email account. Some of the listings may be scams, but those on the dark web marketplaces come from fraudsters who have received positive feedback from alleged customers, according to the review system that is common on such sites. One listing for hacked Cash App accounts said the vendor has sold that specific item multiple times. “Our Cashapp accounts are of the highest quality and we provide them at the most competitive prices on the market today,” one listing reads. “Full Information Presented Recently Compromised.” The listing says that buyers get the hacked login credentials, the victim’s cookie file, and information such as what IP address the victim used. This sort of information can be useful to fraudsters to trick sites or apps into letting them log in as the user. A screenshot of one of the Cash App account listings. Image: Motherboard. The listing claimed that the hacked Cash App accounts can include between $1,000 and $5,000 in available balance. It is common for members of the fraud ecosystem to fulfill different roles. Some focus on sourcing hacked accounts and then selling them, while others work on effectively cashing them out. On its website, Cash App encourages users to make sure their linked email address has two-factor authentication enabled. The app also has an extra feature called Security Lock which means that each transfer requires the user to enter a PIN. “Preventing fraud is critically important to Cash App. We continue to invest in and bolster fraud-fighting resources by both increasing staffing and adopting new technology. We are constantly improving systems and controls to help prevent, detect, and report bad activity on the platform,” a Cash App spokesperson told Motherboard in a statement. “For those who believe they have fallen victim to an identity-theft or account take-over scams, we encourage them to reach out to Cash App Support where we will review the account in question. If deemed fraudulent, we will take the necessary action starting with account closure and disablement of all applicable products.” Fraudsters also appear to be offering Cash App accounts for another purpose: laundering money. Motherboard found multiple listings on a dark web marketplace offering these newly created and verified accounts. Cash App requires users to verify their identity to use some features, and this can require them providing their Social Security Number with the platform. These already verified accounts will allow fraudsters to buy Bitcoin through the Cash App without having to verify their identity, the listing suggests. Subscribe to our cybersecurity podcast, CYBER. Subscribe to our new Twitch channel. Tagged:BitcoinFraudHackingprivacyhackersblock ORIGINAL REPORTING ON EVERYTHING THAT MATTERS IN YOUR INBOX. Your Email: Subscribe By signing up, you agree to the Terms of Use and Privacy Policy & to receive electronic communications from Vice Media Group, which may include marketing promotions, advertisements and sponsored content. MORE LIKE THIS * Tech HACKER STEALS DATABASE OF HUNDREDS OF VERIZON EMPLOYEES The database contains information that could be used in social engineering and SIM swapping attacks. Lorenzo Franceschi-Bicchierai 05.26.22 * Tech LAW ENFORCEMENT SEIZES RAIDFORUMS, ONE OF THE MOST IMPORTANT HACKING SITES RaidForums started as a very low-level dumping ground for hackers. Over the years it morphed into the nexus for plenty of high profile breaches. Joseph Cox 04.12.22 * Tech BEEF ALERT: RANSOMWARE GROUP VERY MAD AT BEING ASSOCIATED WITH LAVISH RUSSIAN HACKERS Mandiant published a report alleging that infamous hackers Evil Corp had started using the LockBit ransomware to avoid sanctions. LockBit is now very mad. Joseph Cox 06.07.22 * Tech OVER 40 MEMBERS OF CONGRESS URGE GOOGLE TO LIMIT LOCATION DATA COLLECTION FOR A POST-ROE AMERICA Google regularly gives law enforcement agencies access to swaths of location data. Lawmakers now want Google to curtail that data collection to stop it landing in the hands of right-wing prosecutors. Joseph Cox 05.24.22 * Tech DOJ ANNOUNCES IT WON’T PROSECUTE WHITE HAT SECURITY RESEARCHERS The new policy addresses decades of uncertainty around the law and security research. Joseph Cox 05.19.22 Advertisement YOUMAY LIKE Ein Windows-Trick, den jeder kennen sollte (jetzt ausprobieren) Advertisement: Security Savers Online Dieses Spiel ist so schön. Wenn Sie einen Computer haben, ist es ein Muss. Advertisement: Raid: Shadow Legends [Fotos] 11 Dinge, die Flugbegleiter bei den Gästen sofort bemerken Advertisement: Die-auto-seite.de We Will Guess Your Education Level in 20 Questions Advertisement: Parentsdome Galleries Christian Lindner: Sie war seine 1. Ehefrau! Advertisement: See and So Die besten Wanderschuhe für Männer, die man ohne Beschwerden tragen kann Advertisement: Wmshoe Schuhe Vor 1987 geboren? Sie haben Anspruch auf diesen Krankenhaus-Trick Advertisement: Pro Verbraucher 1949-1982 geboren? Sie haben Anspruch auf diesen Bestattungsschutz Advertisement: Pro Verbraucher MORE FROM VICE * Tech AUTHENTICATION GIANT OKTA BREACHED THROUGH CUSTOMER SUPPORT The compromise shows an often vulnerable side of companies, even cybersecurity firms. Joseph Cox 03.22.22 * Tech MICROSOFT INVESTIGATING CLAIM OF BREACH BY EXTORTION GANG The LAPSUS$ group has previously compromised Nvidia and Samsung. Over the weekend the group published a screenshot that appeared to show access to internal Microsoft systems. Joseph Cox 03.21.22 * Tech MICROSOFT EMPLOYEES EXPOSED OWN COMPANY’S INTERNAL LOGINS A cybersecurity firm found that Microsoft workers uploaded sensitive login credentials to Microsoft's own systems to GitHub. Joseph Cox 08.16.22 * Tech LAPSUS$: HOW A SLOPPY EXTORTION GANG BECAME ONE OF THE MOST PROLIFIC HACKING GROUPS The U.S. government has said it is paying close attention to LAPSUS$, the group that breached Okta, Microsoft, and Nvidia. The answers for the group's motivations are hiding in plain sight. Joseph Cox 03.24.22 * Tech LIVESTREAMING PLATFORM YUBO COLLABORATING WITH LAW ENFORCEMENT ON TEXAS SHOOTING The mass shooter met a girl from Germany on the app. He later told her about his plans over text shortly before entering the school. Joseph Cox 05.27.22 * Tech T-MOBILE SECRETLY BOUGHT ITS CUSTOMER DATA FROM HACKERS TO STOP LEAK. IT FAILED. After hackers targeted T-Mobile in August, T-Mobile hired a third-party firm that went undercover and bought exclusive access to the data. Joseph Cox 04.12.22 Advertisement * About * Jobs * Partner * VICE Voices * Content Funding on VICE * Security Policy * Privacy & Terms * Accessibility Statement * Do Not Sell My Info © 2022 VICE MEDIA GROUP