AT&T customers targeted in $2m scam which was used to fund terrorist group linked to Mumbai attacks, says FBI

Police in the Philippines working with the US Federal Bureau of Investigation have arrested four people over a premium-line phone scam that targeted customers of the American telecommunications giant AT&T to funnel money to a Saudi-based militant group.

The four arrested last Wednesday in Manila were paid by the same group that the FBI accuses of having funded the November 2008 attacks in Mumbai, the Philippines' Criminal Investigation and Detection Group (CIDG) said.

The hacking activity resulted in AT&T incurring almost $2m (£1.3) in losses, the CIDG said.

The Philippines police said money from the scams was diverted to accounts of a Saudi-based group that was not identified. India blames Pakistan-based Lashkar-e-Taiba for carrying out the attacks in Mumbai that killed 166 people.

FBI spokeswoman Jenny Shearer said hackers targeted customers of AT&T, not the carrier itself.

Though the FBI declined to give official details of how the group took the money, one person familiar with the situation said that the hackers broke into the phone systems of some AT&T customers and made calls to international premium-rate services whose payments would be diverted.

Such scams are relatively common, often involving bogus premium-service phone lines set up across Eastern Europe, Africa and Asia. Fraudsters make calls to the numbers from hacked business phone systems or mobile phones, then collect their cash and move on before the activity is identified. Telecommunications carriers often end up footing the bill for the charges.

Jan Rasmussen, a spokeswoman for AT&T, said it wrote off some fraudulent charges that appeared on customer bills. She declined to elaborate or comment on the $2m figure.

Earlier last week, AT&T said it was investigating an attempt to access customer information but did not believe any accounts had been breached.

The CIDG said the FBI sought the help of its Anti-Transnational and Cyber Crime Division (ATCCD) in March after it found the Saudi-based group had targeted AT&T using the hackers.

Among the four people arrested was Paul Michael Kwan, 29, whom ATCCD chief Police Senior Superintendent Gilbert Sosa said had been arrested in 2007 after the FBI began an international crackdown on groups suspected of financing militant activities.

Sosa said the Filipinos were being paid by a group originally run by Muhammad Zamir, a Pakistani arrested in Italy in 2007. He said Zamir was a member of Jemaah Islamiah, a Southeast Asian militant network with links to al Qaeda.

"Zamir's group, later tagged by the FBI to be the financial source of the terrorist attack in Mumbai, India, on November 26, 2008, is also the same group that paid Kwan's group of hackers in Manila," Sosa said in the statement.

Last month, Philippine police said weak laws against cybercrime and poor technical capabilities had made the country an attractive base for organised crime syndicates involved in cyber pornography, cyber sex dens, illegal gambling, credit card fraud and identity theft.

One of the biggest worms to affect Windows computers, called "Love Bug", is believed to have been written by a Philippines resident, who despite being identified was never prosecuted because there were then no laws against unleashing the harmful code.