
Originally Posted by
PositiveVariance
As far as the verification email to verify the new device being used - After the players realized their accounts had been drained, was the verification email still in their inbox as "new mail"? Or is there a way for the player to retroactively see if the link was clicked?
It wouldn't be to much of a stretch to assume these people also used the same password for their email account as they used for their ACR account since they used it for at least 2 other accounts, assuming a CSA Attack was used.
A side note - You would think modern technology would prevent blasting email and password combinations to a site, even if they used multiple devices. Strange.
As far as the small 3 digit withdrawal, it's possible they came across accounts that had low to no balances during their process and made a list of accounts that were active with regular activity and repeatedly logged into these accounts throughout the day knowing some will eventually get a deposit. When the account had $68 they may have figured it wasn't worth a withdrawal to expose the hack knowing it would eventually get a deposit. Once the player deposited $267, they may have realized that's as good as it would get. It could be a 3rd world country where they are paying someone $20/day to repeatedly log into a list of previously accessed accounts that had were hacked but had low to no balances - They continuously login until they get one where someone made a deposit. Just a theory.
Also, I think there could be a half truth to ACR's explanation that maybe they did have an outside party that accessed accounts with the emails and passwords, then at some point recruited a rogue employee to seam things together. They can "recruit" dishonest employees off sites such as LinkedIn, probably wouldn't take long to find someone that would work with you.
But yeah, overall there is suspicion about ACR's explanation of it being a "Credential Stuffing Attack". Seems like the easiest way to deflect blame.