Saturday, March 15, 2025
HomeCyber Security News5 Hackers Charged for Attacking Companies via Phishing Text Messages

5 Hackers Charged for Attacking Companies via Phishing Text Messages

Published on

SIEM as a Service

Follow Us on Google News

Federal authorities have unsealed charges against five individuals accused of orchestrating sophisticated phishing schemes that targeted employees of companies across the United States.

The alleged hackers reportedly stole confidential company data and millions of dollars in cryptocurrency by exploiting stolen employee credentials.

The defendants, ranging in age from 20 to 25, are accused of conspiracy to commit wire fraud, conspiracy, and aggravated identity theft. The individuals charged are:

  • Ahmed Hossam Eldin Elbadawy, 23, a.k.a. “AD,” of College Station, Texas
  • Noah Michael Urban, 20, a.k.a. “Sosa” and “Elijah,” of Palm Coast, Florida
  • Evans Onyeaka Osiebo, 20, of Dallas, Texas
  • Joel Martin Evans, 25, a.k.a. “joeleoli,” of Jacksonville, North Carolina
  • Tyler Robert Buchanan, 22, of the United Kingdom

Maximizing Cybersecurity ROI: Expert Tips for SME & MSP Leaders – Attend Free Webinar

According to the USA Justice Govt Report, from September 2021 through April 2023, the defendants allegedly sent mass phishing text messages to employees of various companies.

These texts falsely claimed to be from employers or trusted IT service providers, warning recipients that their accounts were at risk of deactivation.

Victims were directed to fraudulent websites designed to mimic legitimate company portals, where they unknowingly provided sensitive login credentials.

Using this stolen information, the defendants allegedly accessed corporate systems to extract proprietary data, intellectual property, and personal employee information.

Moreover, the group reportedly exploited credentials to hack into cryptocurrency accounts and wallets, stealing millions in virtual currency.

“These cybercriminals executed a highly sophisticated phishing scheme that caused significant financial and personal harm,” said U.S. Attorney Martin Estrada.

“This case underscores the importance of vigilance in combating phishing and hacking.”The FBI, which led the investigation, emphasized the growing threat of phishing scams.

“These fraudulent schemes exploit unsuspecting victims and result in substantial financial losses,” said Akil Davis, Assistant Director of the FBI’s Los Angeles Field Office.

If convicted, the defendants face severe penalties, including up to 20 years in prison for conspiracy to commit wire fraud and additional sentences for identity theft.

The FBI continues to investigate these cases, with assistance from multiple agencies, including Police Scotland.

Authorities urge individuals to remain cautious about unsolicited messages and to verify the authenticity of emails or texts before responding.

Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN -> Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting...

AWS SNS Exploited for Data Exfiltration and Phishing Attacks

Amazon Web Services' Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service...

Edimax Camera RCE Vulnerability Exploited to Spread Mirai Malware

A recent alert from the Akamai Security Intelligence and Response Team (SIRT) has highlighted...

Cisco Warns of Critical IOS XR Vulnerability Enabling DoS Attacks

Cisco has issued a security advisory warning of a vulnerability in its IOS XR...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting...

AWS SNS Exploited for Data Exfiltration and Phishing Attacks

Amazon Web Services' Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service...

Edimax Camera RCE Vulnerability Exploited to Spread Mirai Malware

A recent alert from the Akamai Security Intelligence and Response Team (SIRT) has highlighted...