Monday, April 28, 2025
HomeComputer SecurityTwo Massachusetts Men Arrested for Conducting SIM-swapping Attack To Steal Cryptocurrency &...

Two Massachusetts Men Arrested for Conducting SIM-swapping Attack To Steal Cryptocurrency & Social Media Login

Published on

SIEM as a Service

Follow Us on Google News

Two Massachusetts men arrested today for Conducting Nationwide SIM-swapping attack to gain login credentials of victims by resetting their login credentials.

Once they got login credentials they gain control over the account and in some cases, they even steal the cryptocurrencies.

SIM swapping or SIM Hijacking is a targeted attack conducted by criminals to register an already existing number on a new SIM card, so they can intercept the OTPs and can reset the login credentials.

- Advertisement - Google News

Two defendants Eric Meiggs, 21, of Brockton, Massachusetts, and Declan Harrington, 20, of Rockport, Massachusetts were charged 11 counts indictment. Eight counts for wire fraud, one count for abuse fraud, one count for computer fraud and one count for identity theft.

Meiggs and Harrington particularly targeted the executives of cryptocurrency companies and the social media accounts of those who have high value or the name contain OG(“Original Gangster”).

According to the indictment, cybercriminals convince a victim’s SIM card provider to reassign the victim’s cell phone number to a different SIM card that controlled by cybercriminals.

The two cybercriminals found to be targeted more than 10 victims and they attempted to steal more than $550,000 in the form of cryptocurrencies. Eric Meiggs gained control over several social media profiles with OG.

“The details contained in the charging documents are allegations. The defendant is presumed innocent unless and until proven guilty beyond a reasonable doubt in a court of law,” reads the statement.

This is not the first time sim-swapping hackers are arrested, earlier a 21-year-old man, Nicholas Truglia, charged for hacking into the phones of Silicon Valley executive phones to steal their cryptocurrency and a SIM Swapping Hacker Group who steals $80,000 worth of cryptocurrency got arrested by Turkish police.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...

React Router Vulnerabilities Allow Attackers to Spoof Content and Alter Values

The widely used React Router library, a critical navigation tool for React applications, has...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...