Monday, April 28, 2025
HomeCyber Attack‘SIM Swapper’ Pleads Guilty For Hacking Instagram User Accounts

‘SIM Swapper’ Pleads Guilty For Hacking Instagram User Accounts

Published on

SIEM as a Service

Follow Us on Google News

A 24-year-old man named Amir Hossein Golshan from Downtown Los Angeles has pleaded guilty for hacking Instagram users’ accounts, using a technique called “SIM swapping” to obtain money fraudulently.

The charges consist of illegally accessing a secured computer to acquire data, a single charge of wire fraud, and another charge of accessing a computer for the purpose of obtaining financial benefits.

According to Attorney, he was taken into federal custody last month due to his criminal activities and violation of the terms of his pretrial release.

- Advertisement - Google News

He was involved in the theft from April 2019 to February 2023 by executing multiple online schemes to defraud hundreds of users through various online scams and unauthorized intrusions into victims’ digital accounts, including social media account takeovers, Zelle payment fraud, and impersonating Apple support.

Over the course of several years, hundreds of victims have suffered losses amounting to $740,000.

Pleads Guilty to SIM Swapping

SIM swapping and social media account takeovers:

SIM swapping, also called SIM splitting, or sim jacking, is a fraudulent technique used by hackers to gain control of your phone number; with your phone number, hackers can take advantage of two-factor authentication to gain access to your bank accounts, social media accounts.

Golshan used this technique and targeted both account users and their online friends by tricking them into sending him money.

 Zelle merchant fraud:

In 2019, Golshan falsely claimed that he could obtain verified Instagram badges for a user’s teenage daughter and convinced her to send $300 through electronic payment.

 Apple Support fraud and NFT/cryptocurrency theft:

Golshan impersonates to gain access to several victims’ Apple iCloud accounts to steal NFTs, cryptocurrency, and other valuable digital property; by this, he earned between $2,000 and $389,000 each.

Through this incident, he was sentenced to a maximum of 20 years in federal prison for a wire fraud count and 5 years for a computer access count.

Latest articles

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...

Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts

Cybersecurity researchers from The DFIR Report’s Threat Intel Group uncovered an open directory hosted...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...