Friday, December 8, 2023

Hacker Jailed for Stealing $1 Million Via SIM Swapping Attacks

A young man from Orlando, Florida, has been handed a 30-month prison sentence for his role in a cybercrime scheme that stole nearly $1 million in cryptocurrency from unsuspecting victims. 

As part of a group of hackers, Jordan Dave Persad, a 20-year-old, admitted to conspiring to commit computer fraud.

Their method of operation involved using a technique known as “SIM swapping” to gain unauthorized access to people’s email accounts and subsequently take control of their online cryptocurrency wallets.

Persad’s participation in this scheme resulted in the charge of Conspiracy to Commit Computer Fraud.

The cyberattacks took place between March 2021 and September 2022, targeting several individuals across the country, including one from Arizona who lost about $30,000. 

Persad and his co-conspirators split the loot among themselves, with Persad receiving about $475,000.

SIM Swapping Attacks

Despite their attempts to remain under the radar, the group’s illicit operations were eventually discovered by law enforcement officials.

As a result, a thorough investigation was launched, culminating in a raid on Persad’s residence in Orlando. During the operation, authorities were successful in recovering a portion of the stolen funds.

Persad will now have to spend 30 months in jail, followed by three years of supervised release. He will also have to pay back $945,833 to the victims of his crimes. 

The investigation, in this case, was led by the Federal Bureau of Investigation. The prosecution was managed by Assistant U.S. Attorneys Amy Chang and Bridget Minder from the United States Attorney’s Office, District of Arizona, Phoenix.

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Try a free trial to ensure 100% security.

Website

Latest articles

Exploitation Methods Used by PlugX Malware Revealed by Splunk Research

PlugX malware is sophisticated in evasion, as it uses the following techniques to avoid...

TA422 Hackers Attack Organizations Using Outlook & WinRAR Vulnerabilities

Hackers exploit Outlook and WinRAR vulnerabilities because these widely used software programs are lucrative...

Bluetooth keystroke-injection Flaw: A Threat to Apple, Linux & Android Devices

An unauthenticated Bluetooth keystroke-injection vulnerability that affects Android, macOS, and iOS devices has been...

Atlassian Patches RCE Flaw that Affected Multiple Products

Atlassian has been discovered with four new vulnerabilities associated with Remote Code Execution in...

Reflectiz Introduces AI-powered Insights on Top of Its Smart Alerting System

Reflectiz, a cybersecurity company specializing in continuous web threat management, proudly introduces a new...

SLAM Attack Gets Root Password Hash in 30 Seconds

Spectre is a class of speculative execution vulnerabilities in microprocessors that can allow threat...

Akira Ransomware Exploiting Zero-day Flaws For Organization Network Access

The Akira ransomware group, which first appeared in March 2023, has been identified as...

Endpoint Strategies for 2024 and beyond

Converge and Defend

What's the pulse of Unified Endpoint Management and Security (UEMS) in Europe? Join us live to uncover the strategies that are defining endpoint security in the region.

Related Articles