Tuesday, April 22, 2025
HomeCyber AttackSerial ‘SIM Swapper’ Sentenced to Eight Years in Prison

Serial ‘SIM Swapper’ Sentenced to Eight Years in Prison

Published on

SIEM as a Service

Follow Us on Google News

In a digital age marred by deceit, 25-year-old Amir Hossein Golshan stands as a testament to the dark underbelly of cyberspace. 

Hailing from downtown Los Angeles, Golshan’s intricate orchestration of fraudulent schemes has earned him a federal prison sentence of 96 months. 

His exploits, spanning from April 2019 to February 2023, encompassed a range of online scams, leaving a trail of financial ruin and emotional turmoil for countless victims.

- Advertisement - Google News

Golshan’s arsenal included the sophisticated tactic of SIM swapping, a method by which he coerced mobile carriers into transferring victims’ phone numbers to SIM cards under his control. 

This cunning maneuver granted him unauthorized access to victims’ online accounts by intercepting two-factor authentication codes.

Document
Free Webinar

Live API Attack Simulation Webinar

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked. The session will cover: an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Social Media Subterfuge

Venturing into the realm of social media, Golshan seized control of victims’ accounts, leveraging them for nefarious ends, reads the Attorney’s report.

Impersonating the account owners, he manipulated friends and followers, coercing them into unwittingly participating in money transfers that lined his pockets.

Golshan’s deceptive prowess extended to falsely advertising non-existent Instagram services, ensnaring individuals who believed in his deceptive offerings. 

The financial fallout of his fictitious promises resulted in unsuspecting victims sending payments for services that were never intended to materialize.

Apple Support Artifice

Pretending to be a representative of Apple Support, Golshan artfully deceived victims into divulging their iCloud account credentials. 

Armed with this information, he orchestrated thefts of valuable digital property, including NFTs and cryptocurrency, plunging victims into the heart of the digital abyss.

Golshan’s fraudulent escapades exacted a heavy toll, with victims collectively losing a staggering $740,000. 

Beyond the monetary impact, the emotional distress inflicted upon his targets left them grappling with vulnerability, fear, and anxiety in the aftermath of his calculated attacks.

Facing the consequences of his actions, Golshan pleaded guilty to federal charges, including unauthorized access to protected computers, wire fraud, and computer fraud to obtain value. 

Alongside a 96-month prison sentence, he was ordered to pay $1,218,526 in restitution to his victims, underscoring the severity of his transgressions.

Golshan’s case serves as an ominous reminder of the escalating threat posed by online fraud. 

As society leans more heavily on digital platforms, a call to exercise caution reverberates. 

The digital landscape demands proactive steps to protect oneself, from refraining from sharing personal information with unverified sources to staying vigilant against the latest online scams and threats.

In this era of interconnectedness, the tale of Amir Hossein Golshan serves as a stark wake-up call, urging individuals to fortify their digital defenses against the ever-evolving specter of cyber deception.

Experience how StorageGuard eliminates the security blind spots in your storage systems by trying a 14-day free trial.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Infostealer Attacks Surge 84% Weekly Through Phishing Emails

The volume of infostealer malware distributed through phishing emails has surged by 84% week-on-week...

North Korean IT Workers Use Real-Time Deepfakes to Infiltrate Organizations Through Remote Jobs

A division of Palo Alto Networks, have revealed a sophisticated scheme by North Korean...

New Phishing Technique Hides Weaponized HTML Files Within SVG Images

Cybersecurity experts have observed an alarming increase in the use of SVG (Scalable Vector...

Detecting And Blocking DNS Tunneling Techniques Using Network Analytics

DNS tunneling is a covert technique that cybercriminals use to bypass traditional network security...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Infostealer Attacks Surge 84% Weekly Through Phishing Emails

The volume of infostealer malware distributed through phishing emails has surged by 84% week-on-week...

North Korean IT Workers Use Real-Time Deepfakes to Infiltrate Organizations Through Remote Jobs

A division of Palo Alto Networks, have revealed a sophisticated scheme by North Korean...

New Phishing Technique Hides Weaponized HTML Files Within SVG Images

Cybersecurity experts have observed an alarming increase in the use of SVG (Scalable Vector...