Friday, June 14, 2024

Serial ‘SIM Swapper’ Sentenced to Eight Years in Prison

In a digital age marred by deceit, 25-year-old Amir Hossein Golshan stands as a testament to the dark underbelly of cyberspace. 

Hailing from downtown Los Angeles, Golshan’s intricate orchestration of fraudulent schemes has earned him a federal prison sentence of 96 months. 

His exploits, spanning from April 2019 to February 2023, encompassed a range of online scams, leaving a trail of financial ruin and emotional turmoil for countless victims.

Golshan’s arsenal included the sophisticated tactic of SIM swapping, a method by which he coerced mobile carriers into transferring victims’ phone numbers to SIM cards under his control. 

This cunning maneuver granted him unauthorized access to victims’ online accounts by intercepting two-factor authentication codes.

Free Webinar

Live API Attack Simulation Webinar

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked. The session will cover: an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Social Media Subterfuge

Venturing into the realm of social media, Golshan seized control of victims’ accounts, leveraging them for nefarious ends, reads the Attorney’s report.

Impersonating the account owners, he manipulated friends and followers, coercing them into unwittingly participating in money transfers that lined his pockets.

Golshan’s deceptive prowess extended to falsely advertising non-existent Instagram services, ensnaring individuals who believed in his deceptive offerings. 

The financial fallout of his fictitious promises resulted in unsuspecting victims sending payments for services that were never intended to materialize.

Apple Support Artifice

Pretending to be a representative of Apple Support, Golshan artfully deceived victims into divulging their iCloud account credentials. 

Armed with this information, he orchestrated thefts of valuable digital property, including NFTs and cryptocurrency, plunging victims into the heart of the digital abyss.

Golshan’s fraudulent escapades exacted a heavy toll, with victims collectively losing a staggering $740,000. 

Beyond the monetary impact, the emotional distress inflicted upon his targets left them grappling with vulnerability, fear, and anxiety in the aftermath of his calculated attacks.

Facing the consequences of his actions, Golshan pleaded guilty to federal charges, including unauthorized access to protected computers, wire fraud, and computer fraud to obtain value. 

Alongside a 96-month prison sentence, he was ordered to pay $1,218,526 in restitution to his victims, underscoring the severity of his transgressions.

Golshan’s case serves as an ominous reminder of the escalating threat posed by online fraud. 

As society leans more heavily on digital platforms, a call to exercise caution reverberates. 

The digital landscape demands proactive steps to protect oneself, from refraining from sharing personal information with unverified sources to staying vigilant against the latest online scams and threats.

In this era of interconnectedness, the tale of Amir Hossein Golshan serves as a stark wake-up call, urging individuals to fortify their digital defenses against the ever-evolving specter of cyber deception.

Experience how StorageGuard eliminates the security blind spots in your storage systems by trying a 14-day free trial.


Latest articles

Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users

Hackers are targeting, attacking, and exploiting ML models. They want to hack into these...

SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files

SolarWinds released a security advisory for addressing a Directory Traversal vulnerability which allows a...

Smishing Triad Hackers Attacking Online Banking, E-Commerce AND Payment Systems Customers

Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes.Resecurity...

Threat Actor Claiming Leak Of 5 Million Ecuador’s Citizen Database

A threat actor has claimed responsibility for leaking the personal data of 5 million...

Ascension Hack Caused By an Employee Who Downloaded a Malicious File

Ascension, a leading healthcare provider, has made significant strides in its investigation and recovery...

AWS Announced Malware Detection Tool For S3 Buckets

Amazon Web Services (AWS) has announced the general availability of Amazon GuardDuty Malware Protection...

Hackers Exploiting MS Office Editor Vulnerability to Deploy Keylogger

Researchers have identified a sophisticated cyberattack orchestrated by the notorious Kimsuky threat group.The...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles