Monday, May 5, 2025
HomecryptocurrencyU.S. Officials Detained a 19-year-old SIM-Swap Hacker

U.S. Officials Detained a 19-year-old SIM-Swap Hacker

Published on

SIEM as a Service

Follow Us on Google News

In the murky depths of the digital underworld, a tale unfolds: the rise and fall of “King Bob,” a moniker masking 19-year-old Noah Michael Urban, a Florida man entangled in a web of cybercrime. 

An investigation revealed the accused’s role in a hacking group linked to cyberattacks on major U.S. tech companies in summer 2022 (KrebsOnSecurity).

Document
Run Free ThreatScan on Your Mailbox

AI-Powered Protection for Business Email Security

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Try Trustifi Free Threat Scan with Sophisticated AI-Powered Email Protection .

- Advertisement - Google News

Accused of wire fraud, identity theft, and orchestrating SIM-swapping attacks, Urban’s story transcends individual transgression, painting a chilling portrait of interconnected criminal networks and the escalating dangers they pose.

Prosecutors allege Urban, operating under aliases like “Sosa,” amassed a staggering $800,000 through unauthorized SIM swaps between 2022 and 2023. 

This seemingly individual act unravels further, revealing Urban’s suspected involvement in notorious hacker groups like Oktapus and Scattered Spider. 

These groups, responsible for a string of breaches at major tech companies like Twilio, LastPass, and DoorDash, employed sophisticated phishing tactics, leaving a trail of compromised data and financial losses.

Phishing with Finesse: 0ktapus’s Web of Deceit:

Group-IB’s investigation dubbed the group “0ktapus” due to its use of seemingly legitimate domain names to lure unsuspecting employees into divulging credentials. 

This intricate “phishing” strategy enabled them to access and exploit vulnerabilities in over 130 organizations, showcasing a level of sophistication rarely seen in such attacks. 

Notably, this modus operandi involved a domino effect, where access gained in one breach became a springboard for subsequent attacks, highlighting the interconnectedness of the cybercrime landscape.

Beyond financial gain, Urban’s online persona, “King Bob,” reveals a peculiar obsession: trading and acquiring unreleased music, particularly from renowned rappers. 

His active participation in Leaked[.]cx, a platform notorious for such “grails,” adds another layer of intrigue. 

However, speculation surrounds his sudden disappearance from the platform, prompting questions about a possible connection between the enigmatic “King Bob” and the ongoing legal proceedings against Urban.

The investigation delves deeper, exposing the brutal underbelly of the SIM-swapping underworld.

In February 2023, a bombshell report by KrebsOnSecurity exposed a disturbing trend: organized SIM-swapping gangs specifically targeting T-Mobile customers. 

Ties between Urban and individuals like “Foreshadow,” a victim-turned-accomplice forced into servitude, illuminate the prevalent violence within these groups. 

Foreshadow’s harrowing experience, documented in a ransom video, serves as a stark reminder of the dangers individuals face in this sphere. 

From The Com to the Caesars Caper: The Reach of the Network:

Urban’s involvement extends beyond individual groups. His affiliation with “The Com,” a notorious cybercriminal community known for boasting about exploits, and “Star Fraud,” linked to high-profile extortion attacks against companies like Caesars Entertainment and MGM Resorts, paints a picture of a sprawling and interconnected network of cybercriminals. 

Experts warn against the consequences of delayed action from law enforcement, highlighting the potential for online violence to spill over into the real world and impact everyday people.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploit Email Fields to Launch XSS and SSRF Attacks

Cybersecurity researchers are raising alarms as hackers increasingly weaponize email input fields to execute cross-site...

Luna Moth Hackers Use Fake Helpdesk Domains to Target Victims

A recent investigation by cybersecurity firm EclecticIQ, in collaboration with threat hunters, has exposed...

SonicBoom Attack Chain Lets Hackers Bypass Login and Gain Admin Control

Cybersecurity researchers have uncovered a dangerous new exploitation technique, dubbed the "SonicBoom Attack Chain,"...

Researcher Uses Copilot with WinDbg to Simplify Windows Crash Dump Analysis

A researcher has unveiled a novel integration between AI-powered Copilot and Microsoft's WinDbg, dramatically...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit Email Fields to Launch XSS and SSRF Attacks

Cybersecurity researchers are raising alarms as hackers increasingly weaponize email input fields to execute cross-site...

Luna Moth Hackers Use Fake Helpdesk Domains to Target Victims

A recent investigation by cybersecurity firm EclecticIQ, in collaboration with threat hunters, has exposed...

SonicBoom Attack Chain Lets Hackers Bypass Login and Gain Admin Control

Cybersecurity researchers have uncovered a dangerous new exploitation technique, dubbed the "SonicBoom Attack Chain,"...