Saturday, October 12, 2024
HomeCryptocurrency hackSIM Swapping Hacker Group Who Managed to Steal $80,000 Worth of Cryptocurrency...

SIM Swapping Hacker Group Who Managed to Steal $80,000 Worth of Cryptocurrency Got Arrested

Published on

Malware protection

SIM Swapping Hacker Group who steals $80,000 worth of cryptocurrency got arrested by Turkish police.

Eleven individuals were arrested in the question of tricking the network providers to issue SIM card of victim’s phone number to them.

SIM swapping or SIM Hijacking is the technique used by criminals to register an already existing number on a new SIM card, so they can intercept the OTPs and can reset the login credentials.

- Advertisement - SIEM as a Service

By having control over the phone number attackers can bypass 2FA authentication and reset the passwords to gain access to the victim’s accounts.

According to Trustnodes, the Sim Swapping Hacker Group prepared fake IDs pretending to be the victim and managed to convince Mobile network providers to issue new SIM for the same number and to get the real owner’s SIM canceled.

By using this method the hacker group steals $80,000 worth of cryptocurrency and the police tracked the hacker group based on the IP addresses used to access the crypto exchanges.

Authorities raided to their premises and they found 18 mobile phones, 20 flash memory drives, 5 laptops, 3 disks, 2 fake driver’s licenses, and many fake IDs and cards.

The ease with which these thieves were able to gain access to someone else’s phone number, however, is highly concerning. Raising basic questions such as why are claimed lost sim replacements being sent to addresses, not on record. reads trustnodes report.

The SIM Swapping attacks are in the raise, anyone can fall prey to it, last July Motherboard reported a hacking group that Stolen $5 Million Through SIM Swapping Hacks.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication

Threat actors are leveraging a newly discovered deepfake tool, ProKYC, to bypass two-factor authentication...

Mozilla Warns Of Firefox Zero-Day Actively Exploited In Cyber Attacks

A critical use-after-free vulnerability affecting Firefox and Firefox Extended Support Release (ESR) is being...

SpyCloud Embeds Identity Analytics in Cybercrime Investigations Solution to Accelerate Insider and Supply Chain Risk Analysis & Threat Actor Attribution

IDLink, SpyCloud’s new automated digital identity correlation capability, is now core to its industry-leading...

Abusix and Red Sift Form New Partnership, Leveraging Automation to Mitigate Cyber Attacks

The agreement has marked over 600,000 fraudulent domains for takedown in just two months...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication

Threat actors are leveraging a newly discovered deepfake tool, ProKYC, to bypass two-factor authentication...

Hackers Exploiting Zero-day Flaw in Qualcomm Chips to Attack Android Users

Hackers exploit a zero-day vulnerability found in Qualcomm chipsets, potentially affecting millions worldwide.The flaw,...

Foxit PDF Reader Vulnerability Let Attackers Execute Arbitary Code

Researchers recently disclosed six new security vulnerabilities across various software, as one critical vulnerability...