Tuesday, December 3, 2024
HomeCyber AttackTeam of Hackers Charged in U.S for “SIM Hijacking" Attack and Steal...

Team of Hackers Charged in U.S for “SIM Hijacking” Attack and Steal $2,400,000

Published on

SIEM as a Service

A group of hackers from the cybercrime group known as “The Community” charged in the U.S for “Sim Hijacking” attack and commit wire fraud along with 3 former employees of mobile phone providers.

All the 6 members of “The community ” group alleged to have participated in thefts of victims’ identities and used the data to steal cryptocurrencies via SIM Hijacking attack also known as SIM Swapping.

“SIM Hijacking” or “SIM Swapping” is an identity theft technique that exploits a common cyber-security weakness – mobile phone numbers.

- Advertisement - SIEM as a Service

This special technique used by hackers to gain control of victims’ mobile phone number in order to route the victims mobile traffic such as phone calls and short message service (“SMS”) messages through the devices controlled by “The Community”.

According to the fifteen-count indictment unsealed, SIM Hijacking was accomplished by a member of “The Community” contacting a mobile phone provider’s customer service—posing as the victim—and requesting that the victim’s phone number be swapped to a SIM card (and thus a mobile device) controlled by “The Community”.

Later, Hijacked new SIM will be used as a gateway to gain control of online accounts such as a victim’s email, cloud storage, and cryptocurrency exchange accounts.

Here list of 6 “The Community” 3 former employee of mobile phone provide.

  • Conor Freeman, 20, of Dublin, Ireland
  • Ricky Handschumacher, 25 of Pasco County, Florida
  • Colton Jurisic, 20 of, Dubuque, Iowa
  • Reyad Gafar Abbas, 19, of Rochester, New York
  • Garrett Endicott, 21, of Warrensburg, Missouri
  • Ryan Stevenson, 26, of West Haven, Connecticut

Charged in the criminal complaint were:

  • Jarratt White, 22 of Tucson, Arizona
  • Robert Jack, 22of Tucson, Arizona
  • Fendley Joseph, 28, of Murrietta, California

These members of the hacking group hijacked the victims mobile to gain control of the cryptocurrency wallets and steal the victim’s funds that valued at $2.5 million dollars.

In this case, 3 employees( White, Jack, and Joseph ) of mobile phone service providers were helped to the community member to steal the subscriber identity.

“The allegations against these defendants are the result of a complex cryptocurrency and identity theft investigation led by Homeland Security Investigations, which spanned two continents,” said Salazar. 

“If convicted on the charge of conspiracy to commit wire fraud, each defendant faces a statutory maximum penalty of 20 years in prison.” Justice.gov, the report said.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Various SIM Swap Attack in Recent Past

First SIM Swapping Hacker Convicted, Gets 10 Years in Prison

SIM Swapping Hacker Group Who Managed to Steal $80,000 Worth of Cryptocurrency Got Arrested

Hacker Group Stolen $5 Million Through SIM Swapping Hacks

21-year-old man Stole $1 Million Within Seconds Through SIM-swapping Hacks

Mumbai Businessman Loses Rs. 1.86cr After Getting 6 Missed Calls

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

PEFT-As-An-Attack, Jailbreaking Language Models For Malicious Prompts

Federated Parameter-Efficient Fine-Tuning (FedPEFT) is a technique that combines parameter-efficient fine-tuning (PEFT) with federated...

Hackers Cloning Websites, Exploiting RCE Flaws To Gain Access To Shopping Platforms

Cybercriminals are leveraging AI-powered phishing attacks, website cloning tools, and RCE exploits to target...

Hackers Exploited Windows Event Logs Tool log Manipulation, And Data Exfiltration

wevtutil.exe, a Windows Event Log management tool, can be abused for LOLBAS attacks. By...

Threat Actors Allegedly Claims Breach of EazyDiner Reservation Platform

Reports have emerged of a potential data breach involving EazyDiner, a leading restaurant reservation...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

PEFT-As-An-Attack, Jailbreaking Language Models For Malicious Prompts

Federated Parameter-Efficient Fine-Tuning (FedPEFT) is a technique that combines parameter-efficient fine-tuning (PEFT) with federated...

Hackers Cloning Websites, Exploiting RCE Flaws To Gain Access To Shopping Platforms

Cybercriminals are leveraging AI-powered phishing attacks, website cloning tools, and RCE exploits to target...

Hackers Exploited Windows Event Logs Tool log Manipulation, And Data Exfiltration

wevtutil.exe, a Windows Event Log management tool, can be abused for LOLBAS attacks. By...