{"id":15292,"date":"2019-05-10T10:17:13","date_gmt":"2019-05-10T18:17:13","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/05\/10\/news-9041\/"},"modified":"2019-05-10T10:17:13","modified_gmt":"2019-05-10T18:17:13","slug":"news-9041","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/05\/10\/news-9041\/","title":{"rendered":"Nine Charged in Alleged SIM Swapping Ring"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Fri, 10 May 2019 17:02:56 +0000<\/strong><\/p>\n<p>Eight Americans and an Irishman have been charged with wire fraud this week for allegedly hijacking mobile phones through SIM-swapping, a form of fraud in which scammers bribe or trick employees at mobile phone stores into seizing control of the target&#8217;s phone number and diverting all texts and phone calls to the attacker&#8217;s mobile device. From there, the attackers simply start requesting password reset links via text message for a variety of accounts tied to the hijacked phone number.<\/p>\n<p>All told, the government said this gang &#8212; allegedly known to its members as &#8220;<strong>The Community<\/strong>&#8221; &#8212; made more than $2.4 million stealing cryptocurrencies and extorting people for restoring access to social media accounts that were hijacked after a successful SIM-swap.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-40415\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/08\/phonefraudsmaller.png\" alt=\"\" width=\"598\" height=\"302\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/08\/phonefraudsmaller.png 609w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/08\/phonefraudsmaller-580x292.png 580w\" sizes=\"auto, (max-width: 598px) 100vw, 598px\" \/><\/p>\n<p>Six of those <a href=\"https:\/\/www.justice.gov\/usao-edmi\/pr\/nine-individuals-connected-hacking-group-charged-online-identity-theft-and-other\" target=\"_blank\" rel=\"noopener\">charged this week in Michigan federal court<\/a> were alleged to have been members of The Community of serial SIM swappers. They face a fifteen count indictment, including charges of wire fraud, conspiracy and aggravated identity theft (a charge that carries a mandatory two-year sentence). A separate criminal complaint unsealed this week charges three former employees of mobile phone providers accused of collaborating with The Community&#8217;s members.<\/p>\n<p>Several of those charged have been mentioned by this blog previously. In August 2018, KrebsOnSecurity <a href=\"https:\/\/krebsonsecurity.com\/2018\/08\/florida-man-arrested-in-sim-swap-conspiracy\/\" target=\"_blank\" rel=\"noopener\">broke the news<\/a> that police in Florida arrested 25-year-old Pasco County, Fla. city employee <strong>Ricky Joseph Handschumacher<\/strong>, charging him with grand theft and money laundering. As I reported in that story, &#8220;<em>investigators allege Handschumacher was part of a group of at least nine individuals scattered across multiple states<\/em> who for the past two years have drained bank accounts via an increasingly common scheme involving mobile phone \u201c&#8217;SIM swaps.&#8217;\u201d<\/p>\n<p>This blog also has featured <a href=\"https:\/\/krebsonsecurity.com\/?s=phobia&amp;x=0&amp;y=0\" target=\"_blank\" rel=\"noopener\">several stories<\/a> about the escapades of <strong>Ryan Stevenson<\/strong>, a 26-year-old West Haven, Conn. man who goes by the hacker name &#8220;Phobia.&#8221; Most recently, I wrote about how Mr. Stevenson earned a decent number of bug bounty rewards and public recognition from top telecom companies for finding and reporting security holes in their Web sites &#8212; all the while <a href=\"https:\/\/krebsonsecurity.com\/2018\/11\/bug-bounty-hunter-ran-isp-doxing-service\/\" target=\"_blank\" rel=\"noopener\">secretly operating a service that leveraged these same flaws to sell their customers&#8217; personal data to people who were active in the SIM swapping community<\/a>.<\/p>\n<p>One of the six men charged in the conspiracy &#8212; <strong>Colton Jurisic<\/strong>, 20 of, Dubuque, Iowa &#8212; has been more well known under his hacker alias &#8220;<strong>Forza<\/strong>,&#8221; and &#8220;<strong>ForazaTheGod<\/strong>.&#8221; In December 2016, KrebsOnSecurity heard from a woman who had her Gmail, Instagram, Facebook and LinkedIn accounts hijacked after a group of individuals led by Forza taunted her on Twitter as they took over her phone account.<\/p>\n<p>&#8220;They failed to get [her three-letter Twitter account name, redacted] because I had two-factor authentication turned on for twitter, combined with a new phone number of which they were unaware,&#8221; the source said in an email to KrebsOnSecurity in 2016. &#8220;@forzathegod had the audacity to even tweet me to say I was about to be hacked.&#8221;<span id=\"more-47650\"><\/span><\/p>\n<p>Also part of the alleged Community of SIM swappers is <strong>Conor Freeman<\/strong>, 20, of Dublin, Ireland; <strong>Reyad Gafar Abbas<\/strong>, 19, of Rochester, New York; <strong>Garrett Endicott<\/strong>, 21, of Warrensburg, Missouri.<\/p>\n<p>The three men criminally accused of working with the six through their employment at mobile phone stores are <strong>Fendley Joseph<\/strong>, 28, of Murrietta, Calif.; <strong>Jarratt White<\/strong>, 22, and <strong>Robert Jack<\/strong>, 22, both from Tucson, Ariz.<\/p>\n<p>If convicted on the charge of conspiracy to commit wire fraud, each defendant faces a statutory maximum penalty of 20 years in prison.\u00a0 The charges of wire fraud each carry a statutory maximum penalty of 20 years in prison.<\/p>\n<p>Last month, 20-year-old college student and valedictorian <strong>Joel Ortiz<\/strong>\u00a0became the first person ever to be sentenced for SIM swapping &#8212; pleading guilty to a ten year stint in prison for stealing more than $5 million in cryptocurrencies from victims and then <a href=\"https:\/\/krebsonsecurity.com\/2019\/02\/more-alleged-sim-swappers-face-justice\/\" target=\"_blank\" rel=\"noopener\">spending it lavishly at elaborate club parties in Las Vegas and Los Angeles<\/a>.<\/p>\n<p>A copy of the indictment against the six men is <a href=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2019\/05\/ninesimswap.pdf\" target=\"_blank\" rel=\"noopener\">here<\/a>\u00a0(PDF).<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2019\/05\/nine-charged-in-alleged-sim-swapping-ring\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2017\/08\/phonefraudsmaller.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Fri, 10 May 2019 17:02:56 +0000<\/strong><\/p>\n<p>Eight Americans and an Irishman have been charged with wire fraud this week for allegedly hijacking mobile phones through SIM-swapping, a form of fraud in which scammers bribe or trick employees at mobile phone stores into seizing control of the target&#8217;s phone number and diverting all texts and phone calls to the attacker&#8217;s mobile device. From there, the attackers simply start requesting password reset links via text message for a variety of accounts tied to the hijacked phone number.    All told, the government said this gang &#8212; allegedly known to its members as &#8220;The Community&#8221; &#8212; made more than $2.4 million stealing cryptocurrencies and extorting people for restoring access to social media accounts that were hijacked after a successful SIM-swap.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[16696],"class_list":["post-15292","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-neer-do-well-news"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15292","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15292"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15292\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15292"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15292"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}