Eight Brits have been arrested as aspect of an investigation into a collection of ‘SIM swapping’ attacks across the US.
The gentlemen, aged between 18 and 26, are from England and Scotland and their arrests were being section of an international exertion with the National Criminal offense Agency (NCA), the US Secret Support, Homeland Security, the FBI and the Santa Clara California District Attorney’s Place of work.
The perpetrators are claimed to have illegally obtained access to cellular telephones belonging to US stars in buy to steal large sums of revenue, possibly from their lender accounts or Bitcoin wallets, in accordance to the NCA.
“This network qualified a large quantity of victims in the US and often attacked these they considered would be worthwhile targets, these kinds of as well-known athletics stars and musicians,” explained NCA’s head of operations Paul Creffield. “In this case, individuals arrested face prosecution for offences below the Personal computer Misuse Act, as perfectly as fraud and income laundering as effectively as extradition to the Usa for prosecution.”
The criminals are accused of employing a hack identified as ‘SIM swapping’ whereby they consider more than a victims phone amount by deactivating the SIM and porting the allocated range over to a new a person. This is frequently accomplished by tricking cellular suppliers to swap the SIMs by themselves, either applying an insider or social engineering techniques.
As soon as they have regulate of the phone quantity, they use it to improve the passwords on many applications and accessibility contacts, e-mails and even lender information.
In the summer season, a amount of celebrities, these as Elon Musk and Barack Obama, had their Twitter accounts hacked by using the exact methods. Instagram, Twitter and a selection of other social media platforms lately announced that they had disabled hundreds of accounts that were being stolen through SIM swapping, citing the ‘OGUsers’ discussion board as the offender for harvesting the usernames.
Some components of this posting are sourced from: