What happened? A former employee of a mobile carrier has been convicted for his role in a SIM-swap plot targeting at least 19 people. Stephen DeVere, a Florida resident, received a $500 bribe every time he changed his customer's SIM card.
When the victim's phone number was transferred to another SIM. All their calls and texts go to this number. One of the main reasons for cybercriminals is to intercept two-factor authentication (2FA) scripts that allow access to secure services such as banks and cryptocurrencies. He was a salesperson for an unknown telecom company. In each incident, the conspirator sends the client a phone number, a four-digit PIN, and a SIM card with which the number is replaced. He was paid a total of $2,325 for his actions in a series of twelve payments.
SIM swap attacks usually when a carrier employee is not involved
One of the victims is reported to have a SIM card in iPhone 8 Apple, owned by Richard Mine. Substitute for indictment in August 2021. Convicted on October 19 and sentenced to three months probation and one year in prison and must serve 100 hours of public service. He will also have to pay $77,417.50 in compensation, along with a $100 special appraisal fee.
SIM replacement is still a common crime. In 2018, a 20-year-old college student reportedly hacked 40 phones and stole $5 million using this technology - and later received a 10-year protest deal. There was also the case of an investor trying to sue AT&T for stealing $244 million worth of digital currency worth $224 million, but the judge dropped the case.
According to Princeton researchers last year, five of the largest US telecom companies do little to protect you from wire-sharing attacks.
Ex-cell phone company worker convicted for his role in SIM swap attacks