{"id":2064,"date":"2021-11-10T06:26:52","date_gmt":"2021-11-10T14:26:52","guid":{"rendered":"https:\/\/www.ssls.com\/blog\/?p=2064"},"modified":"2023-12-06T07:55:09","modified_gmt":"2023-12-06T15:55:09","slug":"sim-swapper-who-stole-over-16k-in-crypto-pleads-guilty-to-aggravated-identity-theft","status":"publish","type":"post","link":"https:\/\/www.ssls.com\/blog\/sim-swapper-who-stole-over-16k-in-crypto-pleads-guilty-to-aggravated-identity-theft\/","title":{"rendered":"SIM swapper who stole over $16K in crypto pleads guilty to aggravated identity&nbsp;theft"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.ssls.com\/blog\/wp-content\/uploads\/SSL_Blog_Two-SIM-swappers-phished-1.png\" alt=\"\" class=\"wp-image-2026\"\/><\/figure>\n\n\n\n<p>A 20-year-old man in Pennsylvania <a href=\"https:\/\/www.justice.gov\/usao-md\/pr\/defendant-who-stole-more-16000-cryptocurrency-and-orchestrated-swat-attack-his-accomplice\">has pleaded guilty<\/a> to his involvement in a \u201cSIM swap\u201d and cryptocurrency theft scheme. Kyell Bryan carried out the plan in 2019 with several others. After he too pleaded guilty, Jordan Milleson, a co-conspirator in the scheme, was <a href=\"https:\/\/www.justice.gov\/usao-md\/pr\/defendant-scheme-steal-digital-currency-and-social-media-accounts-pleads-guilty-and\">sentenced to two years<\/a> in federal prison earlier this year.<br><\/p>\n\n\n\n<!--more-->\n\n\n\n<p>So, what exactly went down? Before we get into that, let\u2019s go over what SIM swapping is and how it usually plays out.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is SIM swapping?<\/h2>\n\n\n\n<p>Sim swapping is a type of account takeover fraud that involves SIM cards, the small, removable mobile chip in your mobile phone that links your phone number to your device. The perpetrator steals a phone number and assigns it to a new SIM card. They usually do this by stealing data about the victim from various sources \u2014 such as scouring social media profiles, data breach leaks, phishing, and other types of social engineering \u2014 then calling up their phone provider to impersonate the victim. The perpetrator often claims that their SIM card has been compromised somehow \u2014 for example, lost or destroyed \u2014 and convinces customer service representatives to reassign their number to a new SIM. The perpetrator then \u201cverifies\u201d themselves to be the victim using data they stole. Once this is done, the perpetrator has access to the victim\u2019s accounts that are linked to their phone number.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How the conspiracy played out<\/h2>\n\n\n\n<p>Using the stolen login credentials of employees at an unnamed wireless service provider, the group began executing SIM swaps. They stole these credentials by setting up fake login portals, which some employees used to log in. By doing the SIM swap, they were able to gain access to a victim\u2019s cryptocurrency account. Bryan instructed Milleson (whom everyone only knew by a forum pseudonym at this point), to transfer the victim\u2019s cryptocurrency, valued at&nbsp; $16,847.47, out of their account.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">SWAT attempt leads to their discovery<\/h2>\n\n\n\n<p>Things started going south when Bryan and the rest of the group suspected that Milleson had cheated them out of their share of the stolen cryptocurrency. They uncovered Milleson\u2019s true identity and carried out a SWAT attack on him, which involves sending emergency services to a specific location under a false claim (<a href=\"https:\/\/www.ssls.com\/blog\/what-is-swatting-and-how-to-prevent-it\/\">learn more about SWAT attacks and how dangerous they can be in our blog post<\/a>). Specifically, Bryan called up the police, told them that he had shot his father and was about to shoot himself with a handgun and gave Milleson\u2019s home address.&nbsp;<br><\/p>\n\n\n\n<p>The call was soon proven to be a false alarm, but the police then learned after interviewing Milleson\u2019s relatives that someone had recently called, accusing Milleson of stealing $20,000. This eventually led to the arrest and indictment of both Bryan and Milleson. Bryan is set to be sentenced in January 2022 and faces a similar sentence to Milleson.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The threat of SIM swapping<\/h2>\n\n\n\n<p>While several perpetrators were caught in this instance, SIM swapping schemes should be on your radar, especially because SIM swapping events have <a href=\"https:\/\/www.biometricupdate.com\/202109\/growing-sim-swap-fraud-threat-necessitates-strong-identity-verification\">reportedly increased by 600%<\/a> over the past year.&nbsp;<\/p>\n\n\n\n<p>If you ever find that your SIM card suddenly no longer works and you\u2019re unable to send or receive text messages or make calls, make sure to reach out to your mobile provider ASAP. It\u2019s also important to contact your bank and other sensitive accounts to alert them and ensure that no fraudulent transactions have taken place. <a href=\"https:\/\/www.ssls.com\/\">Protect<\/a> yourself by taking preventative measures like using strong passwords, setting up a password manager, and setting up 2FA (that doesn\u2019t use SMS) on every account you can.<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A 20-year-old man in Pennsylvania has pleaded guilty to his involvement in a \u201cSIM swap\u201d and cryptocurrency theft scheme. Kyell Bryan carried out the plan in 2019 with several others. After he too pleaded guilty, Jordan Milleson, a co-conspirator in the scheme, was sentenced to two years in federal prison earlier this year.<\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2064","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/posts\/2064","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/comments?post=2064"}],"version-history":[{"count":2,"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/posts\/2064\/revisions"}],"predecessor-version":[{"id":2844,"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/posts\/2064\/revisions\/2844"}],"wp:attachment":[{"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/media?parent=2064"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/categories?post=2064"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/tags?post=2064"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}