This is the best summary I could come up with:
The US may have uncovered the nation’s largest “SIM swap” scheme yet, charging a Chicago man and co-conspirators with allegedly stealing $400 million in cryptocurrency by targeting over 50 victims in more than a dozen states, including one company.
Once the swap occurs, the bad actor can defeat multi-factor authentication protections and access online accounts to steal data or money.
Powell’s accused crew allegedly used identification card printers to forge documents, then posed as victims visiting Apple, AT&T, Verizon, and T-Mobile retail stores in Minnesota, Illinois, Indiana, Utah, Nebraska, Colorado, Florida, Maryland, Massachusetts, Texas, New Mexico, Tennessee, Virginia, and the District of Columbia.
When Powell’s alleged scheme began in 2021, the FBI issued a warning, noting that criminals were increasingly using SIM-swap attacks, fueling total losses that year of $68 million.
Since then, US law enforcement has made several arrests, but none of the uncovered schemes come close to the alleged losses from the thefts Powell’s crew are being accused of.
In October, the Department of Justice sentenced a hacker, Jordan Dave Persad, to 30 months for stealing nearly $1 million from “dozens of victims.”
The original article contains 846 words, the summary contains 185 words. Saved 78%. I’m a bot and I’m open source!
shortwavesurfer@lemmy.zip 9 months ago
And this is why smart people don’t use text message to factor authentication, if at all possible. App based OTP is much safer
PlantObserver@lemmy.world 9 months ago
I wish the companies that decide to only allow SMS 2FA (or none at all) will fucking realize this sooner rather than later
hitmyspot@aussie.zone 9 months ago
Or at least be held liable for any losses.
pineapplelover@lemm.ee 9 months ago
And yubikey
shortwavesurfer@lemmy.zip 9 months ago
Exactly. I don’t have a physical key because I would want one that has open source hardware and software.