Two Massachusetts men were sentenced on Wednesday for using SIM-swapping and other hacking techniques to steal cryptocurrencies as well as controlling victims’ social media accounts.
According to a press release from the Department of Justice, 24-year-old Eric Meiggs and 22-year-old Declan Harrington targeted executives of cryptocurrency exchanges, who have a high chance of holding a large number of cryptos. In addition, they targeted high-value social media profiles.
The perpetrators illegally took control of the online accounts of the victims for stealing high-value things like cryptocurrencies
Cryptocurrencies
By using cryptography, virtual currencies, known as cryptocurrencies, are nearly counterfeit-proof digital currencies that are built on blockchain technology. Comprised of decentralized networks, blockchain technology is not overseen by a central authority.Therefore, cryptocurrencies function in a decentralized nature which theoretically makes them immune to government interference. The term, cryptocurrency derives from the origin of the encryption techniques that are employed to secure the networks which are used to authenticate blockchain technology. Cryptocurrencies can be thought of as systems that accept online payments which are denoted as “tokens.” Tokens are represented as internal ledger entries in blockchain technology while the term crypto is used to depict cryptographic methods and encryption algorithms such as public-private key pairs, various hashing functions, and an elliptical curve. Every cryptocurrency transaction that occurs is logged in a web-based ledger with blockchain technology.These then must be approved by a disparate network of individual nodes (computers that maintain a copy of the ledger). For every new block generated, the block must first be authenticated and confirmed ‘approved’ by each node, which makes forging the transactional history of cryptocurrencies nearly impossible. The World’s First CryptoBitcoin became the first blockchain-based cryptocurrency and to this day is still the most demanded cryptocurrency and the most valued. Bitcoin still contributes the majority of the overall cryptocurrency market volume, though several other cryptos have grown in popularity in recent years.Indeed, out of the wake of Bitcoin, iterations of Bitcoin became prevalent which resulted in a multitude of newly created or cloned cryptocurrencies. Contending cryptocurrencies that emerged after Bitcoin’s success is referred to as ‘altcoins’ and they refer to cryptocurrencies such as Bitcoin, Peercoin, Namecoin, Ethereum, Ripple, Stellar, and Dash. Cryptocurrencies promise a wide range of technological innovations that have yet to be structured into being. Simplified payments between two parties without the need for a middle man is one aspect while leveraging blockchain technology to minimize transaction and processing fees for banks is another. Of course, cryptocurrencies have their disadvantages too. This includes issues of tax evasion, money laundering, and other illicit online activities where anonymity is a dire ingredient in solicitous and fraudulent activities.
By using cryptography, virtual currencies, known as cryptocurrencies, are nearly counterfeit-proof digital currencies that are built on blockchain technology. Comprised of decentralized networks, blockchain technology is not overseen by a central authority.Therefore, cryptocurrencies function in a decentralized nature which theoretically makes them immune to government interference. The term, cryptocurrency derives from the origin of the encryption techniques that are employed to secure the networks which are used to authenticate blockchain technology. Cryptocurrencies can be thought of as systems that accept online payments which are denoted as “tokens.” Tokens are represented as internal ledger entries in blockchain technology while the term crypto is used to depict cryptographic methods and encryption algorithms such as public-private key pairs, various hashing functions, and an elliptical curve. Every cryptocurrency transaction that occurs is logged in a web-based ledger with blockchain technology.These then must be approved by a disparate network of individual nodes (computers that maintain a copy of the ledger). For every new block generated, the block must first be authenticated and confirmed ‘approved’ by each node, which makes forging the transactional history of cryptocurrencies nearly impossible. The World’s First CryptoBitcoin became the first blockchain-based cryptocurrency and to this day is still the most demanded cryptocurrency and the most valued. Bitcoin still contributes the majority of the overall cryptocurrency market volume, though several other cryptos have grown in popularity in recent years.Indeed, out of the wake of Bitcoin, iterations of Bitcoin became prevalent which resulted in a multitude of newly created or cloned cryptocurrencies. Contending cryptocurrencies that emerged after Bitcoin’s success is referred to as ‘altcoins’ and they refer to cryptocurrencies such as Bitcoin, Peercoin, Namecoin, Ethereum, Ripple, Stellar, and Dash. Cryptocurrencies promise a wide range of technological innovations that have yet to be structured into being. Simplified payments between two parties without the need for a middle man is one aspect while leveraging blockchain technology to minimize transaction and processing fees for banks is another. Of course, cryptocurrencies have their disadvantages too. This includes issues of tax evasion, money laundering, and other illicit online activities where anonymity is a dire ingredient in solicitous and fraudulent activities. Read this Term. They allegedly siphoned around $330,000 in cryptocurrencies from at least ten victims.
For the crimes, Meiggs has been sentenced to two years and one day in prison, while Harrington has been imprisoned for two years and seven days.
An Infamous Hacking Technique
SIM-swapping is an infamous technique used by criminals to gain control of victims’ phone numbers and thus access online accounts.
“In ‘SIM swapping’, cybercriminals convince a victim’s cell phone carrier to reassign the victim’s cell phone number from the SIM card (Subscriber Identity Module card) inside the victim’s cell phone to the SIM card inside a cell phone controlled by the cybercriminals,” the Department of Justice explained.
“Cybercriminals then pose as the victim with an online account provider and request that the provider send account password-reset links or an authentication code to the SIM-swapped device now controlled by the cybercriminals. The cybercriminals can then reset the victim’s account log-in credentials and use the log-in credentials to access the victim’s account without authorization, or ‘hack into’ the account.”
Multiple mobile carriers in the United States have also faced lawsuits by the victims of SIM swappings. Despite many precautions by telecom operators, such scams are very hard to prevent.
Earlier this year, YouTube accounts of multiple crypto influencers were compromised using SIM-swapping. However, that incident only resulted in promotions of scams and did not result in a high-value theft.
Two Massachusetts men were sentenced on Wednesday for using SIM-swapping and other hacking techniques to steal cryptocurrencies as well as controlling victims’ social media accounts.
According to a press release from the Department of Justice, 24-year-old Eric Meiggs and 22-year-old Declan Harrington targeted executives of cryptocurrency exchanges, who have a high chance of holding a large number of cryptos. In addition, they targeted high-value social media profiles.
The perpetrators illegally took control of the online accounts of the victims for stealing high-value things like cryptocurrencies
Cryptocurrencies
By using cryptography, virtual currencies, known as cryptocurrencies, are nearly counterfeit-proof digital currencies that are built on blockchain technology. Comprised of decentralized networks, blockchain technology is not overseen by a central authority.Therefore, cryptocurrencies function in a decentralized nature which theoretically makes them immune to government interference. The term, cryptocurrency derives from the origin of the encryption techniques that are employed to secure the networks which are used to authenticate blockchain technology. Cryptocurrencies can be thought of as systems that accept online payments which are denoted as “tokens.” Tokens are represented as internal ledger entries in blockchain technology while the term crypto is used to depict cryptographic methods and encryption algorithms such as public-private key pairs, various hashing functions, and an elliptical curve. Every cryptocurrency transaction that occurs is logged in a web-based ledger with blockchain technology.These then must be approved by a disparate network of individual nodes (computers that maintain a copy of the ledger). For every new block generated, the block must first be authenticated and confirmed ‘approved’ by each node, which makes forging the transactional history of cryptocurrencies nearly impossible. The World’s First CryptoBitcoin became the first blockchain-based cryptocurrency and to this day is still the most demanded cryptocurrency and the most valued. Bitcoin still contributes the majority of the overall cryptocurrency market volume, though several other cryptos have grown in popularity in recent years.Indeed, out of the wake of Bitcoin, iterations of Bitcoin became prevalent which resulted in a multitude of newly created or cloned cryptocurrencies. Contending cryptocurrencies that emerged after Bitcoin’s success is referred to as ‘altcoins’ and they refer to cryptocurrencies such as Bitcoin, Peercoin, Namecoin, Ethereum, Ripple, Stellar, and Dash. Cryptocurrencies promise a wide range of technological innovations that have yet to be structured into being. Simplified payments between two parties without the need for a middle man is one aspect while leveraging blockchain technology to minimize transaction and processing fees for banks is another. Of course, cryptocurrencies have their disadvantages too. This includes issues of tax evasion, money laundering, and other illicit online activities where anonymity is a dire ingredient in solicitous and fraudulent activities.
By using cryptography, virtual currencies, known as cryptocurrencies, are nearly counterfeit-proof digital currencies that are built on blockchain technology. Comprised of decentralized networks, blockchain technology is not overseen by a central authority.Therefore, cryptocurrencies function in a decentralized nature which theoretically makes them immune to government interference. The term, cryptocurrency derives from the origin of the encryption techniques that are employed to secure the networks which are used to authenticate blockchain technology. Cryptocurrencies can be thought of as systems that accept online payments which are denoted as “tokens.” Tokens are represented as internal ledger entries in blockchain technology while the term crypto is used to depict cryptographic methods and encryption algorithms such as public-private key pairs, various hashing functions, and an elliptical curve. Every cryptocurrency transaction that occurs is logged in a web-based ledger with blockchain technology.These then must be approved by a disparate network of individual nodes (computers that maintain a copy of the ledger). For every new block generated, the block must first be authenticated and confirmed ‘approved’ by each node, which makes forging the transactional history of cryptocurrencies nearly impossible. The World’s First CryptoBitcoin became the first blockchain-based cryptocurrency and to this day is still the most demanded cryptocurrency and the most valued. Bitcoin still contributes the majority of the overall cryptocurrency market volume, though several other cryptos have grown in popularity in recent years.Indeed, out of the wake of Bitcoin, iterations of Bitcoin became prevalent which resulted in a multitude of newly created or cloned cryptocurrencies. Contending cryptocurrencies that emerged after Bitcoin’s success is referred to as ‘altcoins’ and they refer to cryptocurrencies such as Bitcoin, Peercoin, Namecoin, Ethereum, Ripple, Stellar, and Dash. Cryptocurrencies promise a wide range of technological innovations that have yet to be structured into being. Simplified payments between two parties without the need for a middle man is one aspect while leveraging blockchain technology to minimize transaction and processing fees for banks is another. Of course, cryptocurrencies have their disadvantages too. This includes issues of tax evasion, money laundering, and other illicit online activities where anonymity is a dire ingredient in solicitous and fraudulent activities. Read this Term. They allegedly siphoned around $330,000 in cryptocurrencies from at least ten victims.
For the crimes, Meiggs has been sentenced to two years and one day in prison, while Harrington has been imprisoned for two years and seven days.
An Infamous Hacking Technique
SIM-swapping is an infamous technique used by criminals to gain control of victims’ phone numbers and thus access online accounts.
“In ‘SIM swapping’, cybercriminals convince a victim’s cell phone carrier to reassign the victim’s cell phone number from the SIM card (Subscriber Identity Module card) inside the victim’s cell phone to the SIM card inside a cell phone controlled by the cybercriminals,” the Department of Justice explained.
“Cybercriminals then pose as the victim with an online account provider and request that the provider send account password-reset links or an authentication code to the SIM-swapped device now controlled by the cybercriminals. The cybercriminals can then reset the victim’s account log-in credentials and use the log-in credentials to access the victim’s account without authorization, or ‘hack into’ the account.”
Multiple mobile carriers in the United States have also faced lawsuits by the victims of SIM swappings. Despite many precautions by telecom operators, such scams are very hard to prevent.
Earlier this year, YouTube accounts of multiple crypto influencers were compromised using SIM-swapping. However, that incident only resulted in promotions of scams and did not result in a high-value theft.
Valletta, Malta, November 18th, 2024, Chainwire LaunchPunks has formally launched, introducing a gamified and community-centric strategy to the crypto launchpad...