Cryptocurrency Fraud , Endpoint Security , Fraud Management & Cybercrime

SIM-Swapping Hackers Steal Celebrities' Cryptocurrency

Police Arrest 10 Suspects on Hacking, Fraud and Money Laundering Charges
SIM-Swapping Hackers Steal Celebrities' Cryptocurrency
Photo: National Crime Agency

Police have arrested 10 individuals suspected of being part of an international gang that targeted U.S. celebrities by taking control of their phone numbers to steal large amounts of cash and cryptocurrency.

See Also: Six Key Trends in MDR 2024: What Top Security Teams are Looking For?

Authorities say the gang used SIM-swapping attacks to steal victims' phone numbers, reset passwords and then seize control of their bank accounts and cryptocurrency wallets.

"The attacks orchestrated by this criminal gang targeted thousands of victims throughout 2020, including famous internet influencers, sports stars, musicians and their families," says Europol, the EU's law enforcement agency.

"The criminals are believed to have stolen from them over $100 million in cryptocurrencies after illegally gaining access to their phones," says Europol, which helped coordinate the year-long investigation that involved law enforcement agencies in the U.K., U.S., Belgium, Malta and Canada.

Britain's National Crime Agency says eight men - aged 18 to 26 - were arrested in England and Scotland on Tuesday as part of the investigation. That followed the earlier arrest of two suspected members of the gang in Malta and Belgium.

Europol says the gang used SIM-swapping attacks, which "involve cybercriminals taking over use of a victim’s phone number by essentially deactivating their SIM and porting the allocated number over to a SIM belonging to a member of the criminal network."

After that, the NCA says that criminals used the "change password" function on apps to change the password to one that they controlled, which then allowed them to receive reset codes sent via SMS to the phone. "After changing the passwords, the victim is denied access and the criminals have free reign over their contacts, banking apps, emails and social media accounts," the NCA says.

Gang Sought 'Lucrative Targets'

Police say the gang they disrupted chose their victims with an eye to maximizing their illicit returns.

“This network targeted a large number of victims in the U.S. and regularly attacked those they believed would be lucrative targets," says Paul Creffield, head of operations in the NCA’s National Cyber Crime Unit. “As well as causing a lot of distress and disruption, we know they stole large sums from their victims, from either their bank accounts or bitcoin wallets."

Police say they were able to alert some victims about their phone numbers being seized by the gang.

All of the suspects arrested in the U.K. face prosecution under the country's Computer Misuse Act, as well as on fraud and money laundering charges. They also face extradition to face U.S. charges.

In the U.S., the FBI, Department of Homeland Security, Secret Service and California's Santa Clara District Attorney’s Office all were part of the investigation.

“The multijurisdictional arrests announced today illustrate the importance of building strong partnerships," says Michael D’Ambrosio, the assistant director of the Secret Service's Office of Investigations. "The Secret Service would like to thank our domestic and international law enforcement partners for their steadfast commitment and cooperation in this case."

SIM-Swapping Attacks on the Rise

Europol's latest Internet Organized Crime Threat Assessment, released last October, singled out SIM swapping as a rising crime trend, warning that the tactic has been causing "significant losses" and also attracting much more attention from law enforcement agencies.

"As a highly targeted type of social engineering attack, SIM swapping can have potentially devastating consequences for its victims, by allowing criminals to bypass text message-based two-factor authentication measures gaining full control over their victims’ sensitive accounts," the report stated.

Cryptocurrency-Enabled Crime Trends

News of the arrests comes in the wake of a new report from blockchain analysis firm Chainalysis, which found that the overall value of cryptocurrency tied to crime in 2020 decreased from 2019.

Source: Chainalysis

The pseudo-anonymous nature of bitcoin and other cryptocurrencies, as well as the increased privacy features that are a component of monero and some other types of cryptocurrency, have led to widespread adoption by criminals and nation-states - for example, for money laundering.

North Korean Hackers Seek Cryptocurrency

Cryptocurrency exchanges, many of which lack regulated financial services firms' investment and expertise in security matters, have also been repeat hacking targets for criminals and nation-states alike.

North Korean leader Kim Jong-un watches a missile demonstration in 2019. (Photo: Korean Central News Agency)

Since at least mid-2017, for example, hackers affiliated with the government of North Korea have been targeting cryptocurrency exchanges and banks to fund the regime, which faces tough economic sanctions, many of which were imposed over the country's nuclear weapons program.

The UN says from January 2017 to September 2018, North Korea carried out at least five successful attacks against cryptocurrency exchanges in Asia, resulting in the theft of $571 million in currency.

In late 2019, a UN report warned that “widespread and increasingly sophisticated” cyberattacks tied to North Korea continued to help fund the regime as well as drive an estimated $2 billion into developing weapons of mass destruction.

On Tuesday, Japan's financial newspaper Nikkei reported that a new UN report prepared for the Security Council's North Korea Sanctions Committee estimates that in 2019 and 2020, North Korea stole $316 million from cryptocurrency exchanges. The report said $218 million had been stolen by hacking a cryptocurrency exchange in September 2020. Timing-wise, that would be a fit for the hack of Singapore-headquartered exchange KuCoin, which lost an estimated $281 million via a hack on Sept. 26, 2020.

The UN report also notes that North Korean hackers in at least two cases used "chain hopping" - buying stolen cryptocurrencies using other types of cryptocurrency - to help launder stolen funds, using traders in China, Nikkei reports.

About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.