Three people have been charged with orchestrating a $400 million hack that is reportedly tied to failed cryptocurrency exchange FTX. A grand jury charged them, ArsTechnica reported, with two counts of conspiracy to commit wire fraud and aggravated identity theft and access device fraud stemming from nearly two years of SIM swapping crimes.
According to prosecutors, Americans Robert Powell, Carter Rohn, and Emily Hernandez carried out SIM swap attacks between March 2021 and April 2023.
The court document cited by ArsTechnica, however, does not mention FTX or its founder Sam Bankman-Fried, by name. Instead, it used the moniker Victim Company-1. A subsequent Bloombergreport today cites unnamed sources confirming that Victim Company-1 is indeed FTX.
Around Nov. 11, 2022, Hernandez used a fake ID with an FTX employees details to convince AT&T to transfer the mobile phone account to another SIM card, Bloomberg said. The alleged ringleader of the group, Powellwho uses online monikers R$ and ElSwapo1then used various authentication codes to access FTXs crypto wallets.
Several targets are listed in the indictment, but one entry, in particular, had many speculating that it may be the hack that targeted FTX on the same day the company filed for Chapter 11 bankruptcy in late 2022.
On or about November 11, 2022, and continuing into November 12, 2022, co-conspirators transferred over $400 million in virtual currency from Victim Company-1s virtual currency wallets to virtual currency wallets controlled by the co-conspirators, prosecutors said.
Investigating abnormalities with wallet movements related to consolidation of FTX balances across exchanges, FTX US general counsel Ryne Miller said at the time in a now-deleted tweet.
Over the 24 hours, over $650 million was stolen, according to blockchain detective ZachXBT.
Sim jacking or SIM swapping is a type of cyberattack that involves taking over someones phone number by talking carrier customer support workers into transferring it to a different SIM card. Hackers can then use the reassigned SIMs to bypass two-factor authentication and access the victims online accounts, such as bank accounts, social media accounts, and email accounts.
WE AND OUR PARTNERS USE COOKIES ON THIS SITE TO IMPROVE OUR SERVICE, PERFORM ANALYTICS, PERSONALIZE ADVERTISING, MEASURE ADVERTISING PERFORMANCE, AND REMEMBER WEBSITE PREFERENCES.
By using this website, you automatically accept that we use cookies.
To learn more about use of cookies see our Privacy Policy. Learn More.