Hacker, 20, pleads guilty to crypto $ 5 million Hacker, 20, pleads guilty to stealing $ 5 million in a crypto asset "pagespeed_url_hash =" 2550588186 "onload =" pagespeed.CriticalImages.



[ad_1]

<img width = "696" height = "464" clbad = "entry-thumb td-modal-image" src = "https://www.criptomoedasfacil.com/wp-content/uploads/2019/02/ hacker_hire-100697015-large-696×464.jpg "srcset =" https://www.criptomoedasfacil.com/wp-content/uploads/2019/02/hacker_hire-100697015-large-696×464.jpg 696w, https: // www. criptomoedasfacil.com/wp-content/uploads/2019/02/hacker_hire-100697015-large-150×100.jpg 150w, https://www.criptomoedasfacil.com/wp-content/uploads/2019/02/hacker_hire-100697015-large -300×200.jpg 300w, https://www.criptomoedasfacil.com/wp-content/uploads/2019/02/hacker_hire-100697015-large-630×420.jpg 630w, https://www.criptomoedasfacil.com/wp-content /uploads/2019/02/hacker_hire-100697015-large.jpg 700w "sizes =" (max-width: 696px) 100vw, 696px "alt =" Joel Ortiz, a 20-year-old hacker, pleaded guilty to robbery and accepted a ten-year sentence of imprisonment, as announced by the Cointelegraph News Portal on Monday,

Ortiz was r found guilty of stealing $ 5 million from 40 crypto-active victims by cloning the SIM card on his phone. He accepted the settlement last week, according to Erin West, District Attorney of Santa Clara, California, United States

Ortiz will be officially sentenced on March 14. Authorities claim that he is the first individual sentenced for a SIM card cloning crime

"We believe justice has been done, we hope the message will be strong for this community," said Samy Tarazi, one of the agents who investigated Ortiz.

The cloning of SIM cards is becoming more and more popular among criminals for theft of names and connections. social media, crypto-rooms and even pbadwords, which can be sold later on a black market. In November, Nicholas Truglia, 21, was arrested for stealing a million dollars using the same technique.

During cloning, hackers call a telecommunications company that chooses to target and claims that the SIM card has been lost and would like their number to be transferred to a new card. The criminals persuade the phone companies that they own the numbers by providing the address and social security numbers of the victims.

When the telecommunications company transfers the number to a new card, hackers can ignore the following measures: two-step authentication for accounts using the phone as a recovery method. A hacker said:

"With someone's phone number, you can access all the accounts you have in a few minutes and they can not do anything about it."

Last year, authorities around the world cracked down on cryptoactive crimes. In Russia, a group of nuclear engineers was arrested by security agents after being caught using supercomputers to exploit Bitcoin.

See also: The Bitcoin Story, Part 7: The First Hacker Attack

[ad_2]
Source link