$1,000,000 Stolen
On Oct 26 2018, AT&T gave hackers control of Robert Ross' mobile service. Minutes later, they stole $1M from him.
Read moreOn Oct 26 2018, AT&T gave hackers control of Robert Ross' mobile service. Minutes later, they stole $1M from him.
Read moreAT&T gave hackers control of Michael Terpin’s mobile service. They accessed his accounts and stole $24M.
Read moreAT&T gave a hacker control of a dozen customer accounts. He then accessed their financial accounts and stole $5M.
Read moreHackers stole $14M after SIM swapping a company. They stole from the company and the employees.
Read moreOn October 17th, 2019, Seth Shapiro filed a civil lawsuit for AT&T’s repeated failure to protect its wireless cell service subscriber, resulting in massive and ongoing violations of Mr. Shapiro’s privacy, the compromise of his highly sensitive personal and financial information, and the theft of more than $1.8 million.
On October 17th, 2019, Robert Ross filed a civil lawsuit against AT&T for enabling the attacker to gain access to his mobile number. The negligence of the AT&T resulted in massive violations of Mr. Ross’s privacy, the compromise of his highly sensitive personal and financial information, and the theft of more than $1 million.
On January 7 2018, AT&T gave hackers control of Michael Terpin's mobile service. Because of that, the hackers were able to steal $24M from Terpin. On December 28, 2018, Terpin filed a civil lawsuit against 21-year old Nicholas Truglia, claiming Truglia was the one of the hackers that stole the money.
AT&T gave hackers control of Michael Terpin's mobile service. Then the hackers were able to steal $24M from him. On August 15 2018, Terpin filed a $224M lawsuit against AT&T, for the $24M stolen and $200M in damages.
Robert Jack, a AT&T contract employee from Tuscon, Arizona, conducted twelve unauthorised SIM swaps in May of 2018, including the swap that facilitated the theft from victim Seth Shapiro.
Jarratt White is a former contract employee of AT&T residing in Arizona. He was repeatedly bribed by JD, a member of The Community to assist with their SIM swap attacks. In total, White's assistance facilitated the theft of approximately $2,143,471.69
Fendley Joseph was an employee of Verizon who was bribed by JD to assist The Community. Joseph's assistance facilitated the theft of approximately $100,000 from victim DM. JD paid Joseph to provide Personal Identifiable Information for targeted Verizon customers.
Ryan Stevenson has previously been hailed as an online security hero. Stevenson was gifted $1,000 by the third-largest mobile provider in the U.S., T-Mobile. This was after identifying a vulnerability on T-Mobile’s website which allowed anyone to access customer account PINs and home addresses. An investigative report by Krebs on Security, claimed Stevenson, had also been selling ‘doxing’ services for carriers in the U.S.
On July 18, 2018, Pasco County authorities arrested Ricky Joseph Handschumacher, an employee of the city of Port Richey, Fla, charging him with grand theft and money laundering.
In February of 2018, Abbas participated in an online chat furthering the scheme to defraud GP that was transmitted in interstate commerce. He accessed GP's cryptocurrency exchange account and transferred funds stolen from GP.
Garrett Endicott's role in The Community was to research victims and provide personally identifiable information associated with victims to facilitate the theft of their identities.
The government requested the Court to issue an order sealing the arrest warrant but authorizing the government to disclose these materials to law enforcement personnel for the arrest of Freeman and his extradition to the US.
In May of 2018, Colton Jurisic and other members of The Community knowingly used identifiers if JP for the purpose of executing a scheme to fraudulently obtain cryptocurrency during and in relation to a violation of 18 USC Sections 1343 and 2.
Hared was arrested in Tucson and made his initial appearance in the District of Arizona on January 31, 2019. He was released on a $100,000 bond. He appeared before US Magistrate Judge Laurel Beeler on February 13, 2019.
A federal grand jury indicted Matthew Gene Ditman with conspiracy to commit computer fraud and abuse, conspiracy to commit access device fraud, extortion, and aggravated identity theft. Ditman was arrested in Las Vegas and made his initial appearance in the District of Nevada on January 31, 2019. He was released on bond.
In Nov 2018, Nicholas Truglia was arrested and charged with 21 felony counts related to SIM swapping, including stealing $1M from Robert Ross. The felonies include Identity Theft, Grand Theft, Money Laundering and Aggravated White Collar Criminal Crime.
On July 12 2018, REACT arrested Joel Ortiz at Los Angeles International Airport on his way to Europe. Ortiz was charged with 44 felony counts related to SIM swapping, including multiple counts each of Identity Theft, Grand Theft, Hacking, as well as an Aggravated White Collar Criminal Crime.
In October 2018, Joseph Harris was arrested and charged with 4 felony counts related to SIM swapping, including stealing $14M from a company and its employees. The felonies include Identity Theft, Grand Theft, Money Laundering and Aggravated White Collar Criminal Crime.
On August 17, 2018, Xzavyer Narvaez was arrested and charged with 7 felony counts related to SIM swapping. The felonies include numerous charges of Identity Theft, Hacking, and Grand Theft.
In Nov 2018, Kalvin Ung was arrested and charged with 65 felony counts related to SIM swapping. The felonies include numerous charges of Identity Theft, Hacking, and Grand Theft.
Based in the heart of Silicon Valley, REACT is a cyber crime law enforcement agency comprised of local, state, and federal authorities that combats high-tech and Internet-facilitated crimes. REACT conducts criminal investigations all over the US to recover stolen digital and physical assets, minimize identity theft, and hold those responsible accountable. REACT arrested 5 suspected SIM swappers in 2018 who are now being prosecuted by the . Go to the website
Report SIM Crimes to the FBI's Internet Crime Complaint Center (IC3). The IC3 accepts online Internet crime complaints from either the actual victim or from a third party to the complainant. Go to the website.
Staff in mobile phone shops at Vodafone and O2 have become key to SIM crimes. Undercover filming caught O2 and Vodafone employees bypassing basic ID checks and giving replacement SIM cards to potential criminals. Once fraudsters gain control of a mobile number, they can intercept text messages from banks containing security codes.
A BBC Watchdog Live investigation found that millions of customers at top mobile carriers are at risk of criminals accessing their bank accounts. Undercover filming caught staff of both Vodafone and O2 giving replacement SIM cards to potential criminals without doing proper ID checks enabling them to commit SIM swap fraud.
StopSIMCrime was started in 2018 by SIM crime victims to raise awareness about the fast growing problem of SIM crimes, be a resource for victims, and effect change through legal efforts. We are raising money for public service announcements, legal actions, and creating legislation that to make it impractical for the mobile carriers to continue to give your mobile service to criminals.
LEARN MOREWe are raising awareness about the fast growing problem of SIM Crimes to consumers and legislators through our site, media efforts and presentations.
We are providing information about SIM Crimes and sharing resources to help victims, who often do not know where to turn or what to do.
We want to stop SIM Crimes by advocating for legislative change and taking court actions to inspire the carriers to solve the problem.
Your help is invaluable!
Stay informed as we add new facts and features.
We use cookies and similar technologies to recognize your repeat visits and preferences, as well as to measure the effectiveness of campaigns and analyze traffic. To learn more about cookies, including how to disable them, view our COOKIE POLICY. By clicking "I Accept" or "X" on this banner, or using our site, you consent to the use of cookies unless you have disabled them.