TechBriefly
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska
No Result
View All Result
TechBriefly
Home Tech Security
18 year old stole M in cryptocurrency with SIM swap hack

18 year old stole $50M in cryptocurrency with SIM swap hack

Aron HardingbyAron Harding
27 January 2020
in Security, Tech
Reading Time: 3 mins read
Share on FacebookShare on Twitter

Samy Bensaci, an 18 year old hacker has been arrested in Montreal, Canada and accused of stealing $50 million in digital currencies with SIM swap hack. The technique he used is a system that requires careful planning, as well as theft and scams at various levels.

What is a SIM swap (or Port Out) hack?

The SIM swap technique became famous a few months ago when the very founder of Twitter, Jack Dorsey acknowledged that his account had been stolen using this system.

The swapping SIM consists of using a duplicate SIM card from the victim’s phone, to steal all their data. If you have a duplicate SIM card and you know the victim’s email address, you can ask for a password change. Gmail sends you an SMS verification code to the mobile and the cybercriminal receives this SMS, because it has a copy of the SIM card. Google takes the identification as good, and the hacker can change the password and take control of the account.

The key to this technique is how the hacker gets this duplicate card. You can go to a phone shop, call helpdesk or use online services to ask for it, but for this you need some personal information. The operators usually ask for your ID or other identifying information to give you a copy of your SIM card, if you claim that it has been broken or you have lost it.

Here comes the skill: The hacker obtains this data through phishing the victim, or a family member or friend who can supply the hacker adequate information, or the hacker tries to trick the store clerk into making a copy without giving him the requested data, or using false data. Another way would be having an accomplice who works for an operator.

How did he pick his victims?

The technique that Samy Bensaci used to acquire duplicate SIM cards has not been made public. What is known is that with this data in his possession (he got several people’s data), he accessed their email and bank accounts, and obtained the keys to the cryptocurrency wallets. In total he stole around $50 million.

It has been discovered that they all had something in common: they all attended 2018 Consensus, a conference on cryptocurrencies that took place in New York. Surely there he contacted them and obtained their email addresses, names and some other information that was useful to him.

He is forbidden to use any device with internet connection

Samy Bensaci has been bailed with CA $200,000 until the trial is held, but he is forbidden to use devices that have internet connection (“any computer, tablet, mobile phone, game console, including PS3, PS4, Xbox, Nintendo Switch, or any other device capable of accessing the Internet”),his passport was seized by the authorities so that he can’t leave the country, and he is ordered to live in the custody of his parents in North Montreal by the Ontario Court of Justice. The court also prohibited him from owning or exchanging any form of cryptocurrency.

Bensaci has been described by a police source as one of the “main suspects” in an American investigation into a very active circle of pirates, who robbed dozens of people in the United States and Canada as of spring 2018.

How to protect yourself from a SIM swap scam?

You must protect your personal data from hackers, since it is needed to get hold of a copy of your SIM card. Your date of birth, phone number, passwords are enough for such scam, so you can hide these information on your social media accounts, use two factor authentication on all your accounts wherever possible.

Than you should also recognize the signs of fraud, for example if your phone line stops working or you get a SMS that your number has been put into service with another supplier or you are getting password or e-mail change mails, than you might be a victim of SIM swap hack. Contact the authorities and inform them.

Tags: cryptocurrencyhackhackerphishingscamwallet
ShareTweet
Aron Harding

Aron Harding

Related Posts

New WhatsApp update brings 2026 stickers and video call effects

New WhatsApp update brings 2026 stickers and video call effects

30 December 2025
Leaker reveals Xiaomi plans for high end eSIM device in 2026

Leaker reveals Xiaomi plans for high end eSIM device in 2026

30 December 2025
HP prepares OMEN OLED monitor reveal for CES 2026

HP prepares OMEN OLED monitor reveal for CES 2026

30 December 2025
High RAM costs from AI boom could delay next Xbox and PlayStation

High RAM costs from AI boom could delay next Xbox and PlayStation

30 December 2025
Please login to join discussion

LATEST

New WhatsApp update brings 2026 stickers and video call effects

Leaker reveals Xiaomi plans for high end eSIM device in 2026

HP prepares OMEN OLED monitor reveal for CES 2026

High RAM costs from AI boom could delay next Xbox and PlayStation

LG to unveil its Gallery TV at CES 2026

Bitcoin drops 3% to $87,300 as altcoins decline

How to install mods and custom content in The Sims 2

Running Python files and fixing path errors on Windows

How to boot your PC into Command Prompt for troubleshooting

How to delete a virus using Command Prompt

TechBriefly

© 2021 TechBriefly is a Linkmedya brand.

  • Tech
  • Business
  • Science
  • Geek
  • How to
  • About
  • Privacy
  • Terms
  • Contact
  • | Network Sites |
  • Digital Report
  • LeaderGamer

Follow Us

No Result
View All Result
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska