18 Year old Teenager Charged for Stealing Over $50 Million in Cryptocurrency using SIM-Swapping Technique

An Eighteen-year-old hacker Samy Bensaci to face four-year criminal charges for stealing over $50 Million by targeting cryptocurrency holders.

He is accused by Canadian authorities for gaining unauthorized access to cell phones of crypto-currency holders in America and Canada using the SIM-swapping technique.

The theft happened in the spring of 2018, a police representative said that “the hackers were responsible for the theft of “$50 million from our neighbors to the south and $300,000 in Canada.”

Among his victims, there are two popular Canadian crypto consultants, “head of the Blockchain Research Institute Don Tapscott and his son Alex, a globally recognized investor, advisor, and speaker on Blockchain technology and crypto-currencies.”

He was arrested in Victoria, British Columbia in November 2019 and charged for committing fraud over $5,000, identity fraud, and illegally accessing computer data.

According to the report, In December he was released in the following month on $200,000 bail and ordered to live with parents.

While staying at his residence with parents he is prohibited from accessing any computer, tablet, mobile phone, game console, including PS3, PS4, Xbox, Nintendo Switch or any other device connecting to the Internet.

The court also prohibited him from owning or exchanging any form of the cryptocurrency, particularly bitcoins.

Most of this hacking group victims are the participants of the Consensus, an annual gathering of the cryptocurrency and blockchain technology world.

“We suspect that hackers spotted targets during such events,” said Rob Ross, an American victim of this hacking scheme.

According to Lieutenant Hugo Fournier, spokesperson for the SQ, “This collaboration helped put an end to a ploy that claimed dozens of lives, involving thefts of 50 million from our neighbors to the south and $ 300,000 in Canada”


It is a type of attack in which hackers trick the telecommunication companies to port the victim’s phone numbers to the SIM card owned by attackers.

Attackers use to gather personal details of the victims by using social engineering methods or to be purchased directly from data brokers.

If they get the details then attackers mimic the victim using personal details and claim they have lost them, so need a SIM card replacement.

Once the change processed victim phone will lose connection and the number will get activated with the attacker’s SIM card.

By using this method attackers bypass the two-factor authentication process via SMS or call to mobile phones.

Read More:

10 Different Types of Malware Attack and How to Avoid them

Top 10 Cyber Attack Maps to See Digital Threats


Gurubaran is a Security Consultant, Security Editor & Co-Founder of Cyber Security News & GBHackers On Security.

View Comments

Recent Posts

New iPhone Hack Convinces Users With Fake Lockdown Mode

A post-exploitation tampering technique has been discovered that allows the malware to visually trick the…

6 hours ago

Researchers Exploited GOG Galaxy XPC for Privilege Escalation in macOS

A critical privilege escalation vulnerability has been discovered to affect macOS devices, particularly the GOG…

6 hours ago

Two Russian Nationals Charged for Hacking Government Accounts

Two Russian citizens have been charged for being involved in a campaign on behalf of the…

24 hours ago

5 Best Ways a Malware Sandbox Can Help Your Company – Threat Analysis Guide 2024

Malware sandboxes are indispensable for threat analysis, but many of their capabilities are often overlooked.…

1 day ago

Lazarus Group Attacking Crypto Users Via Telegram to Deploy Malware

In a calculated escalation of cyber warfare, the Lazarus Group, a notorious North Korea hacking…

1 day ago

Malicious Android Loan Apps Steal Users Personal & Financial Information

There were reports of several Android loan apps that pretended to be providing loan services…

1 day ago