Virtual Event Today: Supply Chain Security Summit - Join Event In-Progress

Security Experts:

Connect with us

Hi, what are you looking for?



Hacker Pleads Guilty to SIM Swapping Attacks, Cryptocurrency Theft

A Rockport, Massachusetts, man has pleaded guilty over his role in a scheme targeting people who had high-value social media accounts or who were believed to have large amounts of cryptocurrency.

A Rockport, Massachusetts, man has pleaded guilty over his role in a scheme targeting people who had high-value social media accounts or who were believed to have large amounts of cryptocurrency.

The man, Declan Harrington, 21, together with co-conspirator Eric Meiggs and others, targeted people who were believed to have significant amounts of cryptocurrency or high-value social media accounts, also referred to as OG (Original Gangster) accounts, through a method called SIM swapping.

Through this technique, attackers impersonate their intended victims in conversations with their phone services providers to trick operators into transferring the victims’ phone numbers to SIM cards in the attackers’ possession.

Being in control of the SIM card, the attackers then attempt to hijack the victim’s online accounts by initiating password change procedures and requesting validation codes or other authentication codes to be sent to the phone numbers the attackers now control.

Harrington, Meiggs, and co-conspirators targeted at least 10 victims in the United States to steal or attempt to steal over $530,000 in cryptocurrency.

Meiggs, who pleaded guilty on April 28, took control of two victims’ OG accounts on social media platforms. He is scheduled for sentencing on May 24, 2022.

Harrington pleaded guilty to one count of conspiracy, one count of computer fraud and abuse, five counts of wire fraud, and one count of aggravated identity theft. He could be sentenced to up to 20 years in prison and ordered to pay a fine of up to $250,000 for the charges of wire fraud.

Related: 21-Year-Old Woman Pleads Guilty to Sending Phishing Emails to Political Candidates

Related: Estonian Botnet Operator Pleads Guilty in U.S. Court

Related: Hacker Who Sold UPMC Employee Information Pleads Guilty

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.