Technology & Innovation

How to switch SIM to a $ 1.8 million online fraud case


A man in San Fernando and the California Valley was sentenced to more than five years in prison in the federal prison after the organization Huge fraud Dozens of victims, many of whom were elderly.

Oren David Sela, 36 years old, MAIL, kidnapped phone numbers by switching SIM, used victims’ identities to drain bank accounts, and steal more than $ 1.8 million.

Here’s how the scheme works and what you can do to avoid becoming a victim of a similar attack.

Join the free CyberGuy report: Get expert advice experts, critical safety alerts and exclusive deals – in addition to immediate access to my country Ultimate survival guide When registering!

SIM card. (Cyberguy “Knutsson)

What is SIM?

SIM exchange It is a form of identity theft as it deceives the portable phone carrier to transfer your phone number to a new SIM card that they control. Once your number is kidnapped, they can intercept text messages, including verification codes, access to your bank accounts, email messages and more.

There are two common ways that withdraw the fraudsters.

  • Social Engineering: They are impersonating the character and calling the support of your phone customers, and claims that their phone has been lost or stolen. Then they persuade the carrier to activate a new SIM card with your number.
  • Inside threats: In some cases, bribery of fraudsters or deceiving employees in mobile transport companies to switch the number without following the appropriate verification steps.

Once you control your phone number, they can:

  • Receive all your incoming calls and texts
  • Recover passwords on your email accounts, bank and social media
  • Dunial security alerts have been sent to your phone
  • Close you from your own accounts

SIM swap turns your phone number into a major key to steal your identity and money.

How to avoid a malicious SIM fraud

Inside the fraud scheme of $ 1.8 million

Between November 2021 and October 2023, Sila was stolen from the houses in Beverly Hills, California, and nearby neighborhoods. Collecting personal information, including:

  • Discounts of debit and credit card
  • Bank account numbers
  • Social Security numbers
  • Driver licenses

Using this information, SELA has carried out SIM attacks to bypass dual -factors authentication (2FAProtection. This allowed him to:

  • Storming banking and financial accounts of the victims of the victims
  • Open new fraudulent accounts with the names of the victims
  • Converting money into intermediate accounts he controlled
  • Request the new debit and credit cards associated with the victim’s accounts

Sela made hundreds of withdrawals and fraudulent transfers. He tried to steal approximately $ 2.6 million and stole at least $ 1.8 million.

Luxurious lifestyle and fall

The stolen money stolen is often spent on luxury goods, including an hour of approximately $ 17,000. In 2022, he was arrested in Beverly Hills and found that approximately $ 25,000 cash, various parts of expensive jewelry, many debit cards and fraudulent credit for elderly victims. Despite this arrest, Sella continued to commit fraud. During two subsequent searches for his property in 2022 and 2023, law enforcement discovered more than $ 70,000 in cash, stolen mail, fraudulent identity documents, and banking information associated with dozens of victims.

In October 2024, Sela admitted that he was guilty of bank fraud and stolen identity. On April 22, 2025, he was sentenced to 61 months in prison and ordered to pay 1,818,369 dollars as compensation.

SIM switch 2

Explain bilateral approval. (Cyberguy “Knutsson)

The FBI warns against extracting the new blackmail targeting sensitive data

Why SIM exchange is very dangerous

The bilateral authentication provides an additional layer of safety, but it is only effective if the attacker is not able to reach your phone. When fraudsters disappear your phone number, they can intercept 2FA icons sent by the text and soon control your accounts. Once you enter your email or banking application, they can:

  • Restore passwords
  • Transfer
  • Lock up
  • Open new credit lines in your name

They do not even need your password if they can control your number.

What is artificial intelligence (AI)?

SIM Switch 3

Explanation of safety on the smart device. (Cyberguy “Knutsson)

What is exactly the breach of data and why should I care?

How to protect yourself from SIM and stealing identity

Take these important steps to secure your information:

1. Watch your accounts: Regularly review your banking data, credit card data and financial accounts of unauthorized activity. Report any suspicious transactions immediately.

2. Lock your SIM card: Set a pin on your SIM card through the mobile phone company. Without it, your number cannot be transferred without your permission.

3. Be careful about sharing personal information: Reducing the amount of personal information that she shares online, especially on social media. Budgets often use small details such as birthdays, pets or sites to guess safety questions or impersonate you.

4. Place the fraud alert: Contact one of the three main credit office (Equifax, Experian or Transnion) and ask for a fraud. This makes it difficult for ID thieves to open new accounts in your name.

5. Check your credit reports: Get free copies of your credit reports and carefully review them for suspicious activity. If you find errors or signs of fraud, immediately inform them.

Get Fox Business on the Go by clicking here

6. Freeze your credit: Credit freezing prevents new accounts from opening your name without your consent. It is free to prepare it and does not affect your credit degree.

7. Use the Authenticator app, not SMS for dual -factor authentication: Use applications such as Microsoft Authenticator or Google Authenticator Instead of relying on text messages, which can be intercepted if you stole your phone number.

8. Enhance your passwords: Create strong and unique passwords for each account. Think about using the password manager to create and store complex passwords safely. Get more details about my country The best password managers reviewed by experts in 2025 here.

9. Invest in protecting identity theft: ID theft companies can monitor personal information such as your social security number (SSN), phone number, email address and alert if sold on the dark network network or is used to open an account. They can also help you freeze bank accounts and credit card accounts to prevent more unauthorized use by criminals. Watch my advice and best choices on how to protect yourself from identity theft.

10. Be careful in attempts to hunt and use strong antivirus programs: Watch out for emails, texts or calls that require personal information. Always check the source before providing sensitive details. Installing antivirus programs on all your devices can help protect you by preventing harmful links, discovering hunting attempts, and stopping harmful programs before you can steal your own information. Get my choices for the best winners to protect antivirus 2025 for Windows, Mac, Android and iOS devices.

Kurt fast food

If the fraudsters can steal your phone number, they can steal your money, your accounts and even your identity. SIM switching is a serious threat as it gives criminals an acronym around your strongest defense. Take the action today to protect your phone, accounts and personal information. Some small steps can make the difference between staying safe and facing a devastating financial loss.

Click here to get the Fox News app

Have you ever been targeted by SIM fraud or identity theft? Let’s know through our writing in Cyberguy.com/contact

For more technical advice and security alerts, participated in the free newsletter of Cyberguy Report by going to Cyberguy.com/newsledter

Ask Court a question or tell us about the stories you want to cover.

Follow Court on his social channels:

Answers to the most amazing Cyberguy questions:

New from Court:

Copyright 2025 Cyberguy.com. All rights reserved.

Leave a Reply

Your email address will not be published. Required fields are marked *