Close Menu
Technotification
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Technotification
    • Home
    • News
    • How To
    • Explained
    • Facts
    • Lists
    • Programming
    • Security
    • Gaming
    Technotification
    Home › Privacy › US University Student charged for cryptocurrency theft

    US University Student charged for cryptocurrency theft

    By Ratnesh ShindeSeptember 17, 2021
    Facebook Twitter Reddit LinkedIn
    cryptocurrency theft

    After using a SIM switching scam to extort money and cryptocurrency from over 40 individuals, a university student in the United States was charged with fraud. An identity theft technique in which a victim’s phone number was taken over by a student was used in this instance.

    An announcement about the case was made public on Monday by the United States Department of Justice. Following the indictment, which was discovered by The Verge, the accused is Richard Yuan Li, who attended the University of California San Diego and graduated in 2012. On August 26, Li was charged with criminal contempt for his conduct.

    A SIM switching technique, according to the indictment, was utilized by Li to assume the identities of others by gaining control over their phone numbers, according to the accusation. Afterward, Li would contact the victims in order to extract bitcoin and other forms of payment. By using this method, Li was able to extort “at least 40 individuals.”

    Li carried off this plan with the help of an iPhone 8, which he got as a gift from Apple in 2018. Li was able to persuade the service to give him a new iPhone 8 for the one he said had been misplaced in transit.

    Using the victim’s identification as a ruse, Li contacted network providers and persuaded them to transfer the victim’s phone number to the iPhone 8. Once the network service providers gave their approval, Li had full control over the victim’s phone number and any associated accounts with it.

    The use of Li’s authority over a phone number allowed him to get access to the victim’s cryptocurrency wallet and empty it in certain circumstances. However, in the majority of instances, Li contacted the victim and demanded a ransom in cash or cryptocurrency in exchange for returning control of the phone number to the victim’s hands.

    It was alleged that Li and his co-conspirators approached victims and demanded that they pay ransoms in order to avoid further harm, which included additional account compromises, the loss of additional cryptocurrency, and the disclosure of victims’ confidential information that the conspirators had obtained, according to the Department of Justice’s indictment.

    Phone numbers are one of the most important means of establishing one’s identity nowadays, which means that having one’s phone number hacked may be a serious problem for anybody. As part of the verification process for almost all online services that use two-factor authentication, a phone number must be provided. Because Li gained influence of the victims’ phone numbers, he was able to get access to their accounts.

    Li is now facing accusations of wire fraud, aggravated identity theft, and “intent to extort and conduct computer fraud and abuse,” according to the criminal complaint. If found guilty, Li could face up to 20 years in jail and a fine of up to $250,000 if he is found guilty.

    Share. Facebook Twitter LinkedIn Tumblr Reddit Telegram WhatsApp
    Ratnesh Shinde

    Related Posts

    Understanding the Role of Cybersecurity in Emerging Technologies

    June 5, 2025

    NVIDIA GeForce NOW is Finally Coming to India

    January 8, 2025

    The Psychology of a Phishing Email: How Scammers Play with Your Mind

    July 16, 2024

    9 Essential Elements of a Strong Cyber Security Management System

    July 3, 2024

    Common Cyber Attacks and How to Prevent Them

    July 3, 2024

    How Cyber Security Paid Training Prepares You for Real-World Threats

    June 13, 2024
    Lists You May Like

    10 Best RARBG Alternative Sites in April 2025 [Working Links]

    April 1, 2025

    5 Best Torrent Sites for Software in 2025

    January 2, 2025

    10 Best Torrent Search Engine Sites (2025 Edition)

    February 12, 2025

    10 Sites to Watch Free Korean Drama [2025 Edition]

    January 2, 2025

    The Pirate Bay Proxy List in 2025 [Updated List]

    January 2, 2025

    10 Best Torrent Sites for eBooks in 2025 [Working]

    January 2, 2025

    10 Best GTA V Roleplay Servers in 2025 (Updated List)

    January 6, 2025

    1337x Alternatives, Proxies, and Mirror Sites in 2025

    January 2, 2025

    10 Best Anime Torrent Sites in 2025 [Working Sites]

    January 6, 2025

    Call of Duty Warzone: All Bunker Codes and Locations

    December 4, 2022
    Pages
    • About
    • Contact
    • Privacy
    • Careers
    Privacy

    Information such as the type of browser being used, its operating system, and your IP address is gathered in order to enhance your online experience.

    © 2013 - 2025 Technotification | All rights reserved.

    Type above and press Enter to search. Press Esc to cancel.