DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

SIM Swapper Sentenced to 3 Years of Probation and Ordered to Pay Restitution After Pleading Guilty for Role in SIM Swap Scam Targeting at Least 40 People, Including New Orleans Resident

Posted on August 10, 2022 by Dissent

NEW ORLEANS –  U.S. Attorney Duane A. Evans announced that RICHARD YUAN LI, age 21, a resident of Hercules, California, was sentenced today by United States District Judge Greg G. Guidry to three years of probation and 100 hours of community service for his role in a SIM Swap scam that targeted at least forty people, including a New Orleans-area physician (Victim A).  Additionally, Judge Guidry sentenced LI to pay restitution in the amount of $61,117,50 and pay a mandatory $100 special assessment fee.

According to court documents, a SIM Swap scam is a cellular phone account takeover fraud that results in the routing of a victim’s incoming calls and text messages to a different phone. Once a perpetrator is able to swap the SIM card, it is likely he is able to obtain access to a victim’s various personal accounts, including email accounts, bank accounts, and cryptocurrency accounts, as well as any other accounts that use two-factor authentication.

LI participated in a scheme that involved multiple parts.  First, in January 2018, they defrauded Apple, Inc. into providing a second Apple iPhone without paying for it by convincing an Apple customer service representative that they had not received an Apple iPhone 8 they ordered (hereinafter “the Apple iPhone 8”).  LI took possession of the Apple iPhone 8.  LI and his co-conspirators then arranged for victims’ telephone numbers to be swapped to SIM cards contained in cellular phones in their possession, including the Apple iPhone 8.  Between July 2018 and December 2018, LI participated in unauthorized SIM Swaps with his co-conspirators that targeted at least forty phone numbers.

On November 10, 2018, Victim A’s telephone number was swapped to the Apple iPhone 8, which LI kept in his dorm room at a university in California.  The SIM swap caused the transmission of a series of writings, signs, signals, and sounds that traveled in interstate commerce, including between the States of Florida, Louisiana, and California.  Thereafter, LI and his co-conspirators gained access to Victim A’s email accounts and cryptocurrency accounts.  Thereafter, one or more members of the conspiracy called Victim A and threatened to release contents of his email account unless Victim A paid a 100 Bitcoin ransom.  Ultimately, they were able to steal approximately $57,117.50 worth of cryptocurrency before Victim A was able to regain control of his accounts.  LI’s participation in a SIM Swap of another individual on December 4, 2018, caused that victim to lose approximately $4,000.  In total, between July 19, 2018, and December 6, 2018, LI participated in unauthorized SIM Swaps with his co-conspirators that targeted at least forty victims.  In about March 2019, LI sold his Apple iPhone 8 to a friend, E.W; law enforcement authorities executed a search warrant on LI’s dorm room in the San Diego, California area on about June 14, 2019.

U.S. Attorney Evans praised the work of the Federal Bureau of Investigation.  Assistant United States Attorney Jordan Ginsberg, supervisor of the Public Corruption Unit, is in charge of the prosecution.

Source: U.S. Attorney’s Office, Eastern District of Louisiana

Related posts:

  • U.K. Citizen Extradited and Pleads Guilty to Cyber Crime Offenses
  • FBI Arrests Alabama Man in the January 2024 SEC X Hack that Spiked the Value of Bitcoin
Category: Other

Post navigation

← SCOOP: ista International takes systems offline in wake of ransomware attack; Daixin Team claims thousands of servers encrypted
CISCO got hit… and immediately took control of the story →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • India’s Max Financial says hacker accessed customer data from its insurance unit
  • Brazil’s central bank service provider hacked, $140M stolen
  • Iranian and Pro-Regime Cyberattacks Against Americans (2011-Present)
  • Nigerian National Pleads Guilty to International Fraud Scheme that Defrauded Elderly U.S. Victims
  • Nova Scotia Power Data Breach Exposed Information of 280,000 Customers
  • No need to hack when it’s leaking: Brandt Kettwick Defense edition
  • SK Telecom to be fined for late data breach report, ordered to waive cancellation fees, criminal investigation into them launched
  • Louis Vuitton Korea suffers cyberattack as customer data leaked
  • Hunters International to provide free decryptors for all victims as they shut down (2)
  • SEC and SolarWinds Seek Settlement in Securities Fraud Case

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • German court awards Facebook user €5,000 for data protection violations
  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t
  • Oregon Amends Its Comprehensive Privacy Statute

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.