“Check has been received and deposited. I’d like to give one final thank you to everyone on your team for all the hard work you all have done. This money will be changing my life for the better. This is also my first experience working with and having lawyers, and I will say that it was a very positive experience. I wish you all well in your future endeavors. Thank you!”
“SIM swapping” is a growing cybersecurity crime. “SIM card” refers to a (S)ubscriber (I)dentity (M)odule used in cell phones to authenticate subscribers’ mobile phone accounts. A SIM card is what allows a mobile phone to connect to a mobile phone carrier’s mobile network.
An unauthorized SIM swap occurs when a mobile phone carrier, including T-Mobile, Verizon, or AT&T, transfers a customer’s mobile phone service to an unauthorized person. The unauthorized person then receives all phone calls and text messages made and sent to the customer’s (the victim) mobile phone number. Those text messages can include text messages that a cryptocurrency platform (such as Coinbase, Crypto.com, or Binance) sends to the victim’s mobile phone number with a one-time two-factor-authentication (2FA) code. The unauthorized person then can use that 2FA code to access the victim’s cryptocurrency account and steal the victim’s cryptocurrency.