Technology
How SIM swapping led to a $1.8M cyber fraud case

A San Fernando Valley, California, man has been sentenced to more than five years in federal prison after orchestrating a massive fraud operation that targeted dozens of victims, many of them elderly.
Oren David Sela, 36, stole mail, hijacked phone numbers through SIM swapping, and used victims’ identities to drain bank accounts, stealing over $1.8 million.
Here is how the scheme worked and what you can do to avoid becoming a victim of a similar attack.
Join The FREE CyberGuy Report: Get my expert tech tips, critical security alerts, and exclusive deals — plus instant access to my free Ultimate Scam Survival Guide when you sign up!
A SIM card. (Kurt “CyberGuy” Knutsson)
What is SIM swapping?
SIM swapping is a form of identity theft where a scammer tricks a mobile carrier into transferring your phone number to a new SIM card they control. Once they hijack your number, they can intercept text messages, including verification codes, and gain access to your bank accounts, emails and more.
There are two common ways scammers pull off SIM swaps:
- Social engineering: They impersonate you and contact your phone carrier’s customer support, claiming their phone was lost or stolen. They then convince the carrier to activate a new SIM card with your number.
- Insider threats: In some cases, scammers bribe or trick employees at mobile carriers into switching the number without following proper verification steps.
Once they control your phone number, they can:
- Receive all your incoming calls and texts
- Reset passwords on your email, bank, and social media accounts
- Bypass security alerts sent to your phone
- Lock you out of your own accounts
SIM swapping turns your phone number into a master key for stealing your identity and money.
HOW TO AVOID MALICIOUS SIM SWAPPING SCAM
Inside the $1.8M fraud scheme
Between November 2021 and October 2023, Sela stole mail from homes in Beverly Hills, California, and nearby neighborhoods. He collected personal information, including:
- Debit and credit card details
- Bank account numbers
- Social Security numbers
- Driver’s licenses
Using this information, Sela carried out SIM swapping attacks to bypass two-factor authentication (2FA) protections. This allowed him to:
- Break into victims’ online banking and financial accounts
- Open new fraudulent accounts in the victims’ names
- Transfer money into intermediary accounts he controlled
- Order new debit and credit cards linked to the victim accounts
Sela made hundreds of fraudulent withdrawals and transfers. He attempted to steal nearly $2.6 million and successfully stole at least $1.8 million.
The lavish lifestyle and his downfall
Sela often spent the stolen money on luxury goods, including a nearly $17,000 watch. In 2022, he was arrested in Beverly Hills and found with nearly $25,000 in cash, various pieces of expensive jewelry, and numerous fraudulent debit and credit cards belonging to elderly victims. Despite this arrest, Sela continued committing fraud. During two subsequent searches of his properties in 2022 and 2023, law enforcement discovered more than $70,000 in cash, stolen mail, fraudulent identification documents, and banking information linked to dozens of victims.
In October 2024, Sela pleaded guilty to bank fraud and aggravated identity theft. On April 22, 2025, he was sentenced to 61 months in federal prison and ordered to pay $1,818,369 in restitution.

Illustration of two-factor authentication. (Kurt “CyberGuy” Knutsson)
FBI WARNS ABOUT NEW EXTORTION SCAM TARGETING SENSITIVE DATA
Why SIM swapping is so dangerous
Two-factor authentication provides an extra layer of security, but it is only effective if the attacker cannot access your phone. When scammers hijack your phone number, they can intercept 2FA codes sent by text and quickly take control of your accounts. Once inside your email or banking app, they can:
- Reset passwords
- Move money
- Lock you out
- Open new lines of credit in your name
They do not even need your password if they can control your number.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Illustration of security on smart device. (Kurt “CyberGuy” Knutsson)
WHAT EXACTLY IS A DATA BREACH AND WHY SHOULD I CARE?
How to protect yourself from SIM swapping and identity theft
Take these important steps to secure your information:
1. Monitor your accounts: Regularly review your bank statements, credit card statements, and financial accounts for unauthorized activity. Report any suspicious transactions immediately.
2. Lock your SIM card: Set a PIN on your SIM card through your mobile carrier. Without it, your number cannot be moved without your permission.
3. Be cautious about sharing personal information: Limit the amount of personal information you share online, especially on social media. Scammers often use small details like birthdays, pet names, or locations to guess security questions or impersonate you.
4. Place a fraud alert: Contact one of the three major credit bureaus (Equifax, Experian, or TransUnion) and request a fraud alert. This makes it harder for identity thieves to open new accounts in your name.
5. Check your credit reports: Obtain free copies of your credit reports and review them carefully for suspicious activity. If you find errors or signs of fraud, report them right away.
6. Freeze your credit: A credit freeze prevents new accounts from being opened in your name without your consent. It is free to set up and does not affect your credit score.
7. Use an authenticator app, not SMS for two-factor authentication: Use apps like Microsoft Authenticator or Google Authenticator instead of relying on text message codes, which can be intercepted if your phone number is stolen.
8. Strengthen your passwords: Create strong, unique passwords for each account. Consider using a password manager to generate and store complex passwords securely. Get more details about my best expert-reviewed Password Managers of 2025 here.
9. Invest in identity theft protection: Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.
10. Be cautious of phishing attempts and use strong antivirus software: Watch out for emails, texts, or calls asking for personal information. Always verify the source before providing sensitive details. Installing antivirus software on all your devices can help protect you by blocking malicious links, detecting phishing attempts, and stopping malware before it can steal your private information. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.
Kurt’s key takeaways
If scammers can steal your phone number, they can steal your money, your accounts, and even your identity. SIM swapping is a serious threat because it gives criminals a shortcut around your strongest defenses. Take action today to protect your phone, your accounts, and your personal information. A few small steps can make the difference between staying safe and facing a devastating financial loss.
Have you ever been targeted by a SIM swapping scam or identity theft? Let us know by writing us at Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most-asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.

Technology
Anker is recalling over 1.1 million power banks due to fire and burn risks

The recall covers about 1,158,000 units that were sold online through Amazon, Newegg, and eBay between June 2016 and December 2022. The affected batteries can be identified by the Anker logo engraved on the side with the model number A1263 printed on the bottom edge. However, Anker is only recalling units sold in the US with qualifying serial numbers. To check if yours is included, you’ll need to visit Anker’s website.
Anker is offering affected consumers their choice of either a $30 gift card (the recalled battery cost around $27) that can be used on Anker.com, or a free 10,000mAh Anker power bank as a replacement (model A1388) featuring upgrades including a charge level display and a USB-C charging cable lanyard.
To receive the gift card or the replacement, Anker requires a “photo of the power bank with the submission date and the word ‘recall’ or ‘recalled’ written clearly in permanent marker,” to be submitted, and a “photo showing the model number and serial number (SN) printed on the bottom of the device.” The company is also requesting a purchase receipt, but it’s not mandatory to participate in the recall.
After confirming that your power bank is one of the recalled units, Anker says it should be taken to a facility that can safely dispose of lithium-ion batteries due to the risk of fire. Those facilities can be found through the Environmental Protection Agency’s website or other organizations in the US that specialize in processing e-waste. Do not throw them in the trash, recycling bins, or used battery boxes provided at various retail locations.
The recall is also a reminder that power banks and backup batteries can potentially develop severe issues over time, as these particular units are almost a decade old. If you’ve been regularly using devices featuring lithium-ion batteries for a while, you’ll want to be mindful of issues like overheating or visible swelling and dispose of them properly if you think there’s a potential problem. And while the technology is currently more expensive than lithium-ion batteries, you can also consider upgrading to solid-state batteries which are more powerful, safer, and longer lasting than what we commonly use now to power our devices.
Technology
FBI warns over 1 million Android devices hijacked by malware

NEWYou can now listen to Fox News articles!
Everything that connects to the internet can be hacked by malware.
This includes your phones (both Android and iPhones) and laptops (whether Windows, Mac or even lesser-known systems like Linux). Devices like your Wi-Fi router and security cameras aren’t safe either.
But who would have thought hackers are now targeting your smart TVs, streaming boxes, projectors and tablets, too? That’s right, the FBI warns that bad actors have hijacked over a million of these devices with malware, turning them into unwitting participants in a global cybercrime network.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join.
Remote control and smart TV (Kurt “CyberGuy” Knutsson)
FBI warns: Over 1 million smart devices infected with BadBox 2.0 malware
The FBI is warning that more than a million smart TVs, streaming boxes, projectors and tablets have been infected by a massive malware operation called BadBox 2.0. The malware turns home electronics into participants in a global network of cybercrime, often before the user even powers them on.
In a statement, the FBI says BadBox 2.0 is commonly found on cheap Android-based devices manufactured in mainland China. These include uncertified tablets, connected TV boxes and other Internet of Things hardware. Many of the infected devices ship with the malware preinstalled. Others are compromised during setup, often through malicious firmware updates or sideloaded apps from unofficial marketplaces.
FBI WARNS OF HACKERS EXPLOITING OUTDATED ROUTERS. CHECK YOURS NOW
Once infected, the devices connect to a command and control server, allowing hackers to reroute malicious traffic through home networks, load fraudulent ads in the background and carry out credential-stuffing attacks without the user knowing. Essentially, your smart TV could be quietly helping someone break into other people’s accounts.
The botnet is primarily used to turn infected devices into residential proxy nodes, providing hackers with anonymous access to real home IP addresses. That means your TV or projector might unknowingly be helping cybercriminals bypass security systems, commit ad fraud or brute-force online accounts while hiding behind your internet connection.

A person holding a tablet (Kurt “CyberGuy” Knutsson)
DON’T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOX
Badbox malware history: From TV boxes to over 1 million infected devices
BadBox first appeared in 2023 on generic TV boxes, such as the T95. The original botnet was briefly disrupted in Germany in 2024 when security researchers “sinkholed” the malware’s command servers. That wiped out part of the operation, but not for long. Just a week later, the malware reappeared on nearly 200,000 devices, including more recognizable brands like Hisense smartphones and Yandex TVs.
By March 2025, BadBox had evolved into BadBox 2.0, with more than 1 million active infections detected by HUMAN’s Satori Threat Intelligence team. The majority of devices are uncertified Android Open Source Project builds. These are not official Android TV OS products and are not protected by Google Play Protect.
Researchers say the malware has been spotted in 222 countries. A significant number of infections are concentrated in Brazil, followed by the United States, Mexico and Argentina.
The FBI, working with Google, Trend Micro, HUMAN and the Shadowserver Foundation, recently disrupted communications between more than 500,000 infected devices and their control servers. However, the botnet continues to grow as more compromised products reach consumers and remain unnoticed.
Symptoms of infection include strange app marketplaces, disabled Play Protect settings or devices advertised as being unlocked or capable of free streaming. Many of these products come from unknown brands and are sold through unofficial sellers. If you have recently purchased a budget Android TV box or projector, especially one that is not certified by Google, you may want to take a closer look.

Smart TV (Kurt “CyberGuy” Knutsson)
ANDROID SCAM LETS HACKERS USE YOUR CREDIT CARD REMOTELY
How to tell if your device might be infected with BadBox 2.0
If you’re wondering whether your smart TV, streaming box, projector or tablet could be part of the BadBox 2.0 botnet, here are some warning signs and checks you can do.
1. You bought a low-cost Android-based device from an unknown or no-name brand: Devices sold online through third-party sellers or unknown brands, especially if advertised as “unlocked,” “jailbroken” or offering free streaming, are at higher risk. Models like the T95 box or other generic Android TV boxes are known carriers. Specifically, the following devices have been identified as impacted by BadBox malware:
Device model: TV98, X96Q_Max_P, Q96L2, X96Q2, X96mini, S168, ums512_1h10_Natv, X96_S400, X96mini_RP, TX3mini, HY-001, MX10PRO, X96mini_Plus1, LongTV_GN7501E, Xtv77, NETBOX_B68, X96Q_PR01, AV-M9, ADT-3, OCBN, X96MATE_PLUS, KM1, X96Q_PRO, Projector_T6P, X96QPRO-TM, sp7731e_1h10_native, M8SPROW, TV008, X96Mini_5G, Q96MAX, Orbsmart_TR43, Z6, TVBOX, Smart, KM9PRO, A15, Transpeed, KM7, iSinbox, I96, SMART_TV, Fujicom-SmartTV, MXQ9PRO, MBOX, X96Q, isinbox, Mbox, R11, GameBox, KM6, X96Max_Plus2, TV007, Q9 Stick, SP7731E, H6, X88, X98K, TXCZ
2. Your device is not Google-certified: If your Android device doesn’t support Google Play Protect or doesn’t show the Play Protect certification in the Play Store settings, it’s likely running on an uncertified version of Android. That’s a major red flag. To check:
- Open the Google Play Store.
- Tap your profile icon > Settings > About.
- Look for Play Protect certification. If it says “Device is not certified,” that’s a problem.
3. Suspicious behavior or strange apps: Look for unfamiliar apps you didn’t install, apps labeled with foreign characters or alternative app stores on your device. BadBox-infected devices often come with shady apps preloaded.
4. Google Play Protect is disabled: If Play Protect has been turned off without your knowledge or is missing altogether, your device may be vulnerable to compromise.
5. Your home internet is acting strange: If your network is unusually slow or your router shows unknown devices connected, one of your smart devices may be hijacked and rerouting traffic as part of a residential proxy network.
6. The device came with outdated or unofficial firmware: If your device doesn’t receive software updates or has a strange update process, that’s another potential sign it’s not legit or may be compromised.
FBI WARNS OF SCAM TARGETING VICTIMS WITH FAKE HOSPITALS AND POLICE
8 ways to protect your devices from BadBox 2.0 and Android malware
Want to stay safe? Here are eight practical steps you can take to protect your smart devices from BadBox 2.0 malware and other hidden Android threats.
1. Use strong antivirus software: Protecting your devices starts with powerful antivirus protection. Malware like BadBox 2.0 often comes preinstalled on cheap, uncertified Android devices, infecting them before you even power them on. A trusted antivirus app can help detect hidden threats, block malicious traffic and warn you about suspicious behavior that might otherwise go unnoticed. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.
2. Only buy certified and trusted devices: Stick to devices certified by Google or other recognized platforms. Avoid generic or off-brand Android boxes, tablets and projectors, especially if they are advertised as unlocked or include free streaming. Cheap, uncertified devices are more likely to come with malware preinstalled.
3. Avoid sideloading apps from unofficial sources: Do not install apps from third-party app stores or download APK files from unknown websites. These files can contain hidden malware. Use only official app stores like the Google Play Store that scan apps for threats.
4. Check your device settings for tampering: Look for signs like Google Play Protect being turned off, the presence of unfamiliar app stores or suspicious apps running in the background. These are possible signs your device is compromised.
5. Monitor your network for unusual activity: If your internet slows down suddenly, or you notice unknown devices on your Wi-Fi, investigate. Use your router’s settings or a network monitoring app to track strange behavior or unauthorized connections.
6. Disconnect and replace suspicious hardware: If a device is behaving oddly or was purchased from an untrusted source, unplug it from your network. Consider replacing it with a product from a reputable brand and a verified seller.
7. Keep your devices and apps updated: Install system and app updates regularly. Even though cheap devices may not always offer updates, keeping your software current reduces your risk. Choose brands that are known for providing reliable security patches.
8. Secure your router and home network: Your devices are only as safe as the network they’re connected to. Set a strong, unique password for your Wi-Fi router and update its firmware regularly. Disable remote access unless absolutely necessary and use WPA3 encryption if available. Consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.
As BadBox 2.0 continues to evolve, protecting your entire home network, not just individual devices, has become essential to staying one step ahead of cybercriminals.
THIS IS WHAT YOU ARE DOING WRONG WHEN SCAMMERS CALL
Kurt’s key takeaway
It’s alarming how something as simple as a budget streaming box or projector could be quietly working for cybercriminals. As smart devices become part of almost everything we do, being a careful and informed consumer matters more than ever. Small steps like buying from trusted brands and avoiding unofficial downloads can make a big difference in keeping your home and personal data safe.
With over a million devices infected, who should be held accountable: manufacturers, governments or consumers? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most-asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
Meta’s new AI video tool can put you in a desert (or at least try to)

Meta is launching new video editing tools that will let you transform videos using AI. The tool, which is only free for a “limited time,” gives you more than 50 preset prompts you can use to edit your video, allowing you to set a theme, change the background, and tweak what you’re wearing.
The presets are presented similarly to how you would choose a filter on Instagram. You can have Meta AI restyle your clip as a video game or anime, make it appear as if it was taken in the desert, dress you in an AI-generated tuxedo, and more. The tool only works for the first 10 seconds of your video, though. It’s rolling out now in the US and “more than a dozen” countries in the Meta AI app, the Meta.AI website, and the Edits app.
I tried the feature out for myself, and my results certainly didn’t look as good as the examples posted on Meta’s website. I uploaded a video of my parents’ dogs digging a hole in the backyard, and asked Meta AI to make it look like they were in the desert. Meta AI turned the ground orange, put some (purple?) cacti in the foreground and background, and for some reason gave my dogs a shimmery glow. Then, when I asked it to restyle a video of myself as an anime character, Meta AI gave me fluorescent pink eyes and lips.
You can share the edited videos directly to Facebook and Instagram, or put them in the Discover feed in the Meta AI app. Though you can’t use custom prompts right now, Meta says “you’ll be able to edit videos alongside Meta AI with your own text prompts” later this year.
-
West6 days ago
Battle over Space Command HQ location heats up as lawmakers press new Air Force secretary
-
Alaska1 week ago
Interior Plans to Rescind Drilling Ban in Alaska’s National Petroleum Reserve
-
Technology1 week ago
Microsoft will finally stop bugging Windows users about Edge — but only in Europe
-
Politics1 week ago
Red state tops annual Heritage Foundation scorecard for strongest election integrity: 'Hard to cheat'
-
World1 week ago
Two suspected Ugandan rebels killed in Kampala explosion
-
Culture1 week ago
Do You Know the Jobs These Authors Had Before They Found Literary Success?
-
Politics1 week ago
Trump pushes 'Big, Beautiful Bill' as solution to four years of Biden failures: 'Largest tax cut, EVER'
-
Technology6 days ago
iFixit says the Switch 2 is even harder to repair than the original