Noah Michael Urban, a 21-year-old from Florida, was sentenced to 10 years in prison for his role in the cybercrime group 'Scattered Spider,' which executed SIM-swapping attacks leading to significant financial losses for victims. This case highlights the growing threat of SIM-swapping and underscores the importance of cybersecurity measures to protect against such attacks.
A 21-year-old man from Palm Coast, Florida, Noah Michael Urban, was sentenced to a decade in federal prison following his involvement in a notorious cybercrime group known as "Scattered Spider." The court has also mandated that he pay approximately $13 million in restitution to the victims of his crimes.
SIM-swapping is a malicious technique used by cybercriminals to take control of a victim's phone number. By persuading mobile carriers to transfer a victim's phone number to a SIM card in their possession, attackers can intercept calls and text messages, gaining access to sensitive information such as banking credentials and two-factor authentication codes.
In April 2025, Urban pleaded guilty to charges of wire fraud and conspiracy. Prosecutors in Florida revealed that he, along with accomplices, orchestrated SIM-swapping attacks that resulted in the theft of at least $800,000 from five victims. This case highlights the alarming trend of SIM-swapping, where hackers exploit weaknesses in telecommunications to commit fraud.
The sentencing of Urban serves as a stark reminder of the serious consequences that await individuals engaged in cybercrime. The 10-year prison term reflects the severity of his actions and the impact on the victims. Additionally, the restitution order aims to provide some financial relief to those affected by his illicit activities.
As cyber threats continue to evolve, it is crucial for individuals to understand how to protect themselves from SIM-swapping attacks. Here are some essential tips to enhance your security:
The case of Noah Michael Urban serves as a crucial lesson for both individuals and businesses about the importance of cybersecurity. As technology continues to advance, so do the tactics employed by cybercriminals. Staying informed and proactive is key to safeguarding against such threats.
Marko Elez, a young employee at Elon Musk's DOGE, accidentally leaked an API key granting access to sensitive large language models from xAI. This incident raises significant cybersecurity concerns about data protection and the management of sensitive information, highlighting the urgent need for robust security protocols.
A self-replicating worm has compromised over 180 software packages on NPM, stealing and publishing developer credentials on GitHub. This article explores the implications for developers, how the worm operates, and best practices for preventing infection.
In August 2025, Microsoft addressed over 100 security vulnerabilities, including 13 rated as critical. This article highlights the risks associated with these vulnerabilities and offers best practices for users to enhance their cybersecurity posture.