

Evan Frederick Light Pleads Guilty to Cyber Conspiracies That Stole $37 Million in Cryptocurrency
The U.S. Department of Justice announced on October 1st that Light unlawfully accessed the computer servers of an investment firm.
Evan Frederick Light, a 32-year-old Indiana resident, pleaded guilty on Monday to two counts of conspiracy for a large-scale crypto theft scam that targeted nearly 600 victims and resulted in losses exceeding $37 million.
Light's scheme involved a phishing and SIM-swapping technique to gain access to victims' personal accounts, including their crypto wallets. This enabled the conspirators to transfer substantial amounts of digital assets from the victims' wallets.
According to the plea agreement, Light and his co-conspirators targeted victims in several states, including Indiana, California, Florida, Georgia, Illinois, Kentucky, Maryland, Massachusetts, Minnesota, Missouri, New Jersey, New York, Ohio, Pennsylvania, South Carolina, Tennessee, Texas, Virginia, Washington, and Wisconsin.
The conspirators used phishing emails and text messages to trick victims into providing their personal information, such as usernames, passwords, and two-factor authentication codes. They also used a technique called SIM-swapping to gain control of victims' phone numbers and intercept text messages containing the two-factor authentication codes.
Once the conspirators gained access to the victims' personal accounts, they used the information to reset the passwords for the victims' crypto wallets and then transferred the digital assets to wallets controlled by the conspirators.
In total, the conspirators stole approximately $37,233,333 in cryptocurrency from the victims. The stolen cryptocurrency included Bitcoin, Ethereum, Litecoin, XRP, and several stablecoins pegged to the U.S. dollar.
Light faces a maximum sentence of 20 years in prison for each count of conspiracy to which he pleaded guilty. The Court will determine the specific sentence at a later hearing.
The above is the detailed content of Evan Frederick Light Pleads Guilty to Cyber Conspiracies That Stole $37 Million in Cryptocurrency. For more information, please follow other related articles on the PHP Chinese website!

The only official website: [adid]9f61408e3afb633e50cdf1b20de6f466[/adid] [adid]758691fdf7ae3403db0d3bd8ac3ad585[/adid]

The steps to log in to the Binance platform through the Binance web version login portal are as follows: 1. Visit the Binance official website; 2. Click the "Login" button in the upper right corner of the page, enter the email or mobile phone number and password, and enter the authentication code after enabling 2FA; 3. After successful login, you can conduct transactions and account management.

The way to access the Binance official website is to directly enter the URL in the browser. To register a Binance account, you need to visit the official website, click "Register", fill in the information, verify the email address and complete the KYC. Transactions need to log in, enter the trading platform, select the trading pair, enter the quantity and confirm. Deposits and withdrawals require login, entry into the "Wallet", select currency, generate or enter the address and confirm. To ensure the security of the account, you need to enable 2FA, use a strong password, enable anti-phishing codes, and regularly view login records.

The Binance App Trading Platform portal can be downloaded through the Apple App Store or Google Play Store. To access Binance transactions, you need to open your browser and verify the security of the website; after downloading the Binance App, you need to register or log in, and it is recommended to start trading after authentication.

The top ten virtual currency trading platform apps are: 1. Binance, 2. OKX, 3. Huobi, 4. Coinbase, 5. Kraken, 6. Bitfinex, 7. KuCoin, 8. Gemini, 9. Bittrex, 10. Poloniex. These platforms all provide high security, multiple trading modes and preferential transaction fees, which are suitable for users at different levels.

The latest rankings of the top ten digital currency trading platform apps are: 1. Binance, 2. OKX, 3. Huobi, 4. Coinbase, 5. Kraken, 6. Bittrex, 7. Bitfinex, 8. Poloniex, 9. KuCoin, 10. Gemini, these platforms are highly regarded for their high transaction volume, rich trading pairs, user-friendly interface and powerful security measures.

The top ten safe and reliable virtual currency trading apps are recommended as follows: 1. Binance, 2. OKX, 3. Huobi, 4. Coinbase, 5. Kraken, 6. Bitfinex, 7. Bittrex, 8. Poloniex, 9. Gemini, 10. KuCoin, these apps provide a variety of trading pairs and efficient trading services to ensure the security of user funds and personal information.

Recommended Top Ten Digital Currency Trading Platforms in 2025: 1. Binance, 2. OKX, 3. Huobi, 4. Coinbase, 5. Kraken, 6. Bitfinex, 7. Bittrex, 8. Poloniex, 9. KuCoin, 10. Gemini, these platforms are popular for their high transaction volume, rich trading pairs, user-friendly interfaces and strong security measures.

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

PhpStorm Mac version
The latest (2018.2.1) professional PHP integrated development tool

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

SublimeText3 Chinese version
Chinese version, very easy to use

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

Dreamweaver Mac version
Visual web development tools
