British man pleads guilty in U.S. cybercrime case tied to $8 million cryptocurrency theft


A British national has pleaded guilty in the United States for his role in a cybercrime operation that hacked company systems, stole sensitive data, and used that information to take at least $8 million in cryptocurrency from victims across the country. U.S. prosecutors say the scheme combined SMS phishing, corporate network intrusions, and SIM swapping to break into both business and personal accounts.

Tyler Robert Buchanan, 24, of Dundee, Scotland, pleaded guilty to conspiracy to commit wire fraud and aggravated identity theft in federal court in California on April 17, 2026. He has remained in federal custody since April 2025, and U.S. District Judge John W. Holcomb set sentencing for August 21. Prosecutors say he faces a maximum of 22 years in prison.

The case matters because it shows how modern cybercrime chains several simple tactics together. Attackers first trick employees with fake text messages, then enter company systems with stolen credentials, and finally use the harvested data to identify people with valuable crypto holdings. From there, SIM swaps can let criminals intercept one-time codes and empty digital wallets.

How the scheme worked

According to Buchanan’s plea agreement, the attacks ran from September 2021 to April 2023 and hit at least a dozen companies and many individual victims in the United States. The targets included technology firms, telecom companies, business process outsourcing providers, cloud communications firms, and virtual currency companies.

Prosecutors say the group sent hundreds of phishing texts that looked like legitimate messages from employers or trusted IT vendors. Those texts led employees to fake login pages built to capture usernames, passwords, and other sensitive details. The stolen credentials were then routed to a Telegram channel that Buchanan and another co-conspirator controlled, which gave the group a quick way to move from phishing to account takeover.

Once inside company systems, the attackers stole internal files, intellectual property, and personal data such as names, email addresses, phone numbers, and account access details. Buchanan also admitted that investigators found files linked to numerous victim companies at his home in Scotland, along with data tied to individual victims, including cryptocurrency seed phrases and login information for at least one account.

Why the crypto losses grew so large

U.S. prosecutors say the stolen company data helped the group identify people who held significant virtual currency assets. The attackers then moved from corporate compromise to personal financial theft, which made the operation far more damaging than a normal credential phishing campaign.

To get past two-factor authentication, the group allegedly carried out SIM swaps. In those attacks, a criminal convinces or tricks a mobile carrier into moving a victim’s phone number to a SIM card under the attacker’s control. That lets the attacker receive verification texts and calls meant for the victim, opening the door to protected accounts, including cryptocurrency wallets. The FBI previously warned that SIM swap schemes have caused millions in losses and often target virtual currency accounts.

The sample article understated the scale of the case. The latest DOJ release says Buchanan admitted the conspiracy stole at least $8 million in virtual currency, not $1 million. It also updates the status of co-conspirator Noah Michael Urban, who is now serving a 10-year federal prison sentence and must pay $13 million in restitution. Three other defendants still face charges.

Case facts at a glance

DetailVerified update
DefendantTyler Robert Buchanan, 24, of Dundee, Scotland
Guilty pleaConspiracy to commit wire fraud and aggravated identity theft
Date of pleaApril 17, 2026
Scheme periodSeptember 2021 to April 2023
Reported crypto lossesAt least $8 million
Main tacticsSmishing, credential theft, company intrusions, SIM swapping
Sentencing dateAugust 21, 2026
Maximum sentence22 years in federal prison

What companies and users should take from this case

  • Treat text messages about password resets, account lockouts, or urgent IT actions as suspicious until you verify them through an internal channel.
  • Move high-value accounts away from SMS-based authentication where possible and use stronger authentication methods.
  • Add a PIN or password to your mobile carrier account to reduce SIM swap risk.
  • Never share a verification code sent to your phone, even if the request looks urgent or appears to come from support staff.
  • Review exposed corporate data quickly after any intrusion because attackers may use it to target employees and customers outside the company network.

FAQ

Who is Tyler Robert Buchanan?

He is a 24-year-old man from Dundee, Scotland, who pleaded guilty in U.S. federal court to participating in a cybercrime scheme that stole at least $8 million in virtual currency.

How did the attackers get into company systems?

Prosecutors say they used phishing text messages that sent employees to fake login pages, then used stolen credentials to access company accounts and networks.

What is SIM swapping?

It is a fraud technique where a criminal gets a phone number transferred to a SIM card they control so they can intercept calls and text-based security codes.

How much cryptocurrency did prosecutors say was stolen?

The latest DOJ announcement says the conspiracy stole at least $8 million in virtual currency from victims in the United States.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages