Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Security Education Videos Scams & Phishing Your Security Mobile Security Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
SIM Swap Attack Transfers Mobile Numbers To Cyber Thieves
Facebook   X   LinkedIn   Email

SIM Swap Attack Transfers Mobile Numbers To Cyber Thieves

September 17, 2023

We haven’t talked about supply chain breaches much lately, but that doesn’t mean they don’t happen anymore. In fact, there was a recent such breach at Kroll, a firm specializing in risk and financial advisory services. This one had far-reaching consequences, affecting downstream customers and exposing the personal information of numerous claimants. These claimants were involved in bankruptcy proceedings linked to cryptocurrency trading firms like FTX, BlockFI, and Genesis. This incident serves as a poignant reminder of the persistent threat that organizations face from SIM-swapping attacks, because that’s what happened in this case.

A SIM swap, short for Subscriber Identity Module swap, is a technique used by cybercriminals to take control of a victim's mobile phone number. This scam has gained notoriety in recent years due to the ability of the criminals to not only steal your phone number but steal so many other things too, such as your bank account contents.

Here's how a SIM swap generally works:

  • The Reconnaissance Phase: The attacker first collects information about a victim. This might include their name, phone number, and other personal details. They often obtain this information through social engineering, data breaches, or phishing attacks. Sometimes they just purchase it from someone on the dark web.
  • The Impersonation: Armed with the victim's details, the attacker contacts the customer support line for the victim’s mobile carrier, impersonating the victim. They claim their phone has been lost or stolen and request a new SIM card with the victim's phone number.
  • The Verification: The mobile carrier's customer support typically asks for some form of verification. But the criminals have that too. Attackers might provide stolen personal information or use social engineering techniques to convince the carrier's representative to proceed with the SIM swap.
  • Time to Activate: Once the attacker receives the new SIM card, they insert it into a device they control. This effectively transfers the victim's phone number to the attacker's device, disconnecting the victim's phone.

Once the criminal has control over the victim’s phone number, they can intercept text messages and phone calls, including two-factor authentication (2FA) codes sent via SMS. They can also impersonate the victim to gain access to email accounts, bank accounts, cryptocurrency wallets, and other sensitive information. Often, the first act they perform is to change the login information to the mobile account. Then they proceed to change passwords on other accounts so they can conduct financial transactions and/or lock the victim out of their own accounts.

To protect against SIM swap attacks, individuals should secure their personal information. While 2FA or MFA should always be used when made available, text and email codes are not always the most secure option. It’s better to use alternative 2FA methods such as authenticator apps or hardware key fobs if given the choice. And as always, be cautious about sharing personal details over the phone or online.

The security breach at Kroll unfolded when an assailant orchestrated the SIM swap of an employee's phone number to a device under their control. Subsequently, they leveraged this access to obtain sensitive data that allowed them to perform the swap and access the bankruptcy details related to the three crypto companies. They also managed to access email addresses, names, and balances of their accounts. All of this information can be used in targeted phishing attacks.


Keeping Your Mobile Device Apps Virus Free

Mobile Security

Keeping Your Mobile Device Apps Virus Free

It’s no secret that cybercriminals take advantage of anxiety-filled times and the current coronavirus pandemic (COVID-19) is most certainly one of those moments. The latest cybersecurity news reports that Android smartphones are being targeted with apps claiming to have up-to-date data on COVID-19. These infected apps promise the latest updates, but to unsuspecting users who download them, they also promise malware will surely be installed on your mobile device. READ FULL STORY

Ways To See If Your Data Has Been Stolen

Education

Ways To See If Your Data Has Been Stolen

With all the data breaches, whether by intrusion or accident lately, it’s likely your information was exposed somehow to someone you didn’t intend. After all, the marketing company Exactis, exposed hundreds of traits on us in 350 million records. Yahoo let out email addresses and passwords on billions of people, and of course who can forget the massive breach of Equifax just last year. There is a lot of information that gets leaked on us and the more the bad actors have on us, the more targeted their phishing campaigns can be. Checking on whether or not your data is available in the underground can help you mitigate any fraud or identity theft. READ FULL STORY

Online Banking Risks – How Financial Institutions And Customers Partner For Better Security

Your Security

Online Banking Risks – How Financial Institutions And Customers Partner For Better Security

The financial services sector has gone through significant changes since horse-drawn wagons delivered money to banks. Long after that, in-person visits to your local branch gave way to online banking on devices. But the start of the pandemic in 2020, left its mark on financial services and their customers. The risks of e-banking have been a very real concern ever since bad actors switched from cracking bank safes to cracking online accounts instead. A partnership with your financial institution can help boost online security. READ FULL STORY

Verizon Warns of Uptick In SIM Swapping To Swap Their Scam For Your PII

Mobile Security

Verizon Warns of Uptick In SIM Swapping To Swap Their Scam For Your PII

SIM swapping, also called SIM hijacking, is when sneaky hackers get control of your mobile phone account and simply transfer your service to their own device, including your phone number. Once they manage to do that, they can access all your phone data and important accounts. Essentially, consider that if you can access it from your phone, so can they. Verizon has recently been warning of an uptick in this type of cybercrime, which can happen in a variety of ways. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...