Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Scams & Phishing Security Education Videos Mobile Security Your Security Education Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
Is Your Phone Cloned? SIM Swaps Explained
Facebook   X   LinkedIn   Email

Is Your Phone Cloned? SIM Swaps Explained

September 14, 2024

That tiny little card inserted into the side of your cellphone can lead to a heap of trouble. It’s called a SIM card and cybercriminals “SIM swap” it to clone your phone and steal your money. It’s sneaky, it’s unfair, and it’s a crime. Here’s what you need to know about this all-too-common fraud costing Americans hundreds of millions in losses and how you can keep yourself from becoming one of those victims.

SIM Swap Steps

The letters SIM stand for Subscriber Identity Module. The SIM also includes a unique ID number for your cellphone account. Fraudsters start by getting your PII from the dark web and as we know, there’s a lot of it out there for them to abuse. With this information, they get to work cloning your cellphone via the SIM swap.

Armed with your PII, the fraudster contacts your cellphone company. By impersonating you, they convince the company to reassign your phone number to their own cellphone SIM card. After that happens, your phone is now cloned and ready to be exploited.

Fraudsters use your stolen usernames and passwords to log into banking and other accounts, and change the login information to lock you out. They also intercept multi-factor-authentication codes (MFA) used for identity verification. From there, they transfer funds to their own accounts, steal cryptocurrency, buy pricey gift cards, and anything else they care to do with your money.

SIM Swap Safety

If suddenly you can’t make phone calls, texts, and otherwise can’t connect with your cell service, it’s a sign a SIM swap is in the works. Below are actions to protect yourself in a SIM swap, but first, make sure you have a PIN or password on your account that you must provide to the carrier’s agent before they will make changes to your account.

  • Act fast and freeze your phone number. Borrow a phone to call your cellphone carrier. Have them freeze your phone number and if you don’t have one, set up a PIN or password so they can’t make any changes to your account without it.
  • Alert your financial institutions and find if your accounts have been breached. Consider placing a freeze on your credit, even if it’s temporary. It’s free to freeze and unfreeze your credit, so take advantage to protect yourself.
  • Immediately change usernames and passwords to financial accounts. By doing this, you can prevent the fraudster from getting into the accounts since they would now have your “old” login information. Be sure the new passwords are at least eight characters and a mix of letters, numbers, and symbols.
  • Don’t rely on MFA to verify your identity. If the fraudster has your phone number, they can steal the MFA codes if it comes via text or email you have set up on your phone.
  • Don’t share PII on social media. Attackers troll these websites to steal any PII you post and use it in a cybercrime.

In a world where we rely heavily on our smartphones, protecting them means protecting ourselves. With SIM swapping, fraudsters turn our own phone into a weapon against us for their financial gain. So, remember, be aware and act fast. It’s the best weapon we have against a SIM swap.


Ways To See If Your Data Has Been Stolen

Education

Ways To See If Your Data Has Been Stolen

With all the data breaches, whether by intrusion or accident lately, it’s likely your information was exposed somehow to someone you didn’t intend. After all, the marketing company Exactis, exposed hundreds of traits on us in 350 million records. Yahoo let out email addresses and passwords on billions of people, and of course who can forget the massive breach of Equifax just last year. There is a lot of information that gets leaked on us and the more the bad actors have on us, the more targeted their phishing campaigns can be. Checking on whether or not your data is available in the underground can help you mitigate any fraud or identity theft. READ FULL STORY

Long Past AT&T Data Breach Data Resurfaces Giving Away Sensitive Data on 71 Million Customers

Identity Theft

Long Past AT&T Data Breach Data Resurfaces Giving Away Sensitive Data on 71 Million Customers

AT&T customers heed this warning! At the very least, listen up if you were an AT&T customer way back in 2021, or prior to it. You see, that’s when a threat actor going by the name of ShinyHunters posted to an online forum (RaidForums) that they had acquired sensitive information on 71 million AT&T customers. They declared they were posting it up for sale at a whopping $1 million. What can someone do with all of the information? As you may guess, it can all be used for text phishing; otherwise known as smishing. READ FULL STORY

You've Won A Free Gas Card And Fraud, For A Small Fee

Scams & Phishing

You've Won A Free Gas Card And Fraud, For A Small Fee

We are all kind of tired of the high gas prices right now, no matter where we live or what we drive. Most visits to the fuel pump can tick up more than $100 per tank. Then, a couple of weeks later for most of us, we have to fill up again and it’s likely to be even more. Coupled with high food prices and high pretty much everything else, we would all love some financial relief for the things we need to make it through the week. Scammers are counting on us all getting fed up with high fuel prices and are luring us into fraud with a new fuel gift card scam. READ FULL STORY

Coming Up! Fraud Trends On The Horizon

Scams & Phishing

Coming Up! Fraud Trends On The Horizon

With AI-enabled fraud making its way around the world, organizations and their customers should expect to see even more incidents of fraud. It has become a challenge between an organization’s identity verification measures and those who find ways to exploit them for financial gain. With help from Sumsub’s 2023 Identity Fraud Report, here’s a look around the corner at trending fraud attacks, and those we can expect to see more of today including the new "favorite," AI-enabled fraud. READ FULL STORY

From Mega Breach To Main Street — IBM's Cost Of A Data Breach Report 2023

Corporate Security

From Mega Breach To Main Street — IBM's Cost Of A Data Breach Report 2023

Every year, "IBM's Cost of a Data Breach Report", takes an in-depth look at corporate data breaches and the costs incurred when one strikes. Done in partnership with Ponemon Institute, this year's report highlights the stunning financial cost of breaches and other key findings from 2023. The report paints a realistic picture of the security of corporate America, for better or worse, and how AI (artificial intelligence) can help going forward. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...