- SmallBiz CyberWiz
- Posts
- SIM-swapping explained
SIM-swapping explained
How hackers pull off the scary SIM-swapping scam
Last week, while I was discussing multi-factor authentication (MFA), I told you I wouldn’t use SMS as a second layer of protection, since it’s susceptible to so-called SIM-swapping attacks.
Now, I want to delve a little deeper into this topic, explain how the attack works and show you a few examples of a successful attack.
The premise is that you’re using your phone number as a second layer of security. After providing the correct password during login, the service will send a separate code, valid for only a few minutes, via SMS. Only after entering that code are you allowed into the account.
In theory, it’s a great solution, since it makes the hackers’ job that much more difficult:
They need to have your login credentials
They need to have your phone number
They need access to your mobile device
Here’s how they can still make the hack a success:
Login credentials and phone numbers leak all the time. Organizations are harvesting your data all the time (you often provide them during registration), and then keep it in an unprotected, misconfigured cloud database, available for anyone who knows where to look.
Just look at these examples:
Criminals can then buy this information from the dark web, and create a full profile about you: Your name, your phone number, email address, postal address, LinkedIn and other social accounts, etc.
The third step is the tricky one - they need to convince your phone carrier to transfer your SIM card to another device.
It sounds like a stretch, but it really isn’t. Many telcos allow this to be done online, provided you share copies of your ID card (which, again, can often be found online). I’ve seen examples of telco employees being bribed into swapping the SIM card, too.
Here are a few examples of successful SIM-swap scams:
After that, they can log into your accounts and do even the most sensitive activities - make purchases, wire money, change passwords, and more.
The good news is that, if you react on time, you might be able to stop the transaction and retrieve your money. But this is not guaranteed, and your business might still suffer.
Honestly, this is a completely unnecessary risk. Just don’t use SMS for multi-factor authentication. Either use a mobile app (Google Authenticator is a great choice, I suppose), or a physical device. I would recommend a physical device, since your phone can also be infected with infostealing malware that can grab these codes, as well.
There are a few great options, such as Yubikey, Google’s Titan, or Thetis.
Until next time, stay safe!
Sead from SmallBiz CyberWiz