{"id":22500,"date":"2024-03-18T22:10:20","date_gmt":"2024-03-18T18:10:20","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/what-is-sim-swapping\/22500\/"},"modified":"2024-03-18T22:10:23","modified_gmt":"2024-03-18T18:10:23","slug":"what-is-sim-swapping","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/what-is-sim-swapping\/22500\/","title":{"rendered":"What SIM swapping is, and why business should care"},"content":{"rendered":"<p>Today\u2019s topic is SIM swap fraud, aka SIM swapping. This attack method is far from new but remains a live threat because of how effective it is. SIM swapping attacks pose a serious danger to business because they enable threat actors to gain access to corporate communications, accounts, and sensitive information like financial data.<\/p>\n<h2>What is SIM swapping?<\/h2>\n<p>\nSIM swapping is an attack method for hijacking a mobile phone number and transferring it to a device owned by the attackers. Put simply, said attackers go to a mobile telecoms operator\u2019s office, somehow wangle a new SIM card with the number of a victim-to-be (see below for examples of how), insert it into their own phone, and thus gain access to the target\u2019s communications.<\/p>\n<p>It\u2019s typically text messages that are of most interest to the attackers \u2014 specifically ones that contain one-time verification codes. Having gained access, they can then log in to accounts linked to the phone number and\/or confirm transactions using the intercepted codes.<\/p>\n<p>As for the SIM swapping process itself, there are various approaches by the bad guys. In some cases the criminals employ the services of an accomplice working for the mobile operator. In others, they deceive an employee using forged documents or <a href=\"https:\/\/www.kaspersky.com\/blog\/social-engineering-cases\/48697\/\" target=\"_blank\" rel=\"noopener nofollow\">social engineering<\/a>.<\/p>\n<p>The fundamental issue that makes SIM swapping possible is that in today\u2019s world, SIM cards and cell phone numbers are not used solely for their designated purpose. They were not originally intended to serve as proof-of-identity which they\u2019ve evolved into.<\/p>\n<p>Now, one-time codes by text are a very common means of account security, which means that all other protective measures can be rendered null and void by a fraudster who smooth-talked a store employee into issuing a new SIM card with your number. Such a threat cannot be ignored.<\/p>\n<p>For the targeted organization, a SIM swapping attack can hit the bottom line hard. Cybercriminal interest in cryptocurrency assets continues to grow as they can be hijacked relatively easily and, more importantly, quickly. However, this method can be applied in more sophisticated attacks, too.<\/p>\n<h2>U.S. Securities and Exchange Commission loses X account<\/h2>\n<p>\nFor instance, here\u2019s a <a href=\"https:\/\/www.forbes.com\/sites\/digital-assets\/2024\/01\/10\/bitcoins-price-spikes-from-false-sec-update\/\" target=\"_blank\" rel=\"nofollow noopener\">very recent case<\/a>. On January 9, 2024, the U.S. Securities and Exchange Commission (SEC) posted on X (Twitter) that it had approved a Bitcoin spot exchange-traded fund (ETF).<\/p>\n<p>This Bitcoin-boosting event had long been in the pipeline, so the news didn\u2019t strike anyone as implausible. Naturally, in the wake of the announcement, the Bitcoin price soared (by roughly 10% to $48,000).<\/p>\n<div id=\"attachment_50800\" style=\"width: 969px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/03\/18221002\/what-is-sim-swapping-1.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50800\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/03\/18221002\/what-is-sim-swapping-1.png\" alt=\"SIM swapping attack on the SEC's X account\" width=\"959\" height=\"1297\" class=\"size-full wp-image-50800\"><\/a><p id=\"caption-attachment-50800\" class=\"wp-caption-text\">Fake post from the hacked SEC account announcing the approval of a Bitcoin ETF. <a href=\"https:\/\/www.forbes.com\/sites\/digital-assets\/2024\/01\/10\/bitcoins-price-spikes-from-false-sec-update\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>However, the post was later deleted and replaced with a message that the SEC account had been compromised. The next day, <a href=\"https:\/\/twitter.com\/Safety\/status\/1744924042681897343\" target=\"_blank\" rel=\"nofollow noopener\">X issued a statement<\/a> saying that the compromise was due not to a breach of its systems, but to an unidentified individual who had obtained control over a phone number associated with the @SECGov account. Most likely, the jump in the Bitcoin price caused by the fake post meant the fraudster made a killing.<\/p>\n<p>Then, toward the end of January, the SEC itself <a href=\"https:\/\/www.sec.gov\/secgov-x-account\" target=\"_blank\" rel=\"nofollow noopener\">officially acknowledged<\/a> that its X account had been hacked by SIM swappers. On top of that, it turned out that two-factor authentication (2FA), at the request of SEC staff, had been disabled by X support in July 2023 to resolve login issues. The issues duly resolved, they then simply forgot to turn 2FA back on \u2014 so until the January incident, the account was left without additional protection.<\/p>\n<h2>$400 million FTX crypto heist<\/h2>\n<p>\nIt was only recently revealed that one of the largest crypto heists in history was carried out using SIM swapping. We\u2019re talking about the theft of $400 million worth of assets from the FTX crypto exchange in the fall of 2022.<\/p>\n<p>Initially, many suspected that FTX founder Sam Bankman-Fried himself was behind the heist. However, the ensuing investigation showed that he appeared to have nothing to do with it. Then came the <a href=\"https:\/\/arstechnica.com\/tech-policy\/2024\/01\/sim-swapping-ring-stole-400m-in-crypto-from-a-us-company-officials-allege\/\" target=\"_blank\" rel=\"nofollow noopener\">indictment<\/a> of a \u201cSIM swapping group\u201d headed by a certain Robert Powell.<\/p>\n<div id=\"attachment_50802\" style=\"width: 710px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/03\/18221013\/what-is-sim-swapping-2.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-50802\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2024\/03\/18221013\/what-is-sim-swapping-2.png\" alt=\"SIM swapping attack on the FTX crypto exchange\" width=\"700\" height=\"950\" class=\"size-full wp-image-50802\"><\/a><p id=\"caption-attachment-50802\" class=\"wp-caption-text\">Part of the indictment in the case of the $400 million FTX SIM-swap crypto heist. <a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/01\/USA-v-Powell-Order-on-Motion-for-Miscellaneous-Relief-1-25-2024.pdf\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>The text of the indictment gave us the details of this heist, which, incidentally, was neither the gang\u2019s first nor its last. The list of victims of its SIM-swap operations runs into the dozens. The indictment goes on to mention at least six more cases, in addition to FTX, involving the theft of large sums of money.<\/p>\n<p>Here\u2019s how the criminals operated: first, they selected a suitable victim and obtained their personal information. Next, one of the perpetrators forged documents in the victim\u2019s name, but with the photo of another criminal \u2014 the one doing the actual SIM swap.<\/p>\n<p>The latter criminal then paid a visit to the respective mobile operator\u2019s office and got a replacement SIM card. Text messages with confirmation codes sent to the victim\u2019s number were then intercepted and used to log in to the latter\u2019s accounts and approve transactions for the transfer of assets to the gang. Interestingly, the very next day after the FTX heist, the group robbed a private individual in the exact same way to steal a modest-by-comparison $590,000.<\/p>\n<h2>How to guard against SIM swapping<\/h2>\n<p>\nAs we see, in cases involving serious amounts of money, your SIM card and, accordingly, 2FA through one-time codes by text become the weak link. As the above examples show, SIM swapping attacks can be extremely effective; therefore, threat actors will doubtless continue to use them.<\/p>\n<p>Here\u2019s what to do to protect yourself:\n<\/p>\n<ul>\n<li>Wherever possible, instead of a phone number, use alternative options to link your accounts.<\/li>\n<li>Be sure to turn on notifications about account logins, pay close attention to them, and respond to suspicious logins as quickly as possible.<\/li>\n<li>Again, where possible, avoid using 2FA with one-time codes by text.<\/li>\n<li>For your 2FA needs, it\u2019s better to use an <a href=\"https:\/\/www.kaspersky.com\/blog\/best-authenticator-apps-2022\/43261\/\" target=\"_blank\" rel=\"noopener nofollow\">authenticator app<\/a> and a FIDO U2F hardware key \u2014 commonly called YubiKeys after the best-known brand.<\/li>\n<li>Always use strong passwords to protect your accounts \u2013 this means unique, very long, and preferably randomly generated. To generate and store them, use a <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">password manager<\/a>.<\/li>\n<li>And remember to <a href=\"https:\/\/me-en.kaspersky.com\/small-to-medium-business-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">protect<\/a> those devices where passwords are stored and authenticator apps are installed.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n","protected":false},"excerpt":{"rendered":"<p>SIM swap fraud is back in vogue. We explain what it is, the danger it poses to organizations, and how to guard against such attacks.<\/p>\n","protected":false},"author":2726,"featured_media":22502,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916,1917],"tags":[1047,111,359,1931,2559,426,949,46,521],"class_list":{"0":"post-22500","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-2fa","11":"tag-attacks","12":"tag-authentication","13":"tag-authenticators","14":"tag-fido","15":"tag-mobile-devices","16":"tag-sim-cards","17":"tag-sms","18":"tag-threats"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/what-is-sim-swapping\/22500\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/what-is-sim-swapping\/27192\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/what-is-sim-swapping\/29868\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/what-is-sim-swapping\/27367\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/what-is-sim-swapping\/37134\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/what-is-sim-swapping\/50797\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/what-is-sim-swapping\/27558\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/what-is-sim-swapping\/33373\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/what-is-sim-swapping\/33000\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/2fa\/","name":"2FA"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22500","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=22500"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22500\/revisions"}],"predecessor-version":[{"id":22501,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22500\/revisions\/22501"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/22502"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=22500"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=22500"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=22500"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}