SIM Swapping

14th January 2020 | Cybrary SIM Swapping


SIM Swapping cyber security

SIM Swapping is a term used when hackers steal a victims phone number and port or switch that number to a different SIM card in a different cell phone in a hacker’s possession. When the hacker has control of the phone number, they are able to gain access to emails, social media accounts, and even cryptocurrency accounts that are normally protected by SMS-based 2-factor authentication. 

SIM Swapping typically occurs through social engineering, the act of manipulating people who have access to the SIM card technology into switching that SIM card to their own device for malicious purposes.  Other times, hackers just outright bribe a sales agent at a cell phone carrier store with cash payments to make the swap.

This is why NIST has deprecated SMS two-factor from the list of preferred methods to accomplish two-factor.  It is simply too easily compromised.  That leaves the physical tokens (securID, Yubikey as examples) and software solutions such as Google Authenticator, Microsoft Authenticator and others as preferred methods.

Related Term: Remote Desktop Protocol (RDP), Social Engineering

Related Readings:  CyberHoot Blog: A Deep Dive into SIM Swapping

To learn more about SIM Swapping, watch this short video:

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?

Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?

Let’s be honest, who hasn’t reset a password at least once this month? For decades, passwords have been our...

Read more
When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

In a shift away from the usual “hack-meets-victim” narrative, a new kind of cyber-assault is emerging. One...

Read more
Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

In cybersecurity, not all attacks happen through fancy malware or zero-day exploits. Some of the most effective...

Read more