Web Intelligence

SIM-Swapping: The New Identity Theft Trend You Must Know

SIM-Swapping: The New Identity Theft Trend You Must Know

Two-Factor Authentication (2FA) is considered a key tool for protecting our online accounts. However, while 2FA aims to make our data more secure, it inadvertently opens the door to a new threat: SIM swapping. 

SIM swapping, also known as SIM hijacking, is a cyberattack where threat actors gain control of a victim’s phone number by transferring it to a SIM card the attacker holds, thus diverting all incoming traffic onto the new SIM card. 

Join us as we use Lunar, Webz.io’s dark web monitoring tool, to investigate illicit activity on deep and dark web networks.

The rising trend of discussions on the deep and dark web around SIM Swapping shown on Lunar
The rising trend of discussions on the deep and dark web around SIM Swapping shown on Lunar

How do hackers take over a victim’s SIM?

#1 Obtaining personal information on the dark web

 In order to execute this attack, the threat actor must be equipped with the victim’s personal information, such as full name, date of birth, living address, SSN, phone number, and carrier provider. 

A threat actor sharing Personally Identifiable Information (PII) of a victim on the illicit paste site Doxbin for SIM Swapping, shown on Lunar.
A threat actor sharing Personally Identifiable Information (PII) of a victim on the illicit paste site Doxbin for SIM Swapping, shown on Lunar.

# 2 Exploiting vulnerabilities and social engineering tactics

Armed with stolen personal information, hackers exploit vulnerabilities within phone carrier companies. Through sophisticated social engineering tactics, they impersonate victims and deceive customer service representatives into transferring the victim’s number to a SIM card wielded by the attacker.

Social engineering tutorial posted by a threat actor detailing how to successfully SIM swap
Social engineering tutorial posted by a threat actor detailing how to successfully SIM swap

The dangers of  SIM-swapping – what is at stake? 

Identity theft and account takeover

A successful SIM swap grants attackers complete access to a victim’s digital identity, as many financial, social, and governmental services require connection to the user’s phone number. 

Financial loss

A confirmation number by text is sometimes all that is needed to reset a password to a bank account. It only takes one successful attempt at sim swapping and some basic information in order to gain full access to a person’s bank account.  

Social media impersonation

In 2019, former CEO of Twitter Jack Dorsey had his Twitter account compromised due to a SIM-swapping hack. The threat actor who took over his account went on to retweet a series of racist and offensive tweets. While eventually gaining back access to his account, the damage to his reputation had already been done.

Example of reputational damage done by SIM swapping.
Example of reputational damage done by SIM swapping.

How threat actors collaborate on SIM swapping on the dark web

Threat actors involved with SIM swapping activities often to hacking forums, marketplaces, and fraud sites for various purposes. Here are some of the discussions taking place revolving around SIM-swapping attacks:

  •  Trade, exchange and publication of personal information that can be used for SIM swapping.
  •  Collaborative material such as guides, services, and assistance with executing  SIM-swapping attacks.
  •  Exchange of new relevant methods and techniques as they emerge.
An image showing a threat actor on the popular dark web forum OmniForums offering SIM-swapping services
An image showing a threat actor on the popular dark web forum OmniForums offering SIM-swapping services.

How can monitoring the dark web help protect companies and individuals?

Vigilantly monitoring the dark web for signs of compromised personal information and emerging techniques is crucial in combating SIM-swapping attacks. Early detection can help prevent damage and protect individuals and companies from major financial losses. Lunar, our dark web monitoring tool, helps individuals and businesses combat cybercrime effectively. Offering real-time alerts, data breach monitoring, and extensive dark web surveillance, Lunar helps organizations remain proactive and secure in an increasingly challenging digital landscape.

Spread the News

Not subscribed to our Dark Web Pulse updates?

By submitting you agree to Webz.io's Privacy Policy and further marketing communications.

Feed Your Machines the Data They Need

Feed Your Machines the Data They Need

GET STARTED
Has Your Data Been Breached?

Find breaches, stolen credentials and malware risks on the deep and dark web.

Don't be the last one to know!

Chances are your compromised data is already traded on the dark web.
Ready to discover them and protect your business?

Subscribe to our newsletter for more news and updates!

Ready to Explore Web Data at Scale?

Speak with a data expert to learn more about Webz.io’s solutions
Create your API account and get instant access to millions of web sources