On 25 August, Recorded Future published a Cyber Threat Analysis which explains that SIM swapping involves deceiving a mobile provider (usually through social engineering) into transferring a victim’s phone number to a SIM card controlled by a cybercriminal. Once the SIM card has been activated, a cybercriminal controls the phone number and can reset victim passwords and take control of social media, online banking, and cryptocurrency accounts. In some instances, even security measures such as 2-factor authentication (2FA) can be bypassed. It also explains that “How-to guides” on SIM swapping, for sale or freely available, outline some of the most popular typologies for SIM swapping attacks.
Any modest contributions for my time and ongoing expenses are welcomed! I have a page where you can do so, and where one-off contributions start as low as $3, at https://www.buymeacoffee.com/KoIvM842y