Analysing global revenue opportunities for cyber security companies.
SIM swapping is not a new problem. It’s long provided criminals with the ability to take over a mobile device and gain access to data and even funds. But you don’t need to be a cyber security expert to combat it – just four simple steps can substantially reduce the risk.
What is a SIM card?
SIM cards are what make mobile phones work. A SIM is a chip within the mobile phone that identifies the subscriber and enables them to connect their device to a mobile network.
Swapping SIM cards is a common and legitimate occurrence. A customer might have a new device, have lost or damaged their SIM, or may need to transfer the SIM to a backup handset because their phone ran out of charge or is faulty.
However, although the SIM is a stable and relatively secure platform in itself, the ability to change SIMs provides an opportunity for criminals.
What is a SIM swap attack?
There are various ways criminals can perform a SIM swap attack. They might, for example, have access to an ‘insider’ – someone who works for a phone store or in a service provider’s call centre – or they may be able to use information they’ve gleaned about you to impersonate you and trick a call centre representative into thinking they are you.
Once the criminal gets the mobile operator to give them control of a phone number, they can lock you out of your own account, change passwords, use your data plan and receive phone calls sent to you. They’ll also be able to access your new and previous text messages.
This is the holy grail for cyber criminals because two-factor authentication (2FA) – where a one-time password (OTP) is sent to your mobile device by the application owner – is now used for the majority of applications, especially those deemed critical.
But if a cyber criminal can hijack your mobile account via a SIM swap attack, they can request new OTPs, or potentially use ones already provided, giving them access to your other accounts (such as bank accounts). Once they’ve gained access to these they can change passwords, transfer funds or do anything a legitimate user could do.
How to protect yourself
The cyber criminal is actually targeting companies (the mobile operator, the bank etc) and the vulnerabilities in their systems to execute SIM swap attacks. But this doesn’t mean you can’t take steps to protect yourself. SynergySix know that the first two of the steps below can be done immediately.
Cyber criminals and scammers use consistent methods to gain access to your credentials via SIM swapping attacks. There are now lots of new offerings on the market that service providers and other organisations can adopt to overcome the frailties of two-factor authentication and one time passwords. But don’t wait for them to adopt these methods, act today. The very simple but effective methods described above go a long way to making things more difficult for cyber criminals and scammers – helping to protect your SIM and account until organisations roll out more secure methods of authentication.
Privacy Policy
SynergySix Flow Chains™ is a trademark of Synergy Six Degrees Limited. No copying or distribution without the expressed consent of Synergy Six Degrees.