Common Information
Type Value
Value
SIM Card Swap - T1451
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description An adversary could convince the mobile network operator (e.g. through social networking, forged identification, or insider attacks performed by trusted employees) to issue a new SIM card and associate it with an existing phone number and account.(Citation: NYGov-Simswap)(Citation: Motherboard-Simswap2) The adversary could then obtain SMS messages or hijack phone calls intended for someone else.(Citation: Betanews-Simswap) One use case is intercepting authentication messages or phone calls to obtain illicit access to online banking or other online accounts, as many online services allow account password resets by sending an authentication code over SMS to a phone number associated with the account.(Citation: Guardian-Simswap)(Citation: Motherboard-Simswap1)(Citation: Krebs-SimSwap)(Citation: TechCrunch-SimSwap)
Details Published Attributes CTI Title
Details Website 2024-10-01 0 CAN WHATSAPP ACCOUNT BE HACK
Details Website 2023-08-17 84 Scattered Spider: The Modus Operandi
Details Website 2023-07-27 0 Defend Your SIM Card: 3 Hacking Threats Exposed and How to Stay Safe
Details Website 2023-03-31 0 What Is Account Takeover Fraud?
Details Website 2023-03-23 0 What is Sim Swap Scam? How to protect yourself from Sim Swap frauds?
Details Website 2022-12-28 1 Cyber Security Today, Year in Review for 2022 | IT World Canada News
Details Website 2022-12-05 1 Cyber Security Today, Dec. 5, 2022 – Another data-wiper has been found, the open source Fosshost service is closing, and more | IT World Canada News