Original Release Date: 2/22/2023
A Subscriber Identity Module (SIM) card is a physical, removable smart card that contains subscriber identification data and authenticates a subscriber on a mobile device to a specified wireless carrier network. SIM cards contain data, such as user identity, location, mobile phone number, network authorization data, personal security keys, contact lists, and stored text messages. They also provide indirect access to the subscriber’s accounts, such as wireless carrier, email, social media, financial banks, and digital payment systems. For account security, subscribers typically set up phone calls or SMS text messaging as a second factor for multi-factor authentication (MFA) to log into accounts, recover account passwords, and receive account notifications for changes and updates. An embedded SIM (eSIM) card has similar functionality and security protections as a SIM card; however, eSIM cards are not removable and must be programmed. Also, for eSIM card-supported devices and wireless carriers, subscribers can easily switch between multiple mobile phone numbers using one mobile phone.
Wireless carriers offer SIM swapping as a legitimate service to change the SIM card and its associated mobile phone number. They also offer SIM port outs as a legitimate service for subscribers who want to transfer their mobile phone number to another wireless carrier. When a SIM swap or port out is initiated, subscribers are required to verify their identity, such as first and last name, date of birth, last four digits of Social Security number, account PIN, security questions and answers, or driver’s license. Personally identifiable information (PII), along with other information such as account login credentials obtained from data breaches or public information, can be used and exploited by threat actors through SIM swapping attacks, or SIM hijacking. Threat actors initiate these attacks by impersonating the subscriber, contacting the wireless carrier via phone or visiting in person, and providing identity verification verbally or by presenting fake identification to convince the wireless carrier employee that they are the subscriber on the account. They may claim that the mobile phone and associated SIM card were lost, stolen, destroyed, or sold accidentally with the SIM card left inside. They use social engineering to convince the employee to assign the subscriber’s mobile phone number to a new SIM card on a device the threat actors own with the same or a different wireless carrier. If successful, the victim’s SIM card is deactivated and the new SIM card that the threat actors control is activated. The threat actors are then able to gain access to the victim’s mobile phone number to receive phone calls and SMS text messages on the victim’s behalf, which may be used as a second factor for MFA or as a recovery method for an account.
Threat actors can take advantage of obtaining account login credentials from data breaches and public disclosures, the victim’s highly insecure practice of password reuse in which the same password is used for multiple accounts, and the acquisition of the victim’s mobile phone number. By utilizing and exploiting the phone call or SMS text message notifications, they can authenticate and access the victim’s accounts, reset passwords, change PIN codes and security questions and answers, and change the second factor for MFA with little effort. Once passwords are reset and the second factor for MFA on accounts is changed, victims are locked out of their own accounts, victim information can be updated or stolen, new accounts and services can be opened and started in the victim’s name, and additional mobile phone lines can be added to the victim’s compromised wireless carrier account. Threat actors can also gain access to financial accounts, including banking, loan, credit card, cryptocurrency, investment, tax return, and retirement. These types of accounts all provide a wealth of information and funds threat actors can use to perform transactions, purchase digital currency, and transfer funds to accounts they control. Victims may not notice right away that they lost wireless service and may not receive phone calls, SMS text messages, or notifications of account changes or updates. In some cases, the SIM card is intentionally changed during the night while victims are asleep and wireless carrier stores are closed to allow threat actors more time to quickly do more damage and compromise the victim’s accounts without immediate detection or remediation. To address and revert the unauthorized change, victims must verify their identity in person at their wireless carrier store, which can be challenging and frustrating if the victim must wait until the wireless carrier store opens, thus delaying recovery of their mobile phone number, SIM card, and compromised accounts. Losses from SIM swapping attacks can range from several hundred dollars to several hundred thousand dollars.
Tactics
SIM swapping attacks were first observed in the early 2010s, including those reported in the FBI Internet Crime Complaint Center (IC3) 2013 Internet Crime Report. Additionally, this method of attack was popularized in an online forum called OGUsers, where forum users search for desirable Instagram handles and perform SIM swapping attacks to take over the account and transfer the handle to their personal account. These attacks have now become more centered on identity theft and fraud, as threat actors have realized the potential risk and reward of these attacks. They have started targeting wealthy individuals, particularly in cryptocurrency, to access their financial bank and cryptocurrency accounts.
Aside from most cyberattacks, SIM swapping attacks are almost exclusively targeted in nature since threat actors must swap a specific mobile phone number, usually obtained from leaked or stolen information. To perform these attacks, threat actors may work independently or in affiliation with a group to breach organizational resources, including facilities, personnel, information, equipment, networks, and systems. They may also use social engineering to infiltrate physical wireless carrier stores and entice, recruit, and bribe wireless carrier employees to use their access to an organization’s assets in a way that could negatively affect the organization. They may also seek out employment opportunities on online forums to become innys, short for insiders, to make money performing SIM swapping attacks. Types of insider threats include malicious, negligent, and accidental. Access to insiders limits the barrier to entry of these attacks, as threat actors only need a fraction of the identifying information to complete the SIM swap.
SIM swapping attacks are just one small part of a larger scheme. Threat actors having access to a victim’s mobile phone number is extremely powerful in leveraging access to the victim’s accounts. For example, with the rise of cryptocurrency and lack of due diligence with cybersecurity best practices, threat actors can easily search forums and social media and target cryptocurrency account holders who boast about their successful cryptocurrency investments. In 2018, a 15-year-old New York resident, Ellis Pinsky, targeted a businessman named Michael Terpin. Pinsky and his accomplices identified their target through leaked information on a hacking forum. The threat actors then paid a T-Mobile employee a few hundred dollars in a physical store in Connecticut to perform the SIM swap. Once successful, they attempted but failed to access one of Terpin’s crypto wallets containing Ethereum. They proceeded to try to find other crypto wallets owned by Terpin, and they found a lesser-known service called Counterparty, where Terpin held $23 million of a lesser-known cryptocurrency. The threat actors accessed the crypto wallet, laundered the money through other cryptocurrencies, and drained it. Pinsky made the mistake of transferring some of the funds to his personal wallet to confirm that it was legitimate, which led to the operation’s downfall. In meetings with Terpin after the attack, Pinsky revealed that he and his accomplices performed this exact type of attack multiple times before. Bribing a wireless carrier employee to perform the SIM swap is one of the lowest-effort SIM swapping methods if the employee is willing to go against company policy and engage in unethical behavior.
In another SIM swapping scheme, two young threat actors were indicted for calling wireless carrier employees to convince them to navigate to phishing websites impersonating the employee login portal to harvest their account login credentials. If entered, the threat actors stole and used these credentials to log in to the wireless carrier systems to perform many SIM swapping attacks, which enabled them to reset passwords for multiple victim accounts, including email, social media, cryptocurrency, and other online platforms. The threat actors reportedly stole over $16,000 from a victim’s cryptocurrency account, with the possibility of additional unreported victims. This scheme ended due to a dispute between the two threat actors over the distribution of the $16,000 and one calling the local police to send a SWAT team to the other’s house.
In a similar scheme, a cybercrime group dubbed Scattered Spider has been targeting the telecommunications industry since June 2022. They use social engineering tactics, such as vishing, SMiShing, Telegram messages, and impersonating IT staff at organizations, to gain employees’ trust and convince them to navigate to phishing websites where the threat actors could steal account login credentials or to download remote access tools to victim networks. They also convince victims to provide account access by convincing them to share their MFA one-time password (OTP) or through an overwhelming number of MFA requests known as MFA prompt bombing. Scattered Spider also exploited an unpatched Amazon Web Services vulnerability that allowed the group to compromise user accounts. Through elevated access from several attack vectors, these methods enabled the threat actors to gain access to the victim organization’s MFA console to add their own devices and assign themselves to compromised users accounts to retain access to the compromised system, allowing them to gather subscriber data and perform SIM swapping attacks. Leaked information can also aid threat actors in completing these attacks through the respective telecommunications network.
Additionally, threats actors used social engineering, SIM swapping attacks, and remote desktop software to commit further malicious activity. Threat actors posted a real estate listing priced lower than market value, enticing many interested parties and informing them that the seller needed money urgently and they were out of the country where the property was located. A “relative” of the seller contacted and convinced two potential victims to install AnyDesk, a remote desktop protocol software, to send additional pictures of the property. The software was used to extract the victims' sensitive files containing passwords and PII in order to access victims’ bank accounts. While MFA was enabled, they bypassed it by contacting the two victims’ wireless carrier, using the collected PII to verify the victims’ identities, and successfully swapping the SIM cards to wipe $350,000 from both bank accounts.
These examples highlight that SIM swapping attacks are a tool to gain further access to commit additional malicious activity, especially identity theft and fraud.
SIM Swapping Protections
By default, account passwords are set up and used to access the online wireless carrier account. An account PIN or passcode can also be set up on the wireless carrier account to authorize significant changes to the account. Furthermore, implementing any method of MFA on the wireless carrier account and other accounts is beneficial. However, the use of authentication apps, hardware tokens, or biometrics are preferred second factor options for MFA over SMS text-based authentication methods due to the risk of SIM swapping attacks as a vector of compromise. Authentication apps are especially effective, as these apps are only associated with the mobile device they are installed on and would require physically possessing the mobile device and bypassing the lock screen, which is extremely difficult, especially for low-level threat actors.
Most mobile devices, such as Apple and Android, have the ability to lock the SIM card using a SIM PIN. If the SIM PIN is enabled, it is required each time the mobile device is restarted. Initially, the wireless carrier sets the SIM PIN by default, which can be found by logging in to the subscriber’s online wireless carrier account or by contacting the wireless carrier directly after identity verification. Although the SIM PIN does not prevent SIM swapping attacks, it adds a layer of physical security if the device is lost or stolen by protecting it from others activating the SIM card on another mobile device for phone calls and cellular data.
Verizon implemented a process in which two employees are required to authorize a SIM swap to ensure the authenticity of the swap. Also, there is a Number Lock option, which allows subscribers to lock any mobile phone numbers on their Verizon wireless carrier account from being ported to another wireless carrier. If the subscriber wants to port their number, they can navigate to that page to unlock the number. Verizon provides guidance on SIM swapping and prevention.
Similar to Verizon, T-Mobile requires two employees, as well as an SMS verification code sent to the mobile phone number, to authorize a swap. Threat actors will not be able to intercept this SMS text message, as the subscriber will still possess the mobile phone number and can report this request if it is unauthorized. T-Mobile provides Account Takeover Protection, which is a free service claiming to offer additional security that can be added to an account. Also, the NOPORT option requires subscribers to visit their wireless carrier store in person to present physical identification to perform a SIM swap or port a mobile phone number to a different wireless carrier. This option is for special cases and at-risk accounts, such as a subscriber reporting their cryptocurrency account was compromised and seeking protections. Supposedly, this option is not advertised publicly by T-Mobile, but it is discussed on forums and is worth requesting to be added to the wireless carrier account.
AT&T does not advertise any special services or options to help prevent SIM swapping or porting; however, it recommends creating a unique PIN or passcode on the wireless carrier account when authorizing any significant changes to the account online, over the phone, or in person.
Recommendations