this post was submitted on 15 Mar 2024
119 points (98.4% liked)

Technology

58303 readers
11 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

cross-posted from: https://midwest.social/post/9868784

SIM swappers have adapted their attacks to steal a target's phone number by porting it into a new eSIM card, a digital SIM stored in a rewritable chip present on many recent smartphone models.

top 8 comments
sorted by: hot top controversial new old
[–] [email protected] 36 points 8 months ago (3 children)

This says that they're able to hijack the phone numbers by scanning a QR code to configure an eSIM. But doesn't the carrier need to authenticate device swaps like that in the first place? If the carriers allow SIM swaps without anything more than a line of text, then that's a major account security issue that I have to imagine has already been accounted for when this tech and the policies for it were developed. I feel like there's some very important details missing to this.

[–] [email protected] 18 points 8 months ago (3 children)

From what I understand, the attackers steal your number by gaining access to your phone carrier account.

They can gain access to your account either by finding your info in a data breach, or by phishing the account details from you.

That's why they say that you need to setup a strong password with 2FA for your phone carrier account to protect yourself from this kind of attack.

[–] [email protected] 13 points 8 months ago

That makes more sense. In which case, yeah this is just basic account security 101 stuff. Certain accounts in life you need to treat with extra security, and until we can wean society off of insecure SMS authentication services, your phone account is one of those that needs extra care put into it.

[–] [email protected] 5 points 8 months ago

Thanks for the advice! I just added 2FA to my phone carrier account.

[–] [email protected] 3 points 8 months ago

I was going to say, I’ve never needed to talk to my phone provider with a new eSIM, i just need to login to the app and confirm. That makes it the obvious route for sim stealers

Remember this, next time some says “I don’t need a good password. What are they going to do, pay my phone bill?”

[–] [email protected] 13 points 8 months ago

Before esim, a lot of sim swap attacks were done by bribing a rank-and-file support guy from the carrier to issue you a new sim. Nothing new here.

[–] [email protected] 7 points 8 months ago

Now, attackers breach a user's mobile account with stolen, brute-forced, or leaked credentials and initiate porting the victim's number to another device on their own.

They can do this by generating a QR code through the hijacked mobile account that can be used to activate a new eSIM. They then scan it with their device, essentially hijacking the number.

Simultaneously, the legitimate owner has their eSIM/SIM deactivated.

[–] [email protected] 4 points 8 months ago

I haven't had this kind of problem but I've had Google Fi since it was project Fi around 2017. And had a yubikee on my Google account for just as long. Wonder if that's why. I do remember back in the day losing an old Verizon flip phone and buying a new one in store. They didn't properly disconnect my account from the old phone and someone was deleting messages before I could read them etc for a solid month before Verizon figured it out. But that was like 2001? Things have changed quite a lot.