Created: 2022-06-26
Tags: #literature
Uses social engineering
Convinces sim carrier to reset/activate victim's sim card to hacker's phone.
-> Any calls/texts will no longer be received to victim's sim
-> Instead be received to the hackers sim.
2fa sometimes relies on txt codes
hackers can use this method to login to your sensitive accounts.
They gather as much as information about you.
They buy info on dark web, social media details or phishing emails.
Purpose is to
convince the phone carrier that it's you and not an impersonator.
Don’t rely on phone number for authentication.
This includes text messaging (SMS), which is not encrypted.