{"id":5541,"date":"2019-05-07T20:58:25","date_gmt":"2019-05-07T19:58:25","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5541"},"modified":"2021-07-12T13:40:18","modified_gmt":"2021-07-12T12:40:18","slug":"sim-swapping-what-know-about-disturbing-cyberattack","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/sim-swapping-what-know-about-disturbing-cyberattack","title":{"rendered":"SIM Swapping: What to Know about This Disturbing Cyberattack"},"content":{"rendered":"<p>You\u2019re sitting at your desk, and you decide to make a phone call. You\u2019re choosing what to eat for lunch. You pick up your phone and decide you\u2019re going to text a coworker to see where to go. Unfortunately, you don\u2019t have a signal on your phone. You notice your phone displays an error stating there\u2019s no SIM card.<\/p>\n<p>This could be a minor error with your phone\u2019s software\u2014or it could be the beginning of an\u00a0<i>extremely<\/i>\u00a0damaging cyberattack known as SIM swapping. At this point, a cybercriminal could be breaking into your bank account, email account, or online storage. And if you have access to critical systems for your business, such as a corporate bank account or access to the corporate social media accounts, the cybercriminal could easily start to ruin your business.<\/p>\n<p>Managed services providers (MSPs) and managed security services providers (MSSPs) in charge of their customers\u2019 security need to know how to deal with these attacks. While you can\u2019t completely eliminate the threat, there are steps you can (and should) take to stay safe. But first, it helps to understand how these attacks occur.<\/p>\n<h2>Anatomy of SIM swapping<\/h2>\n<p>SIM cards store basic information about the subscriber, such as their phone number, carrier information, billing information, and in some cases, address books and contacts (note that this isn\u2019t the case with some phones). Phone providers offer the ability to swap SIM cards for convenience\u2014if a customer loses their phone or if their phone was stolen, this allows the original owner of the phone to recover their phone number and transfer the service to a new device. However, cybercriminals can attempt to impersonate a phone owner, transfer their number to a new SIM card, then use this to break into personal accounts like banking or social media.<\/p>\n<p>SIM swapping often starts with the cybercriminal doing some reconnaissance to discover personal information they can use in the attack. A lot of the information they\u2019ll need is publicly available, like the victim\u2019s name, home address, and phone number. They can often get social security numbers or account user names by gaining information from previous mass data breaches. However, they may also try email and text phishing scams to get even more info.<\/p>\n<p>Once they have enough personal information, they call the cell phone service provider, claim to be you, and ask them to transfer your phone number to a new SIM card. Since the criminals have already done some upfront recon work, they can answer security questions well enough to successfully fool the support line for your phone provider. Not all SIM swap attacks involve impersonation, though\u2014sometimes an employee for the phone provider will\u00a0<a class=\"ext\" href=\"https:\/\/krebsonsecurity.com\/2018\/05\/t-mobile-employee-made-unauthorized-sim-swap-to-steal-instagram-account\/\" target=\"_blank\" rel=\"noopener noreferrer\">initiate the swap<\/a>.<\/p>\n<p>At this point, they\u2019ll receive all phone calls and text messages to the phone using the transferred SIM card. This is where the bad stuff starts happening. If they have your credentials and need 2FA to get into an account, they\u2019ll receive the text messages and get in immediately (and don\u2019t forget\u2014with people often reusing passwords and credentials across accounts, getting someone\u2019s password can be way too easy). They can also use password resets on accounts and receive temporary codes via SMS to change your accounts.<\/p>\n<p>After that, it depends on their goal. Some SIM swappers have stolen social media accounts, especially\u00a0<a class=\"ext\" href=\"https:\/\/mashable.com\/2018\/08\/13\/instagram-hack-locked-out-of-account\/\" target=\"_blank\" rel=\"noopener noreferrer\">Instagram accounts<\/a>, changed the personal info on the account to make it almost impossible for the original owner to recover, and sold the usernames to third parties. Some have broken into Instagram accounts of celebrities to leak personal photos. They could change your email account\u2019s password, then start compromising other linked accounts such as bank accounts or online shopping accounts. They could do all of this and start\u00a0<a class=\"ext\" href=\"https:\/\/motherboard.vice.com\/en_us\/article\/5984zn\/listen-to-sim-jacking-account-ransom-instagram-email-tmobile\" target=\"_blank\" rel=\"noopener noreferrer\">extorting you for money<\/a>. One SIM swapper successfully stole over\u00a0<a class=\"ext\" href=\"https:\/\/www.newsbtc.com\/2018\/11\/22\/silicon-valley-execs-targeted-in-sim-swap-hacking-1-million-in-crypto-stolen\/\" target=\"_blank\" rel=\"noopener noreferrer\">$1 million USD in cryptocurrencies<\/a>.<\/p>\n<h2>Protecting your clients<\/h2>\n<p>These attacks are notoriously difficult to deal with. The weak link here is the phone provider, as they\u2019re the ones allowing the SIM swap to occur. However, there are still precautions you can take.<\/p>\n<p>First, for any mobile device you\u2019re in charge of managing, meet with the mobile service provider and have them require a designated person to physically enter the store with proper identification before making a SIM swap. You should do this on your personal devices, too.<\/p>\n<p>Second, remember that SIM swapping often kicks off another type of attack. Once someone has a customer\u2019s mobile device, they will use that to break into other accounts. Wherever possible, consider using an authenticator app like Google Authenticator or Authy instead of SMS-based 2FA. Some services offer these options while others don\u2019t. Additionally, you could consider using physical hardware tools for authentication, such as YubiKeys or other USB-based tools, which requires users to physically possess a separate authentication device to get into an account.<\/p>\n<p>Third, keep your own security house in order. Request that any employees for your MSP or MSSP follow these guidelines on personal devices. Imagine what could happen if a tech on your team fell victim and the attacker ended up with access to your email or RMM system. That could spell bad news for your customers as well (and your business as a whole).<\/p>\n<p>Finally, user-awareness training can add an additional layer of security. Teach employees to be on guard against email or text-based phishing attempts or any unrequested 2FA messages they receive. This could be the start of the recon phase, where the criminal attempts to gain enough information to kick off a successful attack. Additionally, train employees to recognize the signs of a potential attack, such as an inability to send or receive calls or text messages or a message that their SIM card is missing. It\u2019s worthwhile teaching them about authenticator apps like Google Authenticator so they\u2019re aware of the flaws of current authentication schemes and know to protect accounts where stronger 2FA options are available.<\/p>\n<h2>Keeping your accounts safe<\/h2>\n<p>SIM swapping has become increasingly common over the past few years. This attack doesn\u2019t require sophisticated scripting\u2014it often requires just a little bit of background information on the victim to launch a devastating attack. However, with some upfront preparation, you can hopefully prevent the attack\u2014or at least minimize the damage.<\/p>\n<p><strong>Additional reading<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.n-able.com\/blog\/office-365-security-scorecard\" target=\"_blank\" rel=\"noopener\">How to Assess and Improve Your Office 365 Security Scorecard<\/a><\/li>\n<li><a href=\"https:\/\/www.n-able.com\/blog\/mobile-device-management-privacy\" target=\"_blank\" rel=\"noopener\">Mobile Device Management\u2014A threat to Employee Privacy?<\/a><\/li>\n<\/ul>\n<p><em>by Marco Muto, director, Business Development at SolarWinds<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SIM swapping has become an increasingly common attack vector over the past few years. Marco Muto looks at what MSPs and MSSPs need to know to protect their customers.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5541","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SIM Swapping: What to Know about This Disturbing Cyberattack - N-able<\/title>\n<meta name=\"description\" content=\"SIM swapping has become an increasingly common attack vector over the past few years. Marco Muto looks at what MSPs and MSSPs need to know to protect their customers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/sim-swapping-what-know-about-disturbing-cyberattack\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SIM Swapping: What to Know about This Disturbing Cyberattack - N-able\" \/>\n<meta property=\"og:description\" content=\"SIM swapping has become an increasingly common attack vector over the past few years. Marco Muto looks at what MSPs and MSSPs need to know to protect their customers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/sim-swapping-what-know-about-disturbing-cyberattack\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-07T19:58:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-12T12:40:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"5\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/sim-swapping-what-know-about-disturbing-cyberattack#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/sim-swapping-what-know-about-disturbing-cyberattack\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"SIM Swapping: What to Know about This Disturbing Cyberattack\",\"datePublished\":\"2019-05-07T20:58:25+01:00\",\"dateModified\":\"2021-07-12T12:40:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/sim-swapping-what-know-about-disturbing-cyberattack\"},\"wordCount\":1093,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/sim-swapping-what-know-about-disturbing-cyberattack\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/sim-swapping-what-know-about-disturbing-cyberattack\",\"name\":\"SIM Swapping: What to Know about This Disturbing Cyberattack - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2019-05-07T20:58:25+01:00\",\"dateModified\":\"2021-07-12T12:40:18+00:00\",\"description\":\"SIM swapping has become an increasingly common attack vector over the past few years. Marco Muto looks at what MSPs and MSSPs need to know to protect their customers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/sim-swapping-what-know-about-disturbing-cyberattack#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/sim-swapping-what-know-about-disturbing-cyberattack\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/sim-swapping-what-know-about-disturbing-cyberattack#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SIM Swapping: What to Know about This Disturbing Cyberattack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SIM Swapping: What to Know about This Disturbing Cyberattack - N-able","description":"SIM swapping has become an increasingly common attack vector over the past few years. Marco Muto looks at what MSPs and MSSPs need to know to protect their customers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/sim-swapping-what-know-about-disturbing-cyberattack","og_locale":"de_DE","og_type":"article","og_title":"SIM Swapping: What to Know about This Disturbing Cyberattack - N-able","og_description":"SIM swapping has become an increasingly common attack vector over the past few years. Marco Muto looks at what MSPs and MSSPs need to know to protect their customers.","og_url":"https:\/\/www.n-able.com\/de\/blog\/sim-swapping-what-know-about-disturbing-cyberattack","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2019-05-07T19:58:25+00:00","article_modified_time":"2021-07-12T12:40:18+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"N-able","Gesch\u00e4tzte Lesezeit":"5\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/sim-swapping-what-know-about-disturbing-cyberattack#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/sim-swapping-what-know-about-disturbing-cyberattack"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"SIM Swapping: What to Know about This Disturbing Cyberattack","datePublished":"2019-05-07T20:58:25+01:00","dateModified":"2021-07-12T12:40:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/sim-swapping-what-know-about-disturbing-cyberattack"},"wordCount":1093,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/sim-swapping-what-know-about-disturbing-cyberattack","url":"https:\/\/www.n-able.com\/de\/blog\/sim-swapping-what-know-about-disturbing-cyberattack","name":"SIM Swapping: What to Know about This Disturbing Cyberattack - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2019-05-07T20:58:25+01:00","dateModified":"2021-07-12T12:40:18+00:00","description":"SIM swapping has become an increasingly common attack vector over the past few years. Marco Muto looks at what MSPs and MSSPs need to know to protect their customers.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/sim-swapping-what-know-about-disturbing-cyberattack#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/sim-swapping-what-know-about-disturbing-cyberattack"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/sim-swapping-what-know-about-disturbing-cyberattack#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/de\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"SIM Swapping: What to Know about This Disturbing Cyberattack"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5541","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=5541"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5541\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=5541"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}