- Published on
Sim-swap
- Published on
In this article, n0sec covers another method of SIM swapping commonly used which nearly all carriers are vulnerable to - the insider threat. One of the biggest threats to any company is an insider - and this certainly holds true for the mobile carrier industry.- Published on
MetroPCS is easily the most vulnerable carrier to SIM swaps at the moment. Hackers have easy access to swaps at any minute of the day, and this isn't through some elementary social engineering tactic. It is the by far most consistent carrier that is vulnerable to SIM swaps.- Published on
n0sec analyzes the market for automated cashout tools in the market. These tools involve estimating balances, in reaction to Coinbase's patch of the 'NFA balance check tools'. Amongst this is other popular new tools in the same 'lane' as Coinbase, tools to locate viable targets for SIM swappers.- Published on
In this article, n0sec analyzes another method of SIM swapping, utilizing carrier's live chat systems. This social engineering tactic, while it does require more access to a target, is widely used at the moment due to the patching of remo snatching.- Published on
Right now lots of fraudsters have adopted SIM swapping as their crime of choice, and as mobile carriers crack down on SIM swapping, fraudsters are taking their methods to the next level. This article focuses on the 'remo snatching', a method fraudsters are using to execute SIM swap which is largely unusual from typical fraudster tendencies.