SIM Swapping: Why Telcoms Need To Adopt Stronger Identity Proofing Methods
Posted August 3, 2020
- A growing threat, SIM swapping occurs when a cybercriminal calls a wireless network provider and tells them a legitimate user’s phone was lost or stolen.
- They then ask the provider to activate a new SIM card connected to the legitimate user’s phone number on a phone owned by the fraudster.
- If successful, fraudsters will then receive the real user’s text messages, calls and data to the newly activated device under their control.
– Robert Prigge | August 3, 2020