SIM Swapping: Why Telcoms Need To Adopt Stronger Identity Proofing Methods

SIM Swapping: Why Telcoms Need To Adopt Stronger Identity Proofing Methods

  • A growing threat, SIM swapping occurs when a cybercriminal calls a wireless network provider and tells them a legitimate user’s phone was lost or stolen.
  • They then ask the provider to activate a new SIM card connected to the legitimate user’s phone number on a phone owned by the fraudster.
  • If successful, fraudsters will then receive the real user’s text messages, calls and data to the newly activated device under their control.

– Robert Prigge | August 3, 2020