{"id":742,"date":"2021-03-15T19:12:30","date_gmt":"2021-03-15T23:12:30","guid":{"rendered":"https:\/\/www.gybernov.com\/new\/?p=742"},"modified":"2021-03-30T22:23:03","modified_gmt":"2021-03-31T02:23:03","slug":"sim-fraud","status":"publish","type":"post","link":"https:\/\/www.gybernov.com\/new\/sim-fraud\/","title":{"rendered":"MFA and SIM swap fraud !"},"content":{"rendered":"<p>SIM swap scam, as from Wikipedia definition: s SIM swap scam (also known as port-out scam, SIM splitting, Smishing and simjacking, SIM swapping) is a type of account takeover fraud that generally targets a weakness in two-factor authentication and two-step verification in which the second factor or step is a text message (SMS) or call placed to a mobile telephone.<\/p>\n<p>So imagine that you think you&#8217;re safe when you secure all access with MFA with mobile! but what about if your phone number\u00a0 was hijacked ? few personal questions and someone else can route your line to a fake SIM\u00a0<\/p>\n<p>\t\t\t\t\t\t\t\t\t\t<img data-recalc-dims=\"1\" decoding=\"async\" width=\"300\" height=\"219\" src=\"https:\/\/i0.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/brett-jordan-NS-lboO5wak-unsplash-1-300x219.jpg?resize=300%2C219&#038;ssl=1\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/i2.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/brett-jordan-NS-lboO5wak-unsplash-1.jpg?resize=300%2C219&amp;ssl=1 300w, https:\/\/i2.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/brett-jordan-NS-lboO5wak-unsplash-1.jpg?resize=1024%2C746&amp;ssl=1 1024w, https:\/\/i2.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/brett-jordan-NS-lboO5wak-unsplash-1.jpg?resize=768%2C559&amp;ssl=1 768w, https:\/\/i2.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/brett-jordan-NS-lboO5wak-unsplash-1.jpg?resize=1536%2C1119&amp;ssl=1 1536w, https:\/\/i2.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/brett-jordan-NS-lboO5wak-unsplash-1.jpg?resize=2048%2C1492&amp;ssl=1 2048w, https:\/\/i2.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/brett-jordan-NS-lboO5wak-unsplash-1.jpg?resize=600%2C437&amp;ssl=1 600w, https:\/\/i2.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/brett-jordan-NS-lboO5wak-unsplash-1.jpg?w=1320&amp;ssl=1 1320w, https:\/\/i2.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/brett-jordan-NS-lboO5wak-unsplash-1.jpg?w=1980&amp;ssl=1 1980w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t<\/p>\n<p>A number of high-profile hacks have occurred utilizing SIM swapping, including some on the social media sites Instagram and Twitter. In 2019, <a href=\"https:\/\/www.nytimes.com\/2019\/09\/05\/technology\/sim-swap-jack-dorsey-hack.html\">Twitter CEO Jack Dorsey&#8217;s Twitter account was hacked<\/a> via this method\u00a0<\/p>\n<p>and the question which comes over, how can we avoid that risk :<\/p>\n<ul>\n<li>\n\t\t\t\t\t\t\t\t\t\tlock device, and activate alerts changes on accounts\n\t\t\t\t\t\t\t\t\t<\/li>\n<li>\n\t\t\t\t\t\t\t\t\t\tdon&#8217;t share your phone number when it is unnecessary\n\t\t\t\t\t\t\t\t\t<\/li>\n<li>\n\t\t\t\t\t\t\t\t\t\tLess you share personal information on web, more you reduce social engineering attack\n\t\t\t\t\t\t\t\t\t<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>You secure all access with MFA with mobile! but what about if your phone number  was hijacked ? few personal questions and someone else can route your line to a fake SIM <\/p>\n","protected":false},"author":3,"featured_media":1155,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"hide_page_title":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[10,18],"tags":[],"class_list":["post-742","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-awareness","category-social-engineering"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/brett-jordan-NS-lboO5wak-unsplash-1.jpg?fit=2400%2C1748&ssl=1","jetpack-related-posts":[{"id":584,"url":"https:\/\/www.gybernov.com\/new\/ssdlc\/","url_meta":{"origin":742,"position":0},"title":"Secure Software Development Life Cycle (SSDLC)","author":"Editorial Team","date":"March 14, 2021","format":false,"excerpt":"The most important principle of SSDLC (Secure Software Development Life Cycle) is to offer a secure development process thus minimizing the risk of vulnerabilities in our solution that we develop, Organisations that implement that style of development will significantly reduce the weaknesses and threats of exploitation It also brings a\u2026","rel":"","context":"In &quot;Governance&quot;","block_context":{"text":"Governance","link":"https:\/\/www.gybernov.com\/new\/category\/governance\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/notes-Security-activities-development-life-cycle-Gybernov.com_-1024x398.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/notes-Security-activities-development-life-cycle-Gybernov.com_-1024x398.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.gybernov.com\/new\/wp-content\/uploads\/2021\/03\/notes-Security-activities-development-life-cycle-Gybernov.com_-1024x398.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]}],"jetpack_shortlink":"https:\/\/wp.me\/pcR73I-bY","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.gybernov.com\/new\/wp-json\/wp\/v2\/posts\/742","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gybernov.com\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.gybernov.com\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.gybernov.com\/new\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gybernov.com\/new\/wp-json\/wp\/v2\/comments?post=742"}],"version-history":[{"count":38,"href":"https:\/\/www.gybernov.com\/new\/wp-json\/wp\/v2\/posts\/742\/revisions"}],"predecessor-version":[{"id":1185,"href":"https:\/\/www.gybernov.com\/new\/wp-json\/wp\/v2\/posts\/742\/revisions\/1185"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.gybernov.com\/new\/wp-json\/wp\/v2\/media\/1155"}],"wp:attachment":[{"href":"https:\/\/www.gybernov.com\/new\/wp-json\/wp\/v2\/media?parent=742"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.gybernov.com\/new\/wp-json\/wp\/v2\/categories?post=742"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.gybernov.com\/new\/wp-json\/wp\/v2\/tags?post=742"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}