Introduction to Blockchain 丨 How to prevent SIM card fraud attacks?

Author: Cobo Vault security trainee

In September 2019, network security company Adaptive Mobile discovered a serious vulnerability in the SIM card, Simjacker. Recently, the company released a list of countries vulnerable to Simjacker attacks, including 29 countries on five continents.

On August 15, 2018, US investor Michael Terpin filed a lawsuit worth AT $ 24 million with AT & T. Because he believes that the telecommunications company provided hackers with access to his mobile phone number, which led to a major cryptocurrency theft. Michael Terpin is a Puerto Rican-based entrepreneur and CEO of TransformGroup inc. He is also the co-founder of BitAngels (an angel team for Bitcoin investors) and the digital currency fund BitAngels DApps Fund. Terpin claims he suffered two hacks in 7 months, which directly resulted in him losing $ 24 million worth of cryptocurrency-in a 69-page indictment he filed with California law firm Greenberg Glusker Two hacking cases that occurred on June 11, 2017 and January 7, 2018 were mentioned, and the document showed that AT & T failed to protect his digital identity in both hacking attacks.

What is a SIM card scam?

 

Most of the SIM card fraud is to copy or re-process the victim's SIM card by bypassing the security measures of the telecommunications operator, so as to control the stolen SIM card. In the current Internet security environment, the mobile phone number of the stolen person can be controlled, and the majority of the stolen person's account permissions can be obtained through the SMS verification code verification mechanism. This also includes the vast majority of the stolen financial account Or a cryptocurrency cloud account. For most attack methods, the attacker only proves to the operator that it is the user who reissues the SIM card through simple social engineering, such as collecting the identity information of the stolen person and stealing the letter. In the early days, in order to make the replenishment process more convenient, most operators did not adopt real person authentication or two-factor authentication.

How do SIM card fraud attacks steal your "money"?

 

We mentioned earlier how scammers can obtain cloned SIM cards. Scam assets are often one of the main targets of attackers. In today's payment environment and account security environment, 2FA verification is often achieved through SMS verification codes, which also depends on the more complete real-name system in China. After gaining control of another person's SIM card, the attacker can further obtain personal privacy information through a similar icloud or email. May I ask if your personal ID card or driver's license photo is stored in your phone? These photos or information may be silently submitted to your cloud storage account by a certain cloud software. After the attacker has completely collected this information, he can use it to extract your personal account assets; or simply use your identity information to obtain loans from multiple online loan agencies.

What's more frightening is that because most users save trouble or don't know basic security transaction knowledge, attackers don't need identity information at all. You only need a mobile phone number, SMS verification code and password to complete a series of steps such as transactions, withdrawals, and issuance.

If your phone suddenly has no signal in the environment and it lasts for a long time, you must be alert.

The picture above is a picture taken by a person while traveling in Brazil. The mobile phone suddenly lost the signal for about half an hour.

After multiple restarts to no avail, he contacted the local mobile operator before learning that the SIM card was reported as "lost or stolen" and asked the author to activate on another SIM card.

Earlier analog GSM standard SIM cards allowed the same mobile phone number to be connected to the Internet at the same time, so this technology was also used to catch primary three and spy applications in the early days. After subsequent upgrades of operators and networking standards, most mobile phone networks only allow the same SIM card to be connected and used at the same time. Therefore, multiple devices will not receive the same short message in China.

How to prevent SIM card fraud attacks?

 

1. Never use weak passwords

After the attacker obtains your SIM card, it is only one step to enter the password before the withdrawal. So if you use a weak password or a password related to personal information, the defense line will be broken in the end.

2. Try to choose a software APP that can realize device identification

In the current payment and transaction environment, part of the security protection has applied the IMEI identification technology. Every time a user logs in and trades, the system verifies that the current IMEI is a previously logged in device.

3. Important accounts use 2FA verification like Google Validator

Don't use SMS verification codes as your transaction 2FA verification!

Don't use SMS verification codes as your transaction 2FA verification!

Don't use SMS verification codes as your transaction 2FA verification!

4. Consider using a cold wallet as the last line of defense for "coins."

We will continue to update Blocking; if you have any questions or suggestions, please contact us!

Share:

Was this article helpful?

93 out of 132 found this helpful

Discover more

Blockchain

Bitcoin for $0.32, they dreamed back to 2009 today

On August 23, 2019, the history of cryptocurrencies may remember this day. In the normal market price of Bitcoin was ...

Blockchain

The original market maker is not "Zhuang"? What is the significance of the coin safety ball recruitment market?

On September 30th, the company announced that it has launched the Global Markets Program and will recruit Market Make...

Market

FTX may be approved to liquidate $3.4 billion worth of tokens this week. What impact will it have on the market?

FTX may obtain court approval for asset liquidation on September 13th. Under the pressure of 3.4 billion sell-off, th...

Blockchain

Million-Dollar Shuffle FTX Cold Wallets Sneak $19M in Solana and Ether to Crypto Exchanges

FTX debtor group responsible for asset management has recently conducted multiple on-chain transactions.

Opinion

Bloomberg Thousands of Words Uncover How SBF's Elite Parents Helped Him Build a Cryptocurrency Empire?

A tall building rises from flat ground, and the success of FTX is not the result of one person's efforts. With the ba...

News

The currency circle "剿匪": the fund is checked, the exchange is full, and the "catch" has just begun.

Text | Pizza Recently, the People’s Daily, Xinhua News Agency, CCTV and other authoritative media have focused...