Week 19: SIM swapping – how a SIM card can be stolen online

16.05.2023 - Access to many applications and digital services is now protected with two-factor authentication. Smartphones are playing an increasingly important role in this. They are not only used to run applications and services, they are also often used to generate the second factor, be it through a one-time password generator or by receiving a text message. Therefore, cybercriminals are also increasingly trying to gain access to these devices in order to obtain all the required factors. In a recent report to the NCSC, the attackers used a technique called SIM swapping to do this.

Smartphones are becoming increasingly important in almost all areas of life. Their use is already central in terms of security, for example, to receive or generate a second factor when logging in. Therefore, attackers are keen on gaining access to a victim's phone in order to obtain all factors. The NCSC already reported in week 5 on how attackers are phishing for phone provider login data. With these credentials, the attackers can – in addition to using payment services – also carry out an attack called SIM swapping or SIM swap attack. One such case was recently reported to the NCSC.

What is SIM swapping?

The first thing the victim noticed was that it was no longer possible to access their email accounts. They therefore tried to log in directly to their webmail. This attempt failed because the second factor was sent but not they did not receive it on their smartphone. The victim then noticed that their phone number was blocked and that they could neither make phone calls nor send or receive text messages.

The victim subsequently realised that they had probably clicked on a phone provider phishing link and entered the login credentials without realising it was a phishing scam.
The attackers were able to log into the phone provider's portal using these intercepted credentials and order a new SIM card.

A phone provider's online oder form. It is easy to order a replacement SIM after logging in.
A phone provider's online oder form. It is easy to order a replacement SIM after logging in.

A physical SIM card or a new electronic eSIM can be ordered via the portal's order form. Since eSIMs with no physical support are only transmitted as a QR code, they can also be activated immediately on a new phone.

A phone provider's online oder form. There is an option for ordering an eSIM. Since the address can also be changed in the portal, the attackers could theoretically have the SIM sent to any address.
A phone provider's online oder form. There is an option for ordering an eSIM. Since the address can also be changed in the portal, the attackers could theoretically have the SIM sent to any address.

From then on, the attackers have access to all accounts that use this phone number. Second factors which are sent by text message can also be intercepted in this way.

The victim recognised the attack at an early stage as they had stopped receiving emails, and they were able to have the attackers' eSIM deactivated.

React quickly

You should react as soon as your login credentials for apps no longer work or you are logged out from active apps, you no longer receive social media messages or emails and you can longer send or receive phone calls or text messages, even though your phone indicates network reception.

  • Beware of phishing messages in the name of the phone provider.
  • Contact your phone provider immediately if you notice the symptoms mentioned in the last section.
  • Enable multi-factor authentication whenever possible to add an extra layer of security.
  • Never share your passwords and access code with third parties.

Last modification 16.05.2023

Top of page

https://www.ncsc.admin.ch/content/ncsc/en/home/aktuell/im-fokus/2023/wochenrueckblick_19.html