This article was updated in January 2021. Recently, USA Today reported a story called “Banks, Bitcoin, bond funds: Where is your money safe in an era of cyberattacks?” The story outlines a type of digital heist that is becoming all too common: SIM attacks. A SIM attack happens when a hacker or fraudster is able to get a hold of the credentials that control your phone. Once in control of your phone number, the SIM attacker can port your number to a device they control. Digital thieves can use a SIM attack to pull off all kinds of crimes ranging from identity theft to hijacking private photos for extortion. The damage from such an attack will vary — largely dependent on the level of security precautions you have taken in advance. So far the principal use of SIM hacks has been to commit financial crimes. While traditional banks and investment services are susceptible to SIM hacking, people buying, selling, and storing cryptocurrencies are particularly vulnerable to SIM hacking crimes. In the case of the USA Today story, for example, one person interviewed lost $90,000 from a crypto exchange following a SIM hack. The reason? Today, a mobile phone number has become a key piece of information used to verify identity. And crypto services, in particular, are vulnerable because there is little recourse (and oftentimes not even insurance) if fraudsters silently sweep funds to a wallet they control. So, one strategy to protect against a SIM hack is to implement a few security best practices to reduce vulnerability and the overall chance of becoming a target.
Steps in a SIM hack
A SIM card (SIM is short for Subscriber Identity Module) is a small integrated circuit that stores an ID and key that are used to authenticate a phone number as part of a telephone carrier’s network. An eSim “card” is the same circuit built directly into modern phones; the following applies whether you have a physical SIM card or a virtual eSim. A SIM contains a 17-digit number that maps to identifying information such as country of origin, carrier, and personal ID details. Phone carriers are able to port SIM details from one device to another. This makes things convenient when you are upgrading devices, or when trying to keep a phone number while you are switching carriers. But the phone carriers’ ability to control SIM information also means that the digital ID associated with the phone number is vulnerable. A basic outline of a SIM hack:
- Using social engineering tactics, a hacker is able to convince the mobile phone carrier that they need to port your phone number to a device that they control. They might call the phone company pretending to be you and make up some story about getting a new phone, or upgrading, or some similar scenario.
- Once in control of your phone number, the hackers will try to exploit vulnerable situations and scenarios (in the case of crypto this could be wallets, exchange accounts, or other places where funds are stored). If those services use SMS two-factor authentication (2FA) then a hacker will now be able to intercept the password reset code.
- Using these same tactics and techniques, the hacker can also gain control of your email, social media profiles, etc., which means they would have additional identifying details.
A mobile phone was never really meant to become such an important piece of digital personal identity. And mobile phone carriers are designed and built to enable phone calls and data streaming, not as a bulletproof security apparatus between a network subscriber and an army of well-incentivized fraudsters. That’s why SMS 2FA should be avoided if better alternatives are available.
What to know about a SIM attack
The first sign that a SIM attack is unfolding is if a phone starts to act erratically like it is no longer able to send and receive calls. And then other services will start to get interrupted. Another warning sign is if it feels like you are randomly asked to sign back into email or social media services. One way to confirm a SIM attack is to try and dial the number you suspect is under attack. If your phone doesn’t ring, chances are there are problems. The first step following a SIM attack should be to contact your phone carrier and explain what is happening. The second step is to try to assess if you still have control over important accounts like email, banking, and crypto services.
Security best practices
There are steps that you can take in advance of a SIM attack to try to insulate yourself from some of the vulnerabilities. Here are a few examples:
- Use a wallet with the private key (aka the recovery phrase) to store any cryptocurrency you plan on holding long term. The Abra wallet is one such wallet which puts a barrier between your crypto and the hacker. The Abra wallet is be secured by a private key (recovery phrase), which you will have to safeguard somewhere offline.
- Make sure all sensitive accounts and services are protected by strong application-based 2FA. Using products like Authy or Google Authenticator will mean that a fraudster will have to physically have control of your phone (not just a ported number) to get access to your passwords.
- Create multiple email addresses and use burner phone numbers when setting up sensitive accounts such as bank and crypto services. Make sure you don’t circulate these other emails and phone numbers and only use them for account sign-in.
- Make sure you subscribe to enhanced authentication (different carriers have different policies) that require additional identification before someone can access your online phone account to port your phone. For example, you can ask a certain carrier to only allow porting of devices in a retail store. Other carriers provide 2FA via mobile phone for any types of changes if you select enhanced authentication. That way, a hacker can’t port your device unless they have your physical device in the first place.
5. Use a virtual phone number that has strong authentication and 2FA that does not use SMS. 6. Don’t let any third party know details when they are helping transition your old device to a new device. Many SIM hacks are conducted by company insiders who use personal details to port your device. SIM hacks are only becoming more common. People using their mobile phone number as a key piece of security information in combination with the fact that more and more valuable assets (like crypto) are being stored in digital domains, which is providing the perfect conditions for fraud and theft. The good news is that Abra wallets require a private key to create or restore a wallet. This provides an extra layer of protection between a hacker and your assets. Do remember that it also means that you will need to properly secure your recovery phrase and if you lose it your funds may not be recoverable. Interested in learning more about SIM hacks and how to prevent them? The following resources are a good place to get started.
Join our community and find more people achieving their financial goals through crypto.
Download the Abra app on Android or iOS to begin trading or earning interest on cryptocurrency today!Download App
Established in 2014, Abra is on a mission to create a simple and honest platform that enables millions of cryptocurrency holders to maximize the potential of their assets. Abra enables both individuals and businesses to safely and securely buy, trade, and borrow against cryptocurrencies – all in one place. Abra’s vision is an open, global financial system that is easily accessible to everyone.
Based in the United States, Abra is available in over 150 countries and makes it easy to convert between crypto and a wide variety of local fiat currencies. With over 2MM customers, $7B in transactions processed, and $1.5B in assets under management, Abra continues to grow rapidly. Abra is widely loved and trusted – in April 2022, pymnts.com reviewed and rated Abra amongst the top 5 most popular crypto wallets in the market. Abra is backed by top-tier investors such as American Express Ventures and First Round Capital.
How Abra Protects Your Funds
Abra places clients’ financial objectives and security first. Abra practices a culture of risk management across all levels and functions within the organization.
Abra employs a state-of-the-art enterprise risk management framework that comprises a comprehensive set of policies, procedures, and practices detailing all applicable risk-related objectives and constraints for the entirety of the business. Abra has instituted a complete set of requisite systems and controls that continuously enforce these policies, procedures, and practices to manage all operations, including credit and lending. Abra’s independent Risk Committee comprises experienced compliance, risk, securities, and fraud operations professionals with backgrounds in industries ranging from traditional and digital assets banking, payments, remittance, to fintech.
Please visit our FAQ to learn more.