For some T-Mobile customers, it’s Deja Vu. In August, hackers exposed the data of 50 million customers.

Now there is another problem. The bad guys find a way to swap out your SIM cards.

Burns & Wilcox cyber risk expert David Derigiotis explained how it works.

“Your phone is essentially dead and the attacker is putting your number on their device and now they receive all of your calls, all of your text messages,” Derigiotis said.

The bad guys take control. Then they call your telephone company and tell them that they want to move your information to a new phone.

“The other is good old-fashioned social engineering,” he said. “You called, they are faking the person into pretending they are you. And asking them to port that number and they can just pretend …


Source link

Leave a Reply