A control hacking video. Cloning a phone number
Comments
-
@prime: I remember something like that from a few years ago, but not anything recent. But in my experience it's pretty insecure. Almost anyone working in customer service for a cell phone retailer, not just the actual providers, will have access to port a number to a new device/SIM since that's pretty essential for them to help customers. So being lax about verification, or the information needed to verify being discoverable on the internet, can allow someone to get the number moved to their device. Sometimes you can get cell companies to require a PIN or something to perform operations like these, but that isn't always enforced, as it's really just a matter of policy; and there have been cases where it's been ignored completely, or where social engineering was used to coax customer service staff to assist without proper verification. But often even going through "proper" verification is just a matter of someone getting the last four of your Social Security Number, mother's maiden name, etc. If you're concerned that you might be a target of such an attack, contact your cell provider and see what security measures they offer. I wouldn't be optimistic, but you may be pleasantly surprised. And, if nothing else, their customers letting them know this is a concern may encourage them to tighten security and offer better options in the future.
0 -
@prime: That's the one! It's a few years old, but maybe it made the rounds again recently. Cheers! :)
0 -
No problem! :chuffed: :+1:
0 -
I just watched the video and as scary as the first vishing attack is, it's the second attack that really gets me. The hacker says he stole the victim's 1Password keychain and that's what allowed him to fully impersonate his victim. I realize the hacker was only successful because he was able to lure his victim into installing malware on his computer, but it's still scary as hell that if your 1Password installation is compromised, you are so, so done for.
0 -
Indeed, if someone has your 1Password data and the Master Password needed to decrypt it, they are, for the purposes of accessing your data, effectively you. Your home may have solid doors, windows, and locks, but if you lose your wallet with your key and drivers license (for the address) inside, whomever finds it can just walk right in. :blush:
0