Jump to content

Talk:SIM swap scam

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Avatar317 (talk | contribs) at 00:48, 14 February 2023 (Not a suggestion for how to improve the article.). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.


How the fraud works through Law Enforcement agencies

PIN1, PIN2 and PUK codes are available at the backend, sometimes even in frontend customer care section of company outlets. A dummy card is used to activate with the codes and use the account on another mobile phone. That's all.
It becomes easier to manipulate and hijack identity when there are Dual SIM slots in the phone and the person switches off the phone. Keeping phone always switched "on" has the disadvantage of allowing eavesdropping as well as the possibility of hostile programs being downloaded, and so a balance has to be made.

Details missing

Why Sim PIN and PUKs are not required for the switch? Zezen (talk) 21:19, 4 January 2020 (UTC)[reply]

AT&T etc. employees do it themselves: https://www.vice.com/en_us/article/d3n3am/att-and-verizon-employees-charged-sim-swapping-criminal-ring

-> Let us update it.

Zezen (talk) 18:23, 23 January 2020 (UTC)[reply]

Section of mitigations?

I know that there are alleged defenses against SIM swapping, like using VOIP numbers (e.g. Google Voice) or avoiding SMS 2FA whenever possible. I don't think there's any data to support those defenses, but I could be wrong. Should there be a section on this? RentedUniverse (talk) 14:18, 3 August 2020 (UTC)[reply]

If any mitigations are discussed in Reliable Sources WP:RS than it would be good to include statements about such in this article. Please also see: WP:OR. Thanks!---Avatar317(talk) 22:16, 4 August 2020 (UTC)[reply]