• PoorlyWrittenPapyrus@lemmy.world
      link
      fedilink
      arrow-up
      48
      ·
      1 year ago

      Happened to me because I had an account on a crypto exchange. The attacker went in to my phone carrier’s store, likely with a fake ID, convinced the store they were me, then got a new SIM card and reset my password on everything they could with it. They logged in to my crypto exchange mere minutes after they got the SIM, saw the $0.03 in my account, and logged out.

    • DokPsy@infosec.pub
      link
      fedilink
      arrow-up
      15
      arrow-down
      1
      ·
      1 year ago

      Sometimes it’s less about the person that you’re targeting and more about what that access gives you.

      Low level accountant? Office worker with an excel file full of passwords or has correspondence with your actual target at a different company that you can pose as to gain access into?

      They’re just a step in the process.

    • mea_rah@lemmy.world
      link
      fedilink
      arrow-up
      9
      ·
      1 year ago

      I’m not sure where this idea of high profile target comes from. The sim swap attack is pretty common. People just need to be in some credentials leak DB with some hint of crypto trading or having some somewhat interesting social media account. (either interesting handle or larger number of followers)

      There are now organized groups that essentially provide sim swap as a service. Sometimes employees of the telco company are in on it. The barrier to entry is not that high, so the expected reward does not need to be that much higher.

    • Fedora@lemmy.haigner.me
      link
      fedilink
      arrow-up
      2
      arrow-down
      2
      ·
      1 year ago

      Hahah… of course, phishing doesn’t exist, right? Your SMS app knows that the website you paste your code into is the legit one, right??