Quantcast
Sim Swapping - The Key to Privacy - BlockNewsAfrica
  • About
  • Contact
  • Content Policy
  • Partners
JOIN TELEGRAM
BlockNewsAfrica
Advertisement
  • Home
  • Resources
  • Countries
    • Nigeria
    • South Africa
    • Ghana
    • Kenya
  • Buy Bitcoin
    • Buy Bitcoin in Nigeria
      • Luno
    • Buy Bitcoin in South Africa
      • Luno
    • Buy Bitcoin in Ghana
      • Ebitcoinics
    • Buy Bitcoin in Kenya
    • Buy Bitcoin in Cameroon
    • Buy Bitcoin in Africa
  • DeFi
  • P2P Trading
  • Earn Bitcoin
No Result
View All Result
  • Home
  • Resources
  • Countries
    • Nigeria
    • South Africa
    • Ghana
    • Kenya
  • Buy Bitcoin
    • Buy Bitcoin in Nigeria
      • Luno
    • Buy Bitcoin in South Africa
      • Luno
    • Buy Bitcoin in Ghana
      • Ebitcoinics
    • Buy Bitcoin in Kenya
    • Buy Bitcoin in Cameroon
    • Buy Bitcoin in Africa
  • DeFi
  • P2P Trading
  • Earn Bitcoin
No Result
View All Result
BlockNewsAfrica
No Result
View All Result
Home Featured

Sim Swapping – The Key to Privacy

FomoHunt by FomoHunt
January 17, 2020
in Featured
0
Sim Swapping – The Key to Privacy
  • Save
Share on FacebookShare on Twitter

Lives today are digital. They are dependent on the passing of data between various networks, unhindered, and unencumbered. Our phones act as the hub of our digital lives, to the extent that devices are now available with the sole purpose of tracking our phones if they are ever lost. Several studies have shown, unsurprisingly, that users are becoming more reliant on mobile devices not only for communication, but for tracking personal performance, finances, and health.

As a device rarely further away than our arm 24/7 (Did you check where yours is?) mobile phones are increasingly being used as a secondary verification for our online identities, or as the last line of defense against identity theft. Our data has been compromised in numerous ways over the past few years, and perhaps the evilest is SIM Swapping.

  • Save
Credit: David Becher (Flickr)

SIM Swapping is a well-known attack vector but continues to be effective due to improper training and predictability of human behavior. Victims of SIM Swaps wake up to find their phones with “No Service.” Calls do not work, and data services are gone. Email accounts are locked, and logins no longer function. Access to online services like banks, investment management, cloud services, and anything requiring a login and password becomes inaccessible. The attacker has not only taken control of the online accounts but has changed the passwords to prevent anyone else from using them. 

A recent report detailed the five major mobile US carriers, AT&T, T-Mobile, Tracfone, US Mobile, and Verizon, as using “ . . . authentication challenges that could easily be subverted by attackers.”

How Does a SIM Swap Work?

  • Save

Fraud prevention in the current system is done using 2FA or “Two Factor Authentication.” This requires a user to enter a one-time code sent to their device via SMS text. Users often are prompted to do this after trying to access online accounts from a new computer or IP address. However, this security measure is entirely ineffective if a hacker has access to the phone receiving the one-time code. 

To execute a successful SIM Swap, a hacker must acquire enough information about a person to impersonate them on a call to their cellular provider. The hacker is then able to convince the representative to switch the user’s phone number to a different SIM card. This switch will port the account to the new card rendering the original phone completely useless. Hackers have used this technique for years, and have gone as far as bribe telecom employees to switch over SIM access for a few hundred dollars. The attacker then uses this new phone to log into and change all usernames and passwords. 

While this type of attack is not new, cryptocurrency users have recently become targets due to the irreversible nature of their transactions. Most recently, 19-year-old Yousef Selassie allegedly stole over $1 million in cryptocurrency from SIM Swaps alone. Others have seen much more significant losses, namely a $24 million loss by crypto investor Michael Terpin, who is now in a lawsuit with AT&T over inefficient security measures.

Preventing an Attack

  • Save
Credit: iPhone Hacks

Attack prevention is often a multi-tiered approach. First, disable any SMS text 2FA logins: Google, Bank, Credit Card, Social Media, Email, Crypto Exchange, Smart Fridge, etc. Immediately install and set up a 2FA app like Google Authenticator or Authy on your phone. Services like Microsoft and Steam have unique versions for their websites. These 2FA services will create a security measure independent of cell service or Wifi. Instead of receiving a text message, a user must enter a unique six-digit code that refreshes every minute. Once the correct code is entered, the user has access to the website.

One caveat, make sure to backup your 2FA codes immediately. Google Authenticator allows this to be done relatively quickly through its security page, and Authy has a backup feature as well. 

This is important. 

If you upgrade your phone or update the OS, these backup codes will be required to restart your 2FA. Without them, you will have to contact the companies with which you set up the 2FA and submit documentation proving your identity before they can manually reset it. Not ideal in a market with as high volatility as crypto.

A more drastic measure is to have a separate cell phone whose only purpose is to operate the 2FA app. Install Google Authenticator or Authy, then turn off the phone until you need to use either app. This way, if your daily driver is stolen or misplaced, you still have access to your 2FA. The security-conscious even go so far as to have a separate laptop or computer, which is used only for crypto trading and has a 2FA backup. Are these steps overkill? Perhaps, but the recovery from these attacks can be lengthy and expensive.

Not even those in the technology sector are immune to such attacks. The CEO of Twitter, Jack Dorsey, was famously the victim of a SIM Swap in 2019 that saw his Twitter account taken over. 

The director of the security firm Flashpoint, Allison Nixon, has stated that a SIM Swap “ . . . requires no skill, and there is literally nothing the average person can do to stop it.” 

Is It Worth It?

Taking responsibility for security protocols can be a daunting task. The online world can be a strange and intimidating place, especially when it concerns cryptocurrency and online data. The steps outlined here are simple, yet effective ways to protect against those who seek to profit from lackadaisical users. As we move towards a more connected society, those who do not defend themselves have no one else to blame if they fall victim. 

Feature by FomoHunt.

  • Save
Tags: PrivacySecuritySim Swapping
Lofi DeFi Lofi DeFi Lofi DeFi
Previous Post

Dash Partners With Nigerian Exchange BitFxt to Facilitate Remittances to Nigeria at 1% Cost

Next Post

How To Buy Bitcoin In South Africa

FomoHunt

FomoHunt

FomoHunt is the premiere crypto and blockchain event discovery platform. With a strong presence at most events and conferences, FomoHunt brings you exclusive content around up and coming projects as well as the traditional mainstays. FomoHunt wants to keep you up to date about everything new happening in the space by giving you total access to every event in crypto.

Related Posts

Cartesi As A Leading Layer-2 Platform For The Development Of Smart Contracts
  • Save
Featured

Cartesi As A Leading Layer-2 Platform For The Development Of Smart Contracts

by BlockNewsAfrica
March 31, 2021
Compensation on the Algorand Governance: Using a Decentralized System to Guarantee Rewards
  • Save
Featured

Compensation on the Algorand Governance: Using a Decentralized System to Guarantee Rewards

by BlockNewsAfrica
December 30, 2020
How VeriTX Plans to Build a Digital Supply Chain for Aircraft Parts Using Algorand
  • Save
Featured

How VeriTX Plans to Build a Digital Supply Chain for Aircraft Parts Using Algorand

by BlockNewsAfrica
December 22, 2020
How Algorand is Promoting Decentralized and Transparent Gaming: An Analysis of World Chess
  • Save
Featured

How Algorand is Promoting Decentralized and Transparent Gaming: An Analysis of World Chess

by BlockNewsAfrica
November 30, 2020
Everything you need to know about Bitcoin – 2020 and Beyond
  • Save
Featured

Everything you need to know about Bitcoin – 2020 and Beyond

by BlockNewsAfrica
November 14, 2020
Next Post
bitcoin-logo-blocknewsafrica
  • Save

How To Buy Bitcoin In South Africa

Things You Should Read

beam-defi-roadmap-PR
  • Save

Beam Releases DeFi Roadmap

September 23, 2020
What is Uniswap? Decentralized Exchange and DeFi Powerhouse
  • Save

What is Uniswap? Decentralized Exchange and DeFi Powerhouse

September 16, 2020
What Are Ethereum ERC20 Tokens?
  • Save

What Are Ethereum ERC20 Tokens?

May 23, 2020
Top 5 Peer-to-Peer (P2P) Cryptocurrency Exchanges in Africa
  • Save

Top 5 Peer-to-Peer (P2P) Cryptocurrency Exchanges in Africa

November 1, 2020
Facebook Twitter Instagram Youtube
BlockNewsAfrica

Cryptocurrency and blockchain news by Africa for Africans: We provide the latest news, updates, and developments from the African continent.

Find Tags

Algorand Binance Binance Coin (BNB) Binance P2P Binance USD Bitcoin (BTC) Bitcoin ATMs bitfxt Blockchain Blockchain and AI Africa Conference Bundle Buycoins Africa CryptoLocally DASH Earn Crypto eBitcoinics ERC 20 Ethereum Exchanges Fiat-On-Ramps FLASH FlashCoins Ghana Cedi ICE3X Jobs Litecoin LocalBitcoins LocalCryptos Luno Mobile Money NaijaCrypto Naira (NGN) P2P Exchange P2P Trading Paxful Privacy Quidax Remitano Ripple Tether USD Trading Tron (TRX) Twitter VALR YellowCard

Disclaimer: Information like articles, reviews, and tutorials found on BlockNewsAfrica is not investment advice. You are encouraged to do your own research (DYOR) before making any important decisions. You can always refer to our content policy.

© 2020 BlockNewsAfrica - Your ultimate African cryptocurrency companion.

No Result
View All Result
  • Home
  • Resources
  • Countries
    • Nigeria
    • South Africa
    • Ghana
    • Kenya
  • Buy Bitcoin
    • Buy Bitcoin in Nigeria
      • Luno
    • Buy Bitcoin in South Africa
      • Luno
    • Buy Bitcoin in Ghana
      • Ebitcoinics
    • Buy Bitcoin in Kenya
    • Buy Bitcoin in Cameroon
    • Buy Bitcoin in Africa
  • DeFi
  • P2P Trading
  • Earn Bitcoin

© 2020 BlockNewsAfrica - Your ultimate African cryptocurrency companion.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
Share via
Facebook
Twitter
LinkedIn
Mix
Pinterest
Tumblr
Skype
Buffer
Pocket
VKontakte
Xing
Reddit
Flipboard
MySpace
Delicious
Amazon
Digg
Evernote
Blogger
LiveJournal
Baidu
NewsVine
Yummly
Yahoo
WhatsApp
Viber
SMS
Telegram
Facebook Messenger
Like
Email
Print
Copy Link
Powered by Social Snap
Copy link
CopyCopied
Powered by Social Snap