Close Menu
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On

How to Convert an Analog Bike to an Electric Bike

21 June 2025

A False Start on the Road to an All-American Bitcoin

21 June 2025

Silent Hill 2 Film Adaptation ‘Return To Silent Hill’ Gets January Premiere Date

21 June 2025
Facebook X (Twitter) Instagram
Just In
  • How to Convert an Analog Bike to an Electric Bike
  • A False Start on the Road to an All-American Bitcoin
  • Silent Hill 2 Film Adaptation ‘Return To Silent Hill’ Gets January Premiere Date
  • How AI Is Helping Students Find the Right College
  • What’s Next For GI, And Last Chance For Intro-Price Subscriptions
  • ‘Wall-E With a Gun’: Midjourney Generates Videos of Disney Characters Amid Massive Copyright Lawsuit
  • Where Is Game Informer’s FBC: Firebreak Review?
  • Seriously, What Is ‘Superintelligence’?
Facebook X (Twitter) Instagram Pinterest Vimeo
Best in TechnologyBest in Technology
  • News
  • Phones
  • Laptops
  • Gadgets
  • Gaming
  • AI
  • Tips
  • More
    • Web Stories
    • Global
    • Press Release
Subscribe
Best in TechnologyBest in Technology
Home » SIM Swappers Are Exploiting eSIM Vulnerabilities for Financial Frauds: Report
Phones

SIM Swappers Are Exploiting eSIM Vulnerabilities for Financial Frauds: Report

News RoomBy News Room15 March 20242 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email

SIM swapping crimes are on the rise globally, according to a new report. These crimes are primarily committed using eSIM (Embedded Subscriber Identity Modules) users. eSIMs are digitally stored SIM cards which are embedded into a device using a software. Hackers are now reportedly exploiting vulnerabilities within this technology to brute force into the victim’s phone account to port the number to their own device. The findings also revealed that the bad actors are mainly interested in victim’s online banking accounts and other financial services.

The information comes from the Russian cybersecurity firm FACCT, a spin-off of Group IB. In its report, it highlighted that it has recorded “more than a hundred attempts to enter clients’ personal accounts in online services from just one financial organisation.” It also stated that cybercriminals have been using this method globally for at least a year.

Modus operandi of the cybercrime is straightforward. Earlier, the criminals would deploy social engineering strategies or use insiders at telecom companies to illegally port numbers to their devices. However, the report states that now the hackers have resorted to exploiting the vulnerabilities within eSIM. While it did not explain the technicalities, the process includes accessing the phone account credentials of a victim by either stealing them, getting access to leaked details through data breach incidents, or brute-forcing their way into the victim’s account.

Once the SIM swappers gain the credentials, they generate QR codes through the hijacked phone account which can be used to port the device directly, circumventing the usual procedure. The report also added that the criminals were only focused on committing financial fraud by accessing the victim’s online banking accounts, crypto wallets, and more.

“Having gained access to the victim’s mobile phone number, cybercriminals can obtain access codes, two-factor authentication for various services, including banks, instant messengers, which opens up a lot of opportunities for attackers to implement criminal schemes,” said Dmitry Dudkov, Fraud Protection Department Specialist at FACCT.

FACCT also urged eSIM users to improve the security of their phone account by using two-factor authentication and keeping a complex password which includes a randomised alphanumeric series and special characters. For added security, users can opt for authenticator apps.


Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleRevisiting Pokémon X & Y And Getting Into Truck Games | GI Show
Next Article The Best External Hard Drives

Related Articles

Phones

iPhone 18 Pro Series Tipped to Get Hole-Punch Selfie Camera, Hidden Face ID System

20 June 2025
Phones

Samsung Galaxy S24 FE Gets a Price Cut on Amazon: See Offer

20 June 2025
Phones

Vivo X Fold 5 India Launch Reportedly Set for Mid-July

20 June 2025
Phones

Oppo Reno 14 5G Series Global Launch Date Announced; Amazon, Flipkart Tease Online Availability in India

20 June 2025
Phones

iPhone 16 Pro, iPhone 16 Pro Max Available at Discounted Prices on Flipkart: See Offers

20 June 2025
Phones

Samsung Galaxy S25 FE Renders Leak Online, Suggesting Familiar Design With Thinner Bezels

20 June 2025
Demo
Top Articles

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 202496 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202495 Views

5 laptops to buy instead of the M4 MacBook Pro

17 November 202466 Views

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Latest News
News

‘Wall-E With a Gun’: Midjourney Generates Videos of Disney Characters Amid Massive Copyright Lawsuit

News Room20 June 2025
Gaming

Where Is Game Informer’s FBC: Firebreak Review?

News Room20 June 2025
News

Seriously, What Is ‘Superintelligence’?

News Room20 June 2025
Most Popular

The Spectacular Burnout of a Solar Panel Salesman

13 January 2025124 Views

ChatGPT o1 vs. o1-mini vs. 4o: Which should you use?

15 December 202496 Views

Costco partners with Electric Era to bring back EV charging in the U.S.

28 October 202495 Views
Our Picks

How AI Is Helping Students Find the Right College

21 June 2025

What’s Next For GI, And Last Chance For Intro-Price Subscriptions

21 June 2025

‘Wall-E With a Gun’: Midjourney Generates Videos of Disney Characters Amid Massive Copyright Lawsuit

20 June 2025

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Facebook X (Twitter) Instagram Pinterest
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact Us
© 2025 Best in Technology. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.