1-800-270-9034

New SIM Swapping Attacks

According to new research, eSIM cards are being hijacked for cyber attacks. eSIM cards are remotely programmable chips that are stored within phones and other wearable devices.

According to new research, eSIM cards are being hijacked for cyber attacks. eSIM cards are remotely programmable chips that are stored within phones and other wearable devices. Because they are remotely programmable, they are popular with manufacturers as there is no need for a SIM access point on the device.

The eSIM can be installed by scanning a QR code from the phone company. To conduct the attack, attackers have simply been making a request for the QR code on the phone company’s website.

As phone companies have introduced measures to combat SIM swapping, this demonstrates how attackers will change techniques to achieve their goals. Swapping the SIM does give attackers access to the victim’s phone number and their correspondence, which increases the risk of personal loss as attackers may try to request money from friends and family.

It also increases the risk of multi-factor authentication (MFA) bypass where the user has been receiving alerts to their phone number.

At Surefire Cyber, we have seen an increase in the number of attacks that involve MFA bypass. One of the ways this can be done is where a threat actor adds their own method for authentication such as SIM swapping or adding an authenticator app. Surefire Cyber has observed an increase in threat actors adding their own method for authentication, compared to 2023. However, a lack of MFA on key services, such as VPN, remains the dominant cause of compromise.

To combat this, organizations should consider using more robust methods of MFA, such as authenticator apps, rather than relying on phone numbers.

Published On: March 15, 2024

Share the Article

Recent Articles

Scroll to Top

This website uses cookies to improve your browsing experience. By clicking accept, you consent to the use of cookies. To learn more about the cookies we use, visit our Privacy & Cookie Policy.

Certifications and Credentials

  • AWS Certified Solutions Architect – Associate
  • AWS Cloud Practitioner
  • Cellebrite and Paraben Certified Mobile Examiner
  • Cellebrite Certified Mobile Examiner (CCME)
  • Cellebrite Certified Physical Analyst and Certified Operator
  • Certified Access Data Forensic Analyst
  • Certified E-Discovery Specialist (ACEDS)
  • Certified Forensic Computer Examiner (CFCE)
  • Certified Forensic Examiner-Access Data (ACE)
  • Certified Hard Drive Repair Technician
  • Certified in SANS Windows Forensic Analysis (GCFE)
  • Certified Information Security Manager (Certified by ISACA)
  • Certified Information Systems Security Professional (CISSP)
  • Certified Mac Forensics Analyst
  • Certified Public Accountant
  • Chief Information Security Officer (Certified by EC-Council)
  • Citrix Certified Integration Architect
  • CompTIA A+
  • AWS CompTIA Cybersecurity Analyst (CySA+)
  • CompTIA Linux+
  • CompTIA Linux+ / Linux Professional Institute Certified Linux Administrator (LPIC-1)
  • CompTIA Pentest+
  • CompTIA Cloud+
  • CompTIA Security+
  • Cyber Forensics and Incident Response certificate – Carnegie Mellon
  • Department of Defense Cyber Investigations Training Academy, Computer Forensic Examiner
  • EC-Council Computer Hacking Forensic Investigator Certification (CHFI)
  • EC-Council Computer Hacking Forensic Investigator Certification (CHFI)
  • EnCase Certified Examiner (EnCE)
  • FBI Certified Crisis Management Coordinator
  • GIAC Certified Forensic Analyst (GCFA)
  • GIAC Certified Forensic Examiner (GCFE)
  • GIAC Advanced Smartphone Forensics (GASF)
  • GIAC Information Security Fundamentals
  • GIAC Security Essentials (GSEC)
  • International Association of Computer Investigation Specialists (IACIS)
  • Licensed Member, California Bar Association
  • Magnet Certified Forensics Examiner (MCFE)
  • Microsoft Certified Professional (MCP)
  • Microsoft Certified Systems Engineer
  • Professional – Information Systems Security Architecture Professional (CISSP-ISSAP)
  • Professional – Information Systems Security Management Professional (CISSP-ISSMP)
  • Senior Professional Human Resources Certification
  • VMware Certified Professional

Report a New Incident

Your incident report has been submitted.