The hacker uses different techniques to convince the telephone company to port the victim's phone number to the hacker’s SIM. The same scenario happens: the hacker obtains personal information about the victim, and then contacts the victim's mobile telephone provider. SIM hacking is not exclusive to T-Mobile though - in fact, this could happen at any carrier. Once the hackers had that, they would impersonate the victim with T-Mobile’s customer support staff, ask for a new SIM card number, and hijack their phone numbers. It seems harmless, but just by knowing customer’s phone numbers, hackers could obtain their data. Standardized number that identifies subscribers). Their billing account numbers, and the phone’s IMSI numbers (a unique, The bug exposed customers’ email addresses. The bug was very well known in the criminal underground and there was even a tutorial on how to exploit it on YouTube. A few years ago, hackers found a bug that allowed them to access personal data on any T-Mobile customer.
0 Comments
Leave a Reply. |