Talk:SIM swap scam

Page contents not supported in other languages.
Source: Wikipedia, the free encyclopedia.

How the fraud works through Law Enforcement agencies

PIN1, PIN2 and PUK codes are available at the backend, sometimes even in frontend customer care section of company outlets. A dummy card is used to activate with the codes and use the account on another mobile phone. That's all.
It becomes easier to manipulate and hijack identity when there are Dual SIM slots in the phone and the person switches off the phone. Keeping phone always switched "on" has the disadvantage of allowing eavesdropping as well as the possibility of hostile programs being downloaded, and so a balance has to be made.

Details missing

Why Sim PIN and PUKs are not required for the switch? Zezen (talk) 21:19, 4 January 2020 (UTC)[reply]

AT&T etc. employees do it themselves: https://www.vice.com/en_us/article/d3n3am/att-and-verizon-employees-charged-sim-swapping-criminal-ring

-> Let us update it.

Zezen (talk) 18:23, 23 January 2020 (UTC)[reply]

Section of mitigations?

I know that there are alleged defenses against SIM swapping, like using VOIP numbers (e.g. Google Voice) or avoiding SMS 2FA whenever possible. I don't think there's any data to support those defenses, but I could be wrong. Should there be a section on this? RentedUniverse (talk) 14:18, 3 August 2020 (UTC)[reply]

If any mitigations are discussed in Reliable Sources
WP:OR. Thanks!---Avatar317(talk) 22:16, 4 August 2020 (UTC)[reply
]