Scattered Spider used clever SIM swapping and ransomware to target high-profile brands—until one key move landed a 10-year sentence. Curious how high-tech thieves exploit our trust? Read more about their tactics.

https://thedefendopsdiaries.com/the-rise-and-tactics-of-the-scattered-spider-cybercriminal-group/

#scatteredspider
#cybercrime
#ransomware
#socialengineering
#simhijacking

The Rise and Tactics of the Scattered Spider Cybercriminal Group

Explore the tactics of Scattered Spider, a cybercriminal group using advanced techniques like SIM swapping and ransomware.

The DefendOps Diaries

🕵 🔎  SIM Hijacking: What You Need to Know 🔎

Our mobile phone numbers are often the gateway to our online identities, from multifactor authentication (MFA) codes to password recovery links, these numbers play a crucial role in keeping our accounts secure. Yet, they come with risks, particularly the threat of SIM hijacking.

SIM swapping, or hijacking, is a cyber attack where a hacker convinces a telecom provider to transfer a victim's phone number to a new SIM card. This allows the attacker to intercept calls and texts, gaining access to sensitive accounts often within minutes.

Many victims have faced severe financial losses, especially in the realm of cryptocurrency, where transactions are irreversible. According to recent investigations, underground markets are booming with SIM-swapping services, attracting individuals—often young ones—looking for quick cash. The lure of easy money is dangerous, and it's leading to serious criminal charges against those involved.

#CyberSecurity #SIMHijacking #CyberCrime #ThreatIntelligence

🔗 https://intel471.com/blog/a-briefing-on-sim-hijacking

Europol busts up two SIM-swapping hacking rings - What a nightmare: your phone goes dead, and you can't log into your bank account because it's cont... more: https://nakedsecurity.sophos.com/2020/03/17/europol-busts-up-two-sim-swapping-hacking-rings/ #operationquinientosdusim #two-factorauthentication #2-factorauthentication #sim-swappingattacks #operationsmartcash #securitythreats #simhijackers #simhijacking #simswapfraud #simswapping #simjacking #law&order #simswaps #malware #europol
Europol busts up two SIM-swapping hacking rings

Naked Security
Google will now accept your iPhone as an authentication key - Google has updated its Smart Lock to let iOS users security-dongle-ize their iPhones. more: https://nakedsecurity.sophos.com/2020/01/17/google-will-now-accept-your-iphone-as-an-authentication-key/ #2-factorauthentication #secureenclaveprocessor #authenticationkeys #secureenclave #googlechrome #simhijacking #simswapfraud #simjacking #bluetooth #smartlock #simswaps #android #iphones #simswap #google #mobile #iphone #apple #ios
Google will now accept your iPhone as an authentication key

Naked Security

@mark It was done via #simhijacking, also known as the #portoutscam: https://motherboard.vice.com/en_us/article/vbqax3/hackers-sim-swapping-steal-phone-numbers-instagram-bitcoin

It happened while I was in the hospital. Later found it listed on an auction site, where it sold for a lot of money.

Fortunately, I was an early user of #Instagram (when it was called #Burbn), and CEO Kevin Systrom responded to my plaintive tweets. He got it back for me.

Of course, the buyer and his friends were very upset and harassed me and my family for a while. But it's calmed down since!

The SIM Hijackers

Meet the hackers who flip seized Instagram handles and cryptocurrency in a shady, buzzing underground market for stolen accounts and usernames. Their victims' weakness? Phone numbers.