Smart Security Practices From The Best
What do Lido, Red Stone, YieldNest, and Braintrust have in common? They’ve developed effective methods for improving security without drastically increasing costs. Top-tier protocol […]
Learn more about the SIM card swap scam which is one of the most popular attack vectors for X account hijacking.
Recently, many influential social media accounts have been taken over and used for scamming their followers.
These include:




Some of these projects take security very seriously, and yet they still prove vulnerable. Recently, it has become clear that even very powerful institutions can be victims of such an attack because of their glaring oversight.

This reminds us that everyone needs to be very careful. One is only as secure as their weakest point. Learn about scammers’ methods and how to defend yourself against them.
A SIM swap is nothing more than taking control of another SIM card by assigning its data to a new SIM card that can be used with a new mobile device. This may be a legal procedure that helps recover the phone number in the event of a damaged or lost SIM card.
However, it can also be an attack vector that criminals like to use. It allows them to come into possession of victims’ phone numbers. Take control over incoming messages (including 2FA codes) and get unauthorized access to victims’ account.
In 2020, a group of researchers examined five U.S. carriers—AT&T, T-Mobile, Tracfone,
US Mobile, and Verizon Wireless, all five of them were vulnerable (“An Empirical Study of Wireless Carrier Authentication for SIM Swaps”, Lee et al.). Out of 50 attempts, 39 of them were successful and allowed the number to be taken over.

Mobile phone service providers were using methods that do not work well and are easy to bypass by professionals.

Fortunately, the research results made some noise and some providers started to be more aware of the problem and take the matter seriously.
It is fascinating research, and highly recommended for those who are more curious.
There are already security measures in place that help mitigate the risk. Unfortunately, it depends very much on the country and the specific provider. The security measures used vary and do not provide the same sense of security.
However, look at a few options of what is possible so you know what to expect:
Simply obtaining the number allows the threat actor to impersonate the owner. Sim swapping poses the greatest threat when it is used as an authentication method. A threat actor who took control of the phone number might be able to authorize its owner’s operations to access the account and sometimes even completely take it over the.
The most important security measures against sim swap attacks you can take are the following:
A detailed list of how to take care of this on X has been published by the security alliance and we strongly recommend EVERYONE go through it.
Ignoring that not only endangers the mobile phone owner but also all people around. Friends, family, and other users may be exploited by the trust built on the victim’s account.
The SIM swap fraud is not the only one to protect against. Read the next article about other methods of taking over an X account and how to prevent it.
Let’s engage in a conversation about security. Share details about your current security strategies and measures. This will enable us to provide professional advice on potential enhancements and additional actions that could be beneficial for your security framework.
Composable Security 🇵🇱⛓️ is a small team with a holistic approach that goes beyond the code. A combination of expertize in Solidity smart contract security and experience gained through 6+ years securing global fintechs and Polish banks help comprehensively take care of DApp security. Learn more about us.
Creators of the Smart Contract Security Verification Standard and the first Security Guide for DApps CTOs, Lead Developers, and Security Enthusiasts.
Meet Composable Security
Get throughly tested by the creators of Smart Contract Security Verification Standard
Let us help
Get throughly tested by the creators of Smart Contract Security Verification Standard