SIM swappers have adapted their attacks to steal a target’s phone number by porting it into a new eSIM card, a digital SIM stored in a rewritable chip present on many recent smartphone models.
SIM swappers have adapted their attacks to steal a target’s phone number by porting it into a new eSIM card, a digital SIM stored in a rewritable chip present on many recent smartphone models.
I’ve always been under the impression that in order to steal a phone number you have to social engineer it from the company or have physical access to the Sim card in the first place. Is that not the case?
From the text:
No need for social engineering.