Рет қаралды 12,847
SIM swap attacks happen when a malicious actor convinces your cellular provider to port your cellphone number to a new SIM card or new cellphone. In doing so, they can gain access to everything that is important to you online. In this video, I walk through what a SIM swap attack is, recent high profile cases of individuals who have lost high value assets through SIM swaps, and why it's not just about cryptocurrency. If you have anything of value secured by SMS-based two-factor authentication, you could fall victim.
We'll walk through two timelines of late-night SIM swap attacks so you can watch for signs should this ever happen to you. As well, I give you some strategies to keep yourself safe from these types of attacks.
Timestamps
0:00 Intro
1:19 What is a SIM Swap attack
2:25 Are you a target for SIM Swap? What's your attack surface?
3:40 Vitalik Buterin loses Twitter/X account via T-Mobile SIM Swap
4:50 Kroll Employee SIM-Swapped for Crypto Investor Data
5:43 Blockchain Capital’s Bart Stephens Lost $6.3 Million In SIM-Swap Crypto Hack
7:38 Timeline case #1
9:35 Timeline case #2
11:32 How to protect yourself and your assets from SIM Swap attacks
Links
cointelegraph.com/news/bitget...
/ vitalikbuterin
www.dlnews.com/articles/peopl...
krebsonsecurity.com/2023/08/k...
www.forbes.com/sites/iainmart...
/ my-worse-fear-have-com...
/ 35de11517124
github.com/lrvick/security-to...
haveibeenpwned.com/
The Zantastic Newsletter
kathyzant.com/
Get the WordPress Security Mini-Course:
zant.fyi/mini-course-yt
===========================
Connect with me!
===========================
Tik Tok: ➡︎ / kathyzant
Instagram: ➡︎ / kathyzant
Facebook: ➡︎ / kathyzant
LinkedIn: ➡︎ / kathyzant
Website: ➡︎ www.zant.com/
#simswap #2factorauthentication #cryptohacks