SIM Swappers Are Exploiting eSIM Vulnerabilities for Financial Frauds: Report

SIM swappers are reportedly using stolen and leaked phone account credentials to port the victim’s number.

Advertisement
Written by Akash Dutta, Edited by Manas Mitul | Updated: 15 March 2024 17:47 IST
Highlights
  • As per the report, the incidents of SIM swapping have increased globally
  • Hackers are said to breach eSIM security to port a number to their device
  • eSIM users can use 2FA and authenticator apps to improve security

Hackers are reportedly porting numbers to access victim’s online banking services to steal their money

Photo Credit: Unsplash/ Brett Jordan

SIM swapping crimes are on the rise globally, according to a new report. These crimes are primarily committed using eSIM (Embedded Subscriber Identity Modules) users. eSIMs are digitally stored SIM cards which are embedded into a device using a software. Hackers are now reportedly exploiting vulnerabilities within this technology to brute force into the victim's phone account to port the number to their own device. The findings also revealed that the bad actors are mainly interested in victim's online banking accounts and other financial services.

The information comes from the Russian cybersecurity firm FACCT, a spin-off of Group IB. In its report, it highlighted that it has recorded “more than a hundred attempts to enter clients' personal accounts in online services from just one financial organisation.” It also stated that cybercriminals have been using this method globally for at least a year.

Advertisement

Modus operandi of the cybercrime is straightforward. Earlier, the criminals would deploy social engineering strategies or use insiders at telecom companies to illegally port numbers to their devices. However, the report states that now the hackers have resorted to exploiting the vulnerabilities within eSIM. While it did not explain the technicalities, the process includes accessing the phone account credentials of a victim by either stealing them, getting access to leaked details through data breach incidents, or brute-forcing their way into the victim's account.

Once the SIM swappers gain the credentials, they generate QR codes through the hijacked phone account which can be used to port the device directly, circumventing the usual procedure. The report also added that the criminals were only focused on committing financial fraud by accessing the victim's online banking accounts, crypto wallets, and more.

Advertisement

“Having gained access to the victim's mobile phone number, cybercriminals can obtain access codes, two-factor authentication for various services, including banks, instant messengers, which opens up a lot of opportunities for attackers to implement criminal schemes,” said Dmitry Dudkov, Fraud Protection Department Specialist at FACCT.

FACCT also urged eSIM users to improve the security of their phone account by using two-factor authentication and keeping a complex password which includes a randomised alphanumeric series and special characters. For added security, users can opt for authenticator apps.


Is the Samsung Galaxy Z Flip 5 the best foldable phone you can buy in India right now? We discuss the company's new clamshell-style foldable handset on the latest episode of Orbital, the Gadgets 360 podcast. Orbital is available on Spotify, Gaana, JioSaavn, Google Podcasts, Apple Podcasts, Amazon Music and wherever you get your podcasts.
Affiliate links may be automatically generated - see our ethics statement for details.
 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Further reading: Cybersecurity, eSIM, SIM card, hacking
Advertisement

Related Stories

Popular Mobile Brands
  1. OnePlus Summer Sale: Deals on OnePlus 15, OnePlus 13 and More Announced
  2. Why Is GTA 6 Not Launching on PC Alongside Consoles? Take-Two CEO Explains
  3. Top Phones Under Rs. 50,000 in India: iQOO 15R Takes the Lead
  4. Xiaomi India Claims Record Performance in Mid-Premium Smartphone Segment
  5. US FCC Moves to Bar Chinese Labs From Certifying US-Bound Devices: Report
  6. Detailed Google Pixel 11 Series Leak Reveals Chip, Cameras and Design
  7. Asus Zenbook S14 (UX5406) Review: Premium, Portable, and Powerful
  8. Here's How Much the B by Lenskart Smart Glasses Will Cost in India
  1. Google to Host The Android Show Ahead of I/O 2026 Developer Conference Next Week
  2. Astronomers Use Webb Telescope to Study Exoplanet Surface Beyond Atmosphere
  3. Temple Wearable Enters Early Access: Zomato Co-Founder Deepinder Goyal Says First 100 Units Ready to Ship
  4. Samsung Galaxy A27 Seemingly Confirmed via Company's Website, Could Launch Soon
  5. Western Union Launches USDPT Stablecoin on Solana Blockchain, Coin Issued by Anchorage Digital
  6. Anthropic Announces New AI Services Company, OpenAI Reportedly Follows Suit
  7. Samsung Galaxy Z Fold 8, Galaxy Z Wide Fold Design Emerges via One UI 9 Leak
  8. Honor Play 80 Plus Launched With 7,500mAh Battery, 13-Megapixel Camera: Price, Specifications
  9. Kuheli OTT Release Date: When and Where to Watch This Bengali Murder Mystery Online?
  10. Thukra Ke Mera Pyaar Season 2 OTT Release Date: When and Where to Watch it Online?
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.