Twitter CEO Hack Highlights Dangers of 'SIM Swap' Fraud

This type of attack targets a weakness in "two-factor authentication" via text message to validate access to an account.

Advertisement
By Agence France-Presse | Updated: 4 September 2019 11:07 IST

Even with considerable security precautions in place, Twitter chief executive Jack Dorsey became the victim of an embarrassing compromise when attackers took control of his account on the platform by hijacking his phone number.

Dorsey became the latest target of so-called "SIM swap" fraud which enables a fraudster to trick a mobile carrier into transferring a number - potentially causing people to lose control not only of social media, but bank accounts and other sensitive information.

Advertisement

This type of attack targets a weakness in "two-factor authentication" via text message to validate access to an account, which has become a popular break-in method in recent years.

Twitter said Friday the account was restored after a brief time in which the attackers posted a series of offensive tweets.

Advertisement

But Ori Eisen, founder of Arizona-based security firm Trusona, which specialises in authentication without passwords, said the rapid fix should not be seen as an answer to the broad problem of SIM swap fraud.

"The problem is not over," Eisen said, noting that these kinds of attacks have been used to take over other high-profile social media accounts and for various kinds of fraud schemes.

Advertisement

Eisen said it's not clear how many people are attacked in this manner but that automated technology can create billions of calls that lure people into giving up information or passwords.

- Switching phones, or fraud? -

Some analysts say hackers have found ways to easily get enough information to get a telecom carrier to transfer a number to a fraudster's account, especially after hacks of large databases which result in personal data sold on the so-called "dark web."

Advertisement

"Mobile accounts' text messages can be hijacked by sophisticated hardware techniques, but also by so-called 'social engineering' -- convincing a mobile provider to migrate your account to another, unauthorised phone," said R. David Edelman, a former White House adviser who heads a cybersecurity research center at the Massachusetts Institute of Technology.

"It only takes a few minutes of confusion to make mischief like Dorsey experienced."

Thousands of these attacks have been reported in countries where mobile payments are common, including in Brazil, Mozambique, India and Spain.

Researchers at the security firm Kaspersky say security systems by many mobile operators "are weak and leave customers open to SIM swap attacks" especially if the attackers are able to gather information such as birth dates and other data.

In a recent blog post, Kaspersky researchers Fabio Assolini and Andre Tenreiro said some cases come from cybercriminals paying off corrupt employees of mobile carriers - for as little as $10 to $15 per victim.

"The interest in such attacks is so great among cybercriminals that some of them decided to sell it as a service to others," the researchers wrote.

In Brazil, some criminals have taken over victims' WhatsApp accounts, using it to ask the person's friends for "urgent payment," Assolini and Tenreiro wrote.

'Ripe' for fraud
"This is a pretty ripe avenue for fraud," said Joseph Hall, technologist at the Center for Democracy & Technology in Washington.

Hall said some carriers are using artificial intelligence to separate the legitimate SIM card replacements from fraud, but that this has not been universally deployed.

"I would blame the carriers for not having more robust ways to authenticate users," he added, while also calling on Twitter to offer better safeguards.

A faked tweet from the president or other prominent person could lead to "devastating consequences," such as a plunge in financial markets, Hall said. 

"This kind of thing becomes hard to counteract, because even after the information comes out that it's a hoax, people may not believe it," he said.

The Dorsey case, Hall said, highlights the need for better forms of authentication, especially for large online platforms like Facebook and Twitter where messages can have an impact.

This could involve a physical key that plugs into a device or a software-based system such as Google Authenticator, Hall noted.

Eisen said that paradoxically, the push for longer and more complex passwords has led to greater use of insecure text messages for authentication.

"The security practitioners must come to terms with the fact that what used to work doesn't work now," he said.

"We need to look for solutions that are not so easily exploited by bad guys and are easy for people to adopt."

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Further reading: Twitter, Jack Dorsey
Advertisement

Related Stories

Popular Mobile Brands
  1. OTT Releases This Week: O'Romeo, Tu Yaa Main, Main Wo Aur Fuji, Thaai Kizhavi, and More
  2. Ai+ Nova 2 Ultra Launched in India Alongside Ai+ Nova 2: See Prices
  3. Vivo V70 FE Goes on Sale in India With These Offers
  4. OnePlus Nord 6 With 9,000mAh Battery Is Now Available to Purchase in India
  5. Vivo V70 FE vs Nothing Phone 4a Pro vs OnePlus Nord 6
  6. Ai+ PulseTab Launched in India: Here's How Much It Costs
  1. Andromeda XXXVI Discovery Sheds Light on Dark Matter Rich Dwarf Galaxies
  2. Realme C100 4G Launched With 8,00mAh Battery, 50-Megapixel Rear Camera: Price, Features
  3. Samsung's Galaxy Unpacked Event Details for Galaxy Z Fold 8, Galaxy Z Fold 8 Wide Launch Leaked: See Expected Date, Location
  4. Vivo T5 Pro 5G Colour Options Revealed as Launch in India Draws Near
  5. Stablecoin Transactions Could Reach $1.5 Quadrillion Mark by 2035, Chainalysis Claims
  6. iQOO 16 Will Feature Flagship Snapdragon 8 Elite Gen 6 Pro Chip and Samsung Display, Tipster Claims
  7. Major Google Bug Triggers Gemini AI Leak in Google Pay for Business, Oyo Hotels and Other Apps: Report
  8. Motorola Edge 70 Pro Leak Reveals Design, Colourways as HDR10+ Database Listing Hints at India Debut
  9. Blockchain Sleuth Claims DPRK Unit Made $1 Million a Month Posing as Crypto IT Workers
  10. Oppo Find X9s Pro Design and Colour Options Seen in Leaked Renders Ahead of April 21 Launch
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.