📜 ⬆️ ⬇️

The most expensive mistake in my life: in detail about the attack on the port of the SIM card

Hi, Habr! I present to your attention the translation of the article "The Most Expensive SIM-port Of My Life: Details Of SIM port hack" by Sean Coonce.

Last Wednesday, I lost over $ 100,000. The money evaporated within 24 hours as a result of the “attack on the port of the SIM card”, which cleared out my Coinbase account. Four days have passed since then, and I am devastated. I have no appetite; I can not fall asleep; I am filled with feelings of anxiety, conscience and shame.

It was the most expensive lesson in my life, and I want to share experiences and lessons learned with as many people as possible. My goal is to increase people's awareness of these types of attacks and motivate you to increase the security of your online identity.

It is still very damp (I still have not told my family about it); Please keep the conviction of the naive security practices described in this post.
')

Attack details


You may ask: “And what is this all about the attack on the port of a SIM card?” To describe the attack, let's first consider a typical online personality. The diagram below should be familiar to most of you.



Many of us have a primary email address, which is connected to a HUGE number of other online accounts. Many of us also have a mobile device that can be used to recover a forgotten email password.

Authorized SIM Port


One of the services offered by telecom operators to customers is the ability to port a SIM card to another device. This allows the customer to request the transfer of their phone number to a new device. In most cases, this is an absolutely legal process; This happens when we buy a new phone, change the operator, etc.

Attack on the SIM card port


However, “attack on a SIM-card port” is a malicious port made from an unauthorized source — an attacker. The attacker ported your SIM card to the phone controlled by him. Then the attacker begins the process of resetting the password on the email account. The confirmation code is sent to your phone number and intercepted by the attacker, as it now controls your SIM card. The diagram below shows the attack step by step.



As soon as an attacker gets access to your email address, they begin to move from the service to the service where you use this email address (banks, social networks, etc.). If the attacker is especially harmful, he can block your access to your own accounts and request a fee for returning access.

Let's digress for a minute and think about the amount of personal information associated with one Google account:


Sequence of events


To better understand how the attack takes place and see its scope, let's dip into the timeline of this attack itself. I want to show how the attack was made, what I was experiencing at this time and what you can do to protect yourself in case of such symptoms.

The time schedule is divided into four parts:




Lesson learned and recommendations


It was the most expensive lesson in my life. I lost a significant portion of my capital in 24 hours; irrevocably. Here are some tips to help others better protect themselves:




As for the comments of readers ...


Given my practice in protecting the device, I probably deserve to be hacked — I understand that. This does not make it easier, and condemnation only blurs the meaning of the story, which is to:


I can't stop thinking about the small, simple things I could do to protect myself. My head is filled with thoughts about the "what if ..."

However, these thoughts are juxtaposed with two overlapping feelings - laziness and bias of survival. I have never taken my online security seriously because I have never experienced an attack. And even though I understood my risks, I was too lazy to protect my assets with proper severity.

I encourage you to learn from these mistakes.

Source: https://habr.com/ru/post/453286/


All Articles