FRAUD OPS: SIM SWAPPING

Man

Professional
Messages
3,067
Reaction score
598
Points
113
#1. YOUR TARGET:
First of all, you will need to work on selecting the right target because this will make all the difference in you getting a payout
VS all your effort going down the drain.
Your ideal target should have a specific profile, such as the crypto investors, individuals with an attractive bank balance.

#2. IDENTITY INFORMATION:
Once your target is selected as described above then it’s important for you to have all the details of the identity of your target such as:
Phone Number (obvious)
Phone Carrier
Full Name
Date of Birth
Primary Email
Primary Address

You have to have the above info, the best way to go about it is to get the sim with the same mobile carrier as your victim, lets say your victim is with AT&T
get a sim with AT&T and then do a sim swap on yourself so this will tell you all the information you will need to do this job successfully.

#3. SIM SWAP REQUEST:
Once you have all the information then you need to grow a pair and call the operator using the target’s identity claims, such as name, address,
and so on to convince the operator to move and activate the existing phone number to a SIM card number of your choice.

LET’S MAKE MONEY:
You now control your target’s phone number and ready to make your money! Let’s log into their crypto and bank account to transfer funds into yours!

SIDE NOTE: Once you have control over your victim’s phone number, you will receive all of the communications that the phone normally receives
including SMS texts and voicemails.
This will give you access to SMS PIN second-factor authentication (2FA) and potentially sensitive information from callers.
Once you have this level of detail about a person’s identity,
as well as potentially their second factor for logging into accounts (including some financial institution accounts),
then you can start your work as soon as conveniently possible.
DO NOT FORGET that your victim WILL receive a switch over text from the carrier notifying them of the switch!

MALWARE & PHISHING:
If you don’t already have your target’s information then phishing emails can be used to steal their operator login credentials.

Furthermore, malware can then also installed giving you remote access to the operator’s system and any SIM card data and process.

There is rarely, if ever, a “silver bullet” when it comes to security. Usually, you have to use a multi-pronged approach to committing to this type of work.
Identity theft is certainly a good start to make a SIM swap process more effective:

PROTECTION TIPS:
We are going to outline some important tips for you to protect your identity as a spoofer hustler. If your plan involves email spoofing
or online work being carried out then the first thing you’ll need to do is start with having a multi-hop VPN.

Once you are in control of your victim’s phone number do NOT connect that phone to your local WIFI, do NOT make phone calls to your personal contacts,
remember the SIM SWAP is temporary and it’s generally a race against time as your victim might already be taking active steps to shut it down and to restore access
to their number back to their cellphone so stay focused and act quickly towards your goals.

HOW TO SIMSWAP
YOU WILL NEED TO HAVE THE FULL INFO ON THE PERSON SUCH AS
- FIRST AND LAST, FULL ADDRESS, DATE OF BIRTH, SIN NUMBER, PHONE NUMBER
once you have that your good to go
1st: search up the phone number on freecarrierlookup.com and find out the phone company they are with
2nd: now for example say its rogers. you would have to go to rogers and buy just ONLY a sim card for $10.
3rd: now you have a sim. go home and call rogers. have all the info infront of you and dont stutter.
4th: give them info full info above is what they will ask for.
5th: after going through the verification process tell them you lost your sim card and you would like to transfer your old number to your new sim.
they will say ok then you give them the sim card number and they will swap it. now you can recieve sms text to do insane purchases and login to bank accounts.
DO THIS WITH A BURNER PHONE.
 
Top