Mutt
Professional
- Messages
- 1,369
- Reaction score
- 912
- Points
- 113
SIM swapping is a type of fraud in which an attacker deceives a victim’s phone number by reissuing a SIM card from a telecom operator. This allows the interception of SMS messages containing one-time passwords (OTPs) used in 3D-Secure and other authentication systems. Banks, together with telecom operators and technology partners, employ comprehensive measures to protect against SIM swapping. Here is a detailed explanation of how they counter this threat, focusing on technology, process and customer aspects.
If you want to dive deeper into a specific aspect, like how ML models analyze IMSI changes or how carriers protect SIMs, ask and I'll give you a detailed answer with examples!
1. Understanding SIM Swapping
- How the attack works:
- The scammer collects the victim's personal data (name, address, phone number, sometimes passport details) through phishing, data leaks or social engineering.
- The attacker contacts the telecom operator, posing as the victim, and asks to reissue the SIM card (for example, citing "loss").
- After reissuing, the fraudster receives SMS with OTP, calls and other messages intended for the victim.
- Using OTP, the fraudster confirms transactions or gains access to bank accounts.
- Why it's a threat: SMS-OTP, despite the move to more secure methods (such as biometrics in 3D-Secure 2.0), is still widely used for authentication, especially in regions with limited app support.
2. Technological measures of banks
Banks are implementing technologies to minimize the risks of SIM swapping and reduce reliance on vulnerable SMS.Moving from SMS to more secure channels
- Push notifications in applications:
- Banks are replacing SMS-OTP with push notifications in official mobile applications (for example, through banking applications or Google/Apple Pay).
- Push notifications are tied to the device and protected by biometrics (Face ID, fingerprint) or PIN code, making them resistant to SIM swapping.
- Biometric authentication:
- Within the framework of 3D-Secure 2.0 and PSD2 (European directive), banks use biometrics (fingerprints, facial recognition) as part of Strong Customer Authentication (SCA).
- This reduces the reliance on OTP, as biometrics require physical access to the device.
- Hardware tokens:
- Some banks offer physical devices (such as code generators) that create OTPs independently of your phone.
- This completely eliminates the risk of SIM swapping.
SIM card activity monitoring
- Cooperation with telecom operators:
- Banks work with operators to receive notifications when a SIM card associated with a customer is reissued.
- If the SIM card is reissued, the bank may temporarily suspend SMS-OTP or request additional authentication.
- Device Metadata Analysis:
- Machine learning (ML) analyzes changes in device identifiers (IMSI, IMEI) to identify suspicious SIM card replacements.
- For example, if a transaction comes from a new IMSI (SIM identifier) but from the same device, it raises an alarm.
ML for anomaly detection
- Behavioral analysis:
- Algorithms (e.g. autoencoders, Isolation Forest) track changes in client behavior, such as a change in geolocation or device after a SIM reissue.
- If OTP is requested after an abnormal event (e.g. SIM change), the bank may initiate additional verification (biometrics, call).
- Time Series Analysis:
- LSTM (Long Short-Term Memory) models track sequences of events, such as login attempts after a SIM card change.
- High frequency of OTP requests after SIM change is marked as suspicious.
Tokenization and virtual cards
- Tokenization: Card data is replaced with tokens (such as in Apple Pay) that are useless without authentication on the device.
- Virtual cards: Limit the amount and validity period, minimizing damage even if SIM swapping is successful.
3. Process measures of banks
Banks are implementing internal procedures and collaborating with telecom operators to make it more difficult for fraudsters to reissue SIM cards.Strengthening authentication procedures for operators
- Multi-factor verification:
- Operators require several forms of identification for SIM reissue (e.g. passport, biometrics, code word).
- Some operators implement two-factor authentication (2FA) for SIM change, for example, confirmation via email or a call to another number.
- Online reissue limitation:
- Operators limit the possibility of reissuing SIM cards through online channels, requiring a personal visit to the office.
- Reissue Notifications:
- Clients receive notifications (email, push) about the SIM reissue request, which allows the process to be quickly blocked.
Monitoring and blocking
- Automatic lock:
- If the bank detects a SIM card change (via operator data), it may temporarily freeze transactions requiring SMS-OTP until the customer's identity is verified.
- Manual check:
- For high-risk transactions (for example, large transfers), the bank may request a call or a visit to the branch.
SMS-OTP Usage Limitations
- Banks are minimizing the use of SMS for critical transactions, replacing them with push notifications or biometrics.
- In some cases SMS-OTP is used only as an additional factor, not the main one.
4. Cooperation with external partners
- With telecom operators:
- Banks and operators exchange data on suspicious SIM reissues via secure APIs.
- Operators are implementing monitoring systems such as the GSMA Fraud and Security Group to track SIM swapping attacks.
- With technology companies:
- Banks use FDS platforms (e.g. FICO Falcon, Feedzai) that integrate SIM swap data from global sources.
- Partnering with Google and Apple to secure push notifications and tokenization.
- With law enforcement agencies:
- Banks report SIM swapping data to cyber units (e.g. Interpol, local authorities) to stop organized schemes.
5. Training and informing clients
Banks are actively working with clients to reduce vulnerability to SIM swapping:- Educational campaigns:
- Inform about the risks of phishing and social engineering, through which fraudsters collect data for SIM swapping.
- It is recommended not to share personal information (for example, phone number, passport details) on suspicious sites.
- Safety recommendations:
- Setting up a code word with your telecom operator for SIM reissue.
- Using eSIMs, which are more difficult to replace as they are built into the device.
- Setting up 2FA for operator accounts (e.g. via email or app).
- Notifications:
- Customers receive alerts about login or SIM change attempts via email or push, even if SMS is not available.
6. Example of a script
The fraudster, using the stolen data (name, address, phone number), contacts the operator and reissues the victim's SIM card. Then he tries to conduct a transaction for 100,000 rubles through a site that requires 3D-Secure OTP. Bank:- Captures anomaly: An ML model (e.g. autoencoder) notices that a transaction is coming from a new IMSI after a recent SIM reissue.
- Requests biometrics: Instead of SMS-OTP, the bank sends a push notification to the app requiring Face ID.
- Notifies the client: Sends an email about suspicious activity and temporarily blocks the card.
- Cooperates with the operator: Checks the legitimacy of the SIM reissue and blocks further attempts if the attack is confirmed.
7. Limitations and Challenges
- Carrier dependency: If the carrier does not have strict SIM reissue procedures, the attack may go undetected.
- Global differences: In some countries, operators are less protected, increasing the risk.
- Response speed: SIM swapping can take hours, but the bank will only find out about it with a delay.
- Client vulnerability: If the client does not report the number being compromised, the bank may not have time to block the transactions.
8. Future Directions
- SMS-OTP gone completely: Banks switch to biometrics and push notifications to eliminate SIM swapping vulnerability.
- Blockchain for authentication: Decentralized systems can provide secure verification without SIM involvement.
- Improving operator systems: Operators are implementing ML to identify suspicious SIM reissue requests.
If you want to dive deeper into a specific aspect, like how ML models analyze IMSI changes or how carriers protect SIMs, ask and I'll give you a detailed answer with examples!
Last edited: