
In this week’s Cloud Security Tip, Steve Prentice explains why two-factor authentication (2FA) is not enough. This allows the hacker to intercept any 2FAs sent via text or call.which means they can obtain access to any account that uses 2FA, such as Amazon, Ebay, and Paypal, and bank accounts. Once this happens, the victim's phone will lose connection to the network and the hacker will receive all the SMS and voice calls intended for the victim. The hacker uses different techniques to convince the telephone company to port the victim's phone number to the hacker’s SIM. The same scenario happens: the hacker obtains personal information about the victim, and then contacts the victim's mobile telephone provider. SIM hacking is not exclusive to T-Mobile though - in fact, this could happen at any carrier. Once the hackers had that, they would impersonate the victim with T-Mobile’s customer support staff, ask for a new SIM card number, and hijack their phone numbers.

It seems harmless, but just by knowing customer’s phone numbers, hackers could obtain their data. Standardized number that identifies subscribers). Their billing account numbers, and the phone’s IMSI numbers (a unique, The bug exposed customers’ email addresses. The bug was very well known in the criminal underground and there was even a tutorial on how to exploit it on YouTube.

A few years ago, hackers found a bug that allowed them to access personal data on any T-Mobile customer.
