Slayer

joined 1 year ago
[–] Slayer@infosec.pub 15 points 2 months ago

They all quit, so I think they have a plan.

[–] Slayer@infosec.pub 9 points 2 months ago (1 children)
[–] Slayer@infosec.pub 7 points 8 months ago

Now, attackers breach a user's mobile account with stolen, brute-forced, or leaked credentials and initiate porting the victim's number to another device on their own.

They can do this by generating a QR code through the hijacked mobile account that can be used to activate a new eSIM. They then scan it with their device, essentially hijacking the number.

Simultaneously, the legitimate owner has their eSIM/SIM deactivated.

[–] Slayer@infosec.pub 1 points 8 months ago (1 children)

Nevermind there are In-App-purchases

[–] Slayer@infosec.pub 0 points 8 months ago (3 children)
[–] Slayer@infosec.pub 6 points 9 months ago

They spoof local numbers