{"id":224687656,"date":"2024-01-27T17:22:21","date_gmt":"2024-01-27T22:22:21","guid":{"rendered":"https:\/\/phonescanada.com\/?p=224687656"},"modified":"2024-01-29T10:41:33","modified_gmt":"2024-01-29T15:41:33","slug":"scam-involving-sim-swap-leads-to-woman-losing-17k-a-cautionary-tale","status":"publish","type":"post","link":"https:\/\/phonescanada.com\/fr\/scam-involving-sim-swap-leads-to-woman-losing-17k-a-cautionary-tale\/","title":{"rendered":"Une arnaque impliquant un \u00e9change de carte SIM conduit une femme \u00e0 perdre $17K \u2013 un r\u00e9cit \u00e9difiant"},"content":{"rendered":"<p><span style=\"font-size: revert; color: initial;\">Sharon Hussey of Bethesda, Md. got scammed out of $17,000 even though she employed two-factor authentication (2FA) on her phone. With 2FA, before you can open an app, you have to type in a code that is sent via text to your phone. But there are ways that bad actors can get around this and one of those ways is via a technique called SIM swapping. So with this in mind, let\u2019s dive into the unfortunate events that cost Ms. Hussey $17,000.<\/span><\/p>\n<div>\n<div>\n<p>According to WJLA, the ABC affiliate in Washington D.C., Hussey received an email thanking her for purchasing a new phone with Verizon. Shortly thereafter, Bank of America notified Hussey of some changes to the contact information for her account. The thing is, Sharon did not buy a new phone from Verizon, nor had she changed the information for her Bank of America account. When she tried to call Bank of America to see what was going on, she couldn\u2019t make the call since her phone was disconnected from cellular service.<\/p>\n<\/div>\n<h2>Once the thief had her SIM card in his phone, he was receiving all codes generated by 2FA<\/h2>\n<div>\n<p>When she tried to use her computer to access her Bank of America account online, she couldn\u2019t because 2FA required that she type in a code from her phone that she could no longer receive. And within minutes, $17,000 had been removed from her bank account. She told WJLA, \u201cInitially, I didn\u2019t realize how big of a deal it was. I thought I had handled it on the first day by calling the bank, calling Verizon. Figuring things out,\u201d said Hussey. But as she added, \u201cAnd the bottom just kind of dropped out.\u201d<\/p>\n<p><center><\/center><\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">SIM CARD ALERT: Sharon Hussey, who lives in Maryland, lost thousands after someone walked into a Verizon store in California &amp; got a new sim card using her phone number. She breaks it all down. <a href=\"https:\/\/twitter.com\/7NewsDC?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"nofollow noopener\">@7NewsDC<\/a><a href=\"https:\/\/t.co\/C8vKJX2wM0\" target=\"_blank\" rel=\"nofollow noopener\">pic.twitter.com\/C8vKJX2wM0<\/a><\/p>\n<p>\u2014 Scott Taylor : 7 News \u2013 WJLA TV (@ScottTaylorTV) <a href=\"https:\/\/twitter.com\/ScottTaylorTV\/status\/1750247535254315439?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"nofollow noopener\">January 24, 2024<\/a><\/p><\/blockquote>\n<p><span style=\"font-size: revert; color: initial;\">What happened, according to the victim, was that someone walked into a Verizon store in California, and purchased a new phone using Hussey\u2019s current phone number to activate the new handset. As soon as the new phone was booted up with a new SIM card, connected to Hussey\u2019s phone number, Sharon\u2019s phone went dead. Even though she was able to contact Bank of America using a landline, it was already too late as her $17,000 was gone.<\/span><\/p>\n<\/div>\n<div>\n<p>Part of the reason why Hussey was so vulnerable was because she had enabled 2FA. Once the thief had a new SIM card for her phone in his phone, all 2FA codes went to him allowing the thief to easily open all of Hussey\u2019s apps on his newly purchased handset. Hussey realized this herself when she said, \u201cAnd I have two-factor identification which ended up biting me in the face when it all came down to it. That was the thing that completely hijacked everything. They had complete control of my phone and there was nothing I could do about it.\u201d<\/p>\n<\/div>\n<p>Alex Quilici, CEO of YouMail, a visual voicemail and Robocall blocking service, explained how SIM swaps work. \u201cThe bad guys convince the telephone company that they have the SIM for your phone number and the minute the phone company does the swap they are in control of your number,\u201d said Quilici. \u201cIf you\u2019ve been doing two-factor authentication everywhere to your mobile phone number, if someone else gets that mobile phone number they can authenticate as if they are you,\u201d he added.<\/p>\n<p>For three months, Bank of America refused to credit Hussey for the $17,000 that was stolen. Eventually, the bank changed its mind and refunded the $17,000.<\/p>\n<h2>Verizon recommends that you do certain things that can stop you from being the victim of a SIM swap<\/h2>\n<div>\n<p>To make sure that this doesn\u2019t happen to you, Quilici says, \u201cThe number one thing is to make sure you get a PIN or a number porting PIN with your carrier. That requires a special code that hopefully only you have that needs to be given to the carrier before they do the SIM swap.\u201d<\/p>\n<\/div>\n<p>Verizon also has a list of things you can do to prevent being the victim of a SIM swap:<\/p>\n<p><span style=\"font-weight: bold;\">Use strong and unique passwords. <\/span>Do not use the same passwords for your social media and financial apps. Despite what happened to Sharon, Verizon still recommends enabling two-factor authentication wherever it\u2019s available.<\/p>\n<p>Verizon says that you should <span style=\"font-weight: bold;\">be cautious of unsolicited texts, e-mails, and calls<\/span>. If you detect a sense of urgency and feel that the other party wants you to act immediately, do not respond to the message and delete it.<\/p>\n<p>If you get a message from your carrier saying that your service is being disconnected and you did not request it, call the company from a landline ASAP to determine if the message is legitimate. If you remain alert and cautious, and greet text messages that feel \u201coff\u201d with skepticism, you can give yourself a fighting chance against a SIM swap.<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Sharon Hussey of Bethesda, Md. got scammed out of $17,000 even though she employed two-factor authentication (2FA) on her phone. With 2FA, before you can open an app, you have to type in a code that is sent via text to your phone. But there are ways that bad actors can get around this and [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":224687657,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"wds_primary_category":255,"footnotes":""},"categories":[255],"tags":[],"class_list":["post-224687656","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-apple-tips-news"],"_links":{"self":[{"href":"https:\/\/phonescanada.com\/fr\/wp-json\/wp\/v2\/posts\/224687656","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/phonescanada.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/phonescanada.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/phonescanada.com\/fr\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/phonescanada.com\/fr\/wp-json\/wp\/v2\/comments?post=224687656"}],"version-history":[{"count":0,"href":"https:\/\/phonescanada.com\/fr\/wp-json\/wp\/v2\/posts\/224687656\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/phonescanada.com\/fr\/wp-json\/wp\/v2\/media\/224687657"}],"wp:attachment":[{"href":"https:\/\/phonescanada.com\/fr\/wp-json\/wp\/v2\/media?parent=224687656"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/phonescanada.com\/fr\/wp-json\/wp\/v2\/categories?post=224687656"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/phonescanada.com\/fr\/wp-json\/wp\/v2\/tags?post=224687656"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}