qeeqbox / two-factor-authentication-sim-cloning

An adversary may utilize a sim swapping attack for defeating 2fa authentication

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

An adversary may utilize a sim swapping attack for defeating 2fa authentication.

Example #1

  1. Adversary steals the username and password pair for website
  2. Adversary compromises the victim's sim card and clone it
  3. Adversary logs in with the stolen username and password
  4. Adversary receives a pin code on the compromised phone and uses it for verification.

Impact

High

Risk

  • gain unauthorized access

Redemption

  • use more factors

ID

58a84977-90e1-4156-a555-8568e83115d0

References

  • howtogeek

About

An adversary may utilize a sim swapping attack for defeating 2fa authentication

License:GNU Affero General Public License v3.0