Readit News logoReadit News
avidiax · 2 years ago
Couldn't T-Mobile send their own SMS's to their employees pretending to increase the payout to $600, then fire any employee that replies?

Or maybe change the terms of use for the employee line discount to allow monitoring SMS content or metadata for security threats to the companies users?

actionfromafar · 2 years ago
T-mobile could do many things (not sure it’s legal to pretend you want to pay for simswaps, but that’s beside the point), but first we need to establish why they would care.

I haven’t seen much evidence in the past they would.

masspro · 2 years ago
They don't care. Source: got swapped on TMo, front-line CSR fixed it but no one else at the business cared; would not even refund my final bill. Solution: move to Google Fi. It has a word-of-mouth reputation for being resistant to this, which I believe if nothing else because Google has almost no human support to bribe/phish.
caymanjim · 2 years ago
I'm pretty sure T-mobile could legally do that to their own employees. Corporate security teams are always sending fake phishing email to test their employees' gullibility and send them off to Re-education Camp.
thayne · 2 years ago
> not sure it’s legal to pretend you want to pay for simswaps

I don't see a big difference between this, and sending fake phishing emails to employees to see if they bite, which is a fairly common practice.

In this case though, it doesn't necessarily have to be T-mobile that does it. It could be local law enforcement, and they could potentially trade immunity for information on real bribers.

fortran77 · 2 years ago
They can

1. require two employees PLUS an agent on the phone to do it.

2. call the desired number and speak to whoever answers and ask if they're aware the number will be ported

3. have a 24-hour period to try to reach someone at that number before the swap occurs.

4. Offer a very large bounty ($10,000 or more) for providing evidence that a co-worker is taking bribes

viewtransform · 2 years ago
Buried at the bottom of the article is a link to

T-Mobile’s New SIM Protection https://tmo.report/2022/12/t-mobiles-new-sim-protection-is-n...

datavirtue · 2 years ago
I believe there are telecommunications regulations in olved that prevent them from erecting barriers during the sim swap process. This might be one of the mains reasons it's such a juicy vector.
LASR · 2 years ago
You could solve this by simply sending out a memo not to respond to such offers or risk termination.
tw04 · 2 years ago
It shouldn’t just be termination, it should be jail time. It’s no better than selling a gun to a person you know intends to use it to commit a crime.
lrvick · 2 years ago
Or, crazy idea, we do not give minimum wage paid retail sales reps the ability to control access to the online accounts of hundreds of millions of people.
jjice · 2 years ago
Is it? It'd be a good way to catch people doing something that's seriously damaging to others for personal gain.

I don't think I have much sympathy if you lose your job for doing something this damaging and probably illegal.

gabeio · 2 years ago
How is knowingly doing sim swapping not already a dick move?

Honestly what the OP suggested is simply a sting operation.

Your reaction to it is ... more scary.

WolfeReader · 2 years ago
A telling reply.

SIM swapping? No comment. Trying to catch SIM swappers? Suddenly you have feelings about it!

jxramos · 2 years ago
audit log tied to the one who authorizes the swap along with guaranteed criminal penalties would be a stronger disincentive I believe.
maximinus_thrax · 2 years ago
Red teams do this sort of things all the time. How about you don't accept bribes? Arguably that's a bigger dick move.
ClassyJacket · 2 years ago
Wow, genius, just tell people not to break laws, why didn't they think of that...
FeistySkink · 2 years ago
Or pay people enough so they don't get tempted to begin with.
renewiltord · 2 years ago
Lol Martha Stewart has $400m and she got done for $230k worth of insider trading.

And Matt Levine every now and then talks about a guy making a few million a year insider insider trading a few thousand and settling.

ApolloFortyNine · 2 years ago
Billionaires have literally committed financial crimes for more money. Pay has very little to do with it.
paxys · 2 years ago
What is the dollar value of getting access to a phone number belonging to a celebrity or a billionaire? I don't know the exact amount, but it is 100% more than what T-Mobile can feasibly pay all of its employees. Do you think security guards protecting the federal reserve's gold vault get paid more than the value of the gold in that vault?
snowwrestler · 2 years ago
“Inside job” SIM swap attacks are not necessarily new; a close friend’s T-Mobile phone got hit this way in March 2020.

The news here is the intersection of a data breach with SIM swapping: criminals are using the employee phone numbers from a recent T-Mobile breach data dump to text tons of employees at once, offering $300 per swap.

Previously, criminals would develop the inside agent either through personal connections or by applying and getting hired themselves. With the breached data, they can automate and scale.

Terr_ · 2 years ago
As others have suggested, the trick is put out fake honeypot offers, to strike at the weak point of the scheme, which is that lack of trust and anonymity run both ways.

In other words, the "old way" isn't just about cultivating an insider agent, but also about establishing that the insider can trust the requestor.

paulpauper · 2 years ago
this has been going on regarding crypto since early 2018 afik.
stefandesu · 2 years ago
I wonder why people risk their jobs for $300.
Our_Benefactors · 2 years ago
1. Cell phone retail is a McJob not a career

2. They don’t think they’ll be caught so it’s more like free money. Getting caught doesn’t factor in to the decision.

m463 · 2 years ago
exit strategy?
tekknik · 2 years ago
> a close friend’s T-Mobile phone got hit this way in March 2020

I was hit back in the late 2000’s, maybe 2008 iirc.

noodlesUK · 2 years ago
What's the solution here? Can we practically expect employees at retail stores to not be permitted to change a person's phone over? What if the person who needs the swap has said their phone is lost/stolen?

I think ideally there would be some kind of verification that the customer was indeed present and that their ID had been verified, but I don't see how you can do that in the US as there aren't ID cards or similar forms of universally available ID. I also think you should be able to get a phone number without ID at all, which would preclude verification in those cases.

The issue is that people's phones are essentially the roots of trust for our digital lives. Passkeys being built into the OS are good because they push that problem away from carriers, but the fundamental issue still remains. Bootstrapping trust is hard.

lxgr · 2 years ago
> What's the solution here?

Not putting phone providers in charge of access to our digital lives.

> that the customer was indeed present and that their ID had been verified

Present where? My MVNO does not have any branches. And even if they did, why should I ever have to go there? I don't go to bank branches either if I can at all help it.

fragmede · 2 years ago
> either if I can at all help it.

Sometimes you can't help it, you need a phone today, and need to go into a store for your phone company. No, buying a phone from Walmart or Best buy and waiting for a sim or doing some eSim thing won't work, you just need to get into a branch today. If an MVNO with no branches works for you, great, but some people need to be able to go into a branch of their cell phone provider/bank/utility.

dragonwriter · 2 years ago
> I think ideally there would be some kind of verification that the customer was indeed present and that their ID had been verified, but I don’t see how you can do that in the US as there aren’t ID cards or similar forms of universally available ID.

Requiring government issued photo ID for identity verification is not at all an uncommon policy for various purposes in the US, and AFAIK all states have universally available ID cards (they are generally not free of charge, but they are universally available.)

mjevans · 2 years ago
ID REALLY should be paid for by taxes and 'free' for everyone obtaining their proof of identity. Now, a 'drivers' license might have an extra fee on top of that.

Maybe the free IDs could be issued by police departments? Either way this is a good time for someone to register as a voter too, WA state has a simple checkbox for that and other states can too.

nicbou · 2 years ago
I help people move to Germany. Requirements like this make it really hard for people to settle in a new place. On the other hand you can’t expect a teenager working minimum wage to identify a Thai passport.

There exist services for ID verification, usually by video call. They exhibit the same limitations though.

andix · 2 years ago
Easy solution: Don't use SMS for password recovery.

SMS might even be okay for 2FA, but it must always be the second factor. "Forgot my password" -> SMS code -> new password is just 1FA. Using SMS as the only factor is really, really bad.

amagine · 2 years ago
The choice of 2fa options isn't under user control. And various non carrier options (Google voice) are rejected.
ec109685 · 2 years ago
Having a pin on your account before a swap (or any other action is allowed) seems like a useful barrier to entry.

Then a corrupt employee needs something they won’t have to execute the swap.

_dark_matter_ · 2 years ago
There is no way that most people would remember the pin, so employees would need some way to bypass. And voila, back to where we started.
londons_explore · 2 years ago
A simple time delay can solve 99% of cases.

Simply require that a SIM can only be swapped if it is disconnected from the mobile network for 48 hours. And if it isn't disconnected, the original SIM will be called/texted to ask if they really want the SIM swap to happen.

JumpCrisscross · 2 years ago
> require that a SIM can only be swapped if it is disconnected from the mobile network for 48 hours

If someone has both devices in hand, there isn't even need for a delay. The only time you need a delay is when the original device is missing. In that case, sending a message to that SIM and having a mandatory delay (ideally, customisable by the customer) seems reasonable.

aareet · 2 years ago
That's precisely what happens with SIMs in India. When a SIM swap happens, text messages are blocked for 24 hours to allow a customer to alert the operator before one time codes resume sending to the new SIM
datavirtue · 2 years ago
That's a barrier to switching carriers.
hiatus · 2 years ago
> I also think you should be able to get a phone number without ID at all, which would preclude verification in those cases.

While I agree with you, this is already not the case in much of Europe where an ID is required to obtain a sim card.

grujicd · 2 years ago
Whenever I go to mobile provider in Serbia to do anything related to account I have to provide government ID. They even put it in card reader to get relevant data. While SIM swap is certainly a theoretical risk, it's not a practical one around here. Having authentication on a phone or another physical device (without backup) seems to be at least two orders of magnitude higher risk of losing access to everything. Relying to Google or another third party for authentication is not without its risks too.

I just hope SMS authentication won't go away completely for other parts of world where risk balance is different than in USA. Until things change, I trust more my local birocracy to work their birocratic ways and always check ID where needed then I would trust myself not to lose some auth device.

Salgat · 2 years ago
I use Google Voice for this reason, so that you need to authenticate with my google account to modify anything related to my phone number. It's not perfect since there is still an internal forwarding number they could sim swap on, but it would require them associating the two numbers first, and I don't use my t-mobile number for anything outside being the forwarding number for google voice.
hx833001 · 2 years ago
You can switch Voice to use IP only through the app/web
brightball · 2 years ago
> but I don't see how you can do that in the US as there aren't ID cards or similar forms of universally available ID.

How so? Aren’t there multiple options available?

patch_cable · 2 years ago
There are many available but people are not required to have one (unless driving, etc.)
jupp0r · 2 years ago
> What's the solution here?

webauthn

lxgr · 2 years ago
WebAuthN is an excellent alternative to passwords, but a relatively poor access recovery mechanism, given that it just kicks the can down the road to another provider at best (usually Apple or Google), and to a single physical object that's easy to lose at worst.

I use it myself, but I do also understand companies and people that don't want to make it their only way back into their account as it is.

mantra2 · 2 years ago
Sure wish more places would allow you to turn off SMS if you’re using something like a Yubi.
throw10920 · 2 years ago
> I don't see how you can do that in the US as there aren't ID cards or similar forms of universally available ID

You're speaking out of a position of extreme ignorance. There are ID cards - drivers' licenses and passports - that are near-universally available, and are regularly used as identification.

jasonjayr · 2 years ago
... away from carriers and into the hands of Google/Apple/Microsoft, who can kill your account for any and no reason at all.

Except for that one giant issue, passkeys are gonna be great.

CharlesW · 2 years ago
> Except for that one giant issue, passkeys are gonna be great.

Unlike passwords, you can have multiple passkeys associated with an account. Accessing from an iPhone? Use your Apple passkey. From Android? Use your Google passkey. Want cross-platform? Use your 1Password passkey. Etc.

patmorgan23 · 2 years ago
There are several 'boutique' email providers (fast mail, proton, etc) that you can use instead of the big 3. You can even host your own MX server but use a relay service so you don't have to deal with IP reputation issues.
Suppafly · 2 years ago
I have google fi and I'm always a little low key worried that they'll block my account which will kill my phone/docs/drive/email all at once.

It also kinda sucks having google as your email and your phone when they want to use email to verify your account settings and you can't get into your account. This happened to my wife, and they essentially have no support on the fi side and the gmail side support isn't super helpful. She was eventually able to recover her gmail account and fix her fi activation but it a huge pain and took a couple of days.

ipqk · 2 years ago
Multi person approval, especially two that don’t work together.
TheNewsIsHere · 2 years ago
You're not wrong, but trust is an issue here as well.

If someone convinces both Person A and Person B of their legitimacy, even if they're not legitimate, this doesn't solve anything.

If Person A and Person B trust one another personally, then _idealistically_ you're vulnerable to collusion (intentional) or abuse (unintentional).

If Person B trusts Person A because of some policy or technical attestation, that means the policy or technical criteria needs to be robust against abuse.

If you're in-person at, say, a T-Mobile store, then it's not likely that Person A and Person B don't work together, but even if they don't, the first issue still applies.

I've watched T-Mobile store employees just pass an iPad to a manager and say "can you type in your code?" Depending on the employee or what process was requiring approval, the manager might or might not have asked "what are you doing?" "Can you justify this?" etc.

speedylight · 2 years ago
There should be a security code that’s only known to the owner, can’t swap it if you don’t have the code. Seems like a pretty simple and effective solution imo.
WillPostForFood · 2 years ago
This already is in place at T-Mobile, but it seems the it can be overridden.
paulpauper · 2 years ago
crypto makes this scam much more lucrative, otherwise paying off an employee not worth the effort usually
lxgr · 2 years ago
Can you really not imagine any scenario other than crypto where compromising an employee's account could have financial consequences? Thinking about that somewhat large industry other than crypto dealing with people's money...
TimJRobinson · 2 years ago
I work in crypto and see Sim swaps happen all the time, mostly for Twitter account takeovers of famous people where they then post phishing links and steal their followers coins. T-Mobile is easily the biggest offender for this, most people reporting they use it, so this has been going on for a long time.

The other big problem with Twitter security is you can have your account taken over even if you use non-sms 2FA! If you have your phone number on your account it can be used for recovery completely bypassing 2FA. They've had this security flaw for years and still haven't fixed it.

lxgr · 2 years ago
Almost everybody supporting 2FA has this security flaw today.

The number of sites that actually let me never provide a phone number, or at least not have it be a recovery method, is tiny.

Even things like a simple time lock (e.g. SMS-OTP "2"FA recovery only being possible after 24 hours, combined with sending a blast of "careful, your account is about to be recovered by somebody that might not be you" and a way to stop that for the legitimate accountholder, would go a long way.

sgerenser · 2 years ago
A lot of sites have this security flaw, turning SMS 2FA into 1FA: all you need is the phone number. Although allowing it even if you use non-sms 2FA is even worse, 100% defeating the purposes of using an alternate form of 2FA.
tekknik · 2 years ago
Not even just SMS, some sites are doing the same with email.
eBombzor · 2 years ago
It's actually unbelievable how often SMS OTP is used, when it's public knowledge that it just replaces one attack vector with a worse attack vector... Cracking a password or breaking into an encrypted database is 10x harder than getting a sim swap.
loloquwowndueo · 2 years ago
Cracking a good password - which a large percentage of people don’t have or will readily input in any phishing web form without a second thought.

Time-constrained 2FA codes can be broken with sim swaps or targeted phishing which are less widespread than a wide-net spam-based phishing campaign.

Now don’t get me wrong I hate SMS 2FA with a passion but still :)

zamalek · 2 years ago
My bank recently added the feature of removing SMS as an 2FA option - requiring TOTP. Now if they'd only add webauthn, but TOTP is pretty secure against phishing with a browser-integrated password manager (no autofill results in suspicion).
eco · 2 years ago
My bank finally added 2FA today actually. It is, of course, SMS or Email only because banks the worst online security for reasons I'll never understand.
s1dev · 2 years ago
What bank is this and are they available nationwide?
kredd · 2 years ago
It’s easy, it’s free for the customer, and with feature’s like iPhone’s “code autofill”, it’s the easiest UX. Swim swapping happens to such a small number of people that it’s not worth the effort for anyone involved. I hate it myself, but such is the reality.
lxgr · 2 years ago
But once you manage it, you've got a lot of compromised accounts at the same time.

Everything based on username + password alone today should be replaced by passkeys. The problems they don't solve are 2FA and account recovery.

gruez · 2 years ago
It's not really "replacing" though. Prior to SMS OTP it would just be the password. Having password + SMS OTP is strictly better, regardless of how shitty SMS OTP might be.
guffins · 2 years ago
Many sites do allow logging in with just an SMS OTP, no password required (even if you’ve set a password for the account). If it absolutely must be used (it shouldn’t), then SMS OTP should be a second factor, not the only factor.
lr1970 · 2 years ago
> Having password + SMS OTP is strictly better, regardless of how shitty SMS OTP might be.

Unfortunately one can claim to "forgot my password" and use SMS OTP to reset it. Now it becomes a single factor authentication with a compromised phone.

Password + SMS OTP is strictly worse than a password. At least you cannot SIM swap your password.

httpz · 2 years ago
So looks like FCC is implementing some new rules to protect against SIM swapping and that's taking effect on July 8, 2024. Though from the press release, I'm not quite sure if that'll protect the customer from a carrier employee being the bad actor.

https://www.fcc.gov/consumer-governmental-affairs/fcc-announ...

https://docs.fcc.gov/public/attachments/DOC-398483A1.pdf

gosub100 · 2 years ago
Not even joking: there is probably a market for starting a mobile provider company that actually requires a DNA sample to change. The DNA could be collected from multiple sources simultaneously (blood, saliva, and randomly chosen fingernails) and run through a hash so that the provider never stores the DNA string itself. Some level of innovation may be required here, I know DNA itself isn't exactly a UUID, but I'm certain it could be done. VIPs would pay for this service and you could offer limited insurance for hackage.

Edit to add: there was an episode of "Forensic Files" where a suspect injected someone else's blood sample (at great personal risk) to evade a DNA test for a sexual assault charge. So just acknowledging that DNA methods can be attacked too. Hence the necessity of multiple random samples.

DesiLurker · 2 years ago
or a eyeball scan like that sam altman worldcoin thing.
lukeschlather · 2 years ago
We really need better standards for MFA. Probably we should have a legal definition of MFA and SMS should be described as 2SA (Two-step authentication) on par with email or whatever. While MFA should be restricted to actual Yubikeys and other hardware certificate based things.

I'd also say people shouldn't be able to advertise MFA if they only support a single token per method.

hot_gril · 2 years ago
It's not reasonable to expect people to have Yubikeys. iPhone Keychain is about as good as it'll get realistically, and that somewhat relies on hardware security.
lukeschlather · 2 years ago
Actually I maybe misspoke and I might go further than that and say that services shouldn't be allowed to make any requirements about how hardware tokens work. This means if someone wants to use a software token that should be supported.

And also I think this is why the passkey standard is bad, it sets rigid hardware requirements and the manufacturers will use this to drive planned obsolescence. If Apple and Microsoft have their way we will throw away $1000+ phones and laptops because someone found an exploit in the TPM that requires physical access.

xyst · 2 years ago
"iPhone Keychain" - no thanks, I'll stick with a non-vendor specific provider.

I am trying to escape that awful ecosystem, not dig myself further in.