Slayer

joined 1 year ago
[–] [email protected] 67 points 5 months ago* (last edited 5 months ago) (1 children)
[–] [email protected] 7 points 8 months ago

Now, attackers breach a user's mobile account with stolen, brute-forced, or leaked credentials and initiate porting the victim's number to another device on their own.

They can do this by generating a QR code through the hijacked mobile account that can be used to activate a new eSIM. They then scan it with their device, essentially hijacking the number.

Simultaneously, the legitimate owner has their eSIM/SIM deactivated.

[–] [email protected] 1 points 8 months ago (1 children)

Nevermind there are In-App-purchases

[–] [email protected] 0 points 8 months ago (3 children)
[–] [email protected] 6 points 9 months ago

They spoof local numbers