• 2 Posts
  • 13 Comments
Joined 1 year ago
cake
Cake day: June 27th, 2023

help-circle







  • Now, attackers breach a user’s mobile account with stolen, brute-forced, or leaked credentials and initiate porting the victim’s number to another device on their own.

    They can do this by generating a QR code through the hijacked mobile account that can be used to activate a new eSIM. They then scan it with their device, essentially hijacking the number.

    Simultaneously, the legitimate owner has their eSIM/SIM deactivated.