Once again, we hope that everyone is staying healthy and safe during this Coronavirus pandemic. Maybe it's because more people are at home, using their cell phones for work calls or Wi-Fi hot spots, but we've recently received a number of inquiries about steps that can be taken to better protect against cyber criminals compromising cellular accounts and SIM cards at mobile providers like AT&T, Verizon, Sprint, and T-Mobile. These attacks are commonly known as SIM hijacking, and they can wipe out one's entire life savings.
What is a SIM Hijacking
A SIM hijacking occurs when at attacker gains control of a victims’ phone number and routes SMS text messages and calls to other devices owned by the attacker. Attackers will use social engineering and compromised credentials to obtain access to the victim's mobile account and either copy the victim's SIM card or swap the victim's phone number to another SIM card. From there, attackers will try to compromise other accounts like email, cloud storage, social media, even cryptocurrency accounts because they can use the victim's phone numbers to reset passwords or bypass two-factor authentication codes.
Set a PIN for your mobile provider account. If a PIN option is not available, use security questions.
Enable two-factor authentication (2FA) on your account. And consider using a 2FA app (e.g., Authy, Google Authenticator) instead of 2FA SMS.
Secure your account with a strong and unique password and update it periodically.
Keep your personal information private and limit access to such information online.
Enhancements to Monthly Status Emails
We are making changes to the format of our monthly status email. Going forward these emails will be delivered on the 15th of the month and sent to the primary account holder(s) for a household. The email will cover details for the household including:
devices being protected,
alerts managed, and
status of Dark Web monitoring
As always, the BLACKCLOAK Team is here to help. If you have any questions, email us at ask@blackcloak.io.
Thanks!
The BLACKCLOAK Team
BlackCloak Client Statistics
See where you fall within the BlackCloak Family
82%
Exposed Passwords
customers with passwords exposed on the Deep/Dark Web
37%
Compromised
customers with hacked computers, cameras, or phones
100%
Privacy Leaks
customer devices configured to overshare location and private data
We're actively monitoring your devices to ensure you're protected.
85% of BlackCloak's customers receive a BlackCloak alert within one week of onboarding, often on onboarding day.
If you get a new device, email us so we can protect it.