You are on page 1of 6

WHAT IS SIMSWAPPING AND HOW TO

SIMSWAP?

Howdy hustlers! How are you all doing? We have received enough interest in
SimSwaping after the video we made showing how we can clone a SIM in our
private group so we have decided to explain a bit more about
SimSwaping and how you can SimSwap in 2021.
The joke that someone needs to have a mobile phone “surgically removed”
is not too far from the mark. Mobile phones have become ubiquitous and
intrinsically linked to people’s digital identities.
This connection to online life has made the mobile device a target for many
types of cybercrime exploits. One of those exploits is known as SIM swapping.
Mobile devices offer a great way to connect a user to an account via out-of-
band authentication, e.g., SMS text PIN. But the same ubiquitous nature of
mobile devices and the strong connection between the device and personal
online accounts and data make them a target for hustlers like us.

WHAT IS SIM SWAPPING?


SIM swap can result in a large financial payout for the hustlers. The activity has
many faces, but all revolve around the takeover of our victim’s mobile device.
From there, the device is used by us for purposes of extortion, data theft, and
bank account takeover.

The opportunity of swapping SIM cards ultimately stems from poor levels of
identity verification by the mobile operator. SIM swapping is a form of social
engineering as it relies on certain criteria for success:
#1. YOUR TARGET:
First of all, you will need to work on selecting the right target because this will
make all the difference in you getting a payout VS all your effort going down
the drain. Your ideal target should have a specific profile, such as the crypto
investors, individuals with an attractive bank balance.
#2. IDENTITY INFORMATION:
Once your target is selected as described above then it’s important for you to
have all the details of the identity of your target such as:
• Phone Number (obvious)
• Phone Carrier
• Full Name
• Date of Birth
• Primary Email
• Primary Address
You have to have the above info, the best way to go about it is to get the sim
with the same mobile carrier as your victim, lets say your victim is with AT&T
get a sim with AT&T and then do a sim swap on yourself so this will tell you all
the information you will need to do this job successfully.
#3. SIM SWAP REQUEST:
Once you have all the information then you need to grow a pair and calls the
operator using the target’s identity claims, such as name, address, and so on to
convince the operator to move and activate the existing phone number to a
SIM card number of your choice.
LET’S MAKE THE MONEY:
You now control your target’s phone number and ready to make your money!
Let’s log into their crypto and bank account to transfer funds into yours!

SIDE NOTE: Once you have control over your victim’s phone number, you will
receive all of the communications that the phone normally receives including
SMS texts and voicemails. This will give you access to SMS PIN second-factor
authentication (2FA) and potentially sensitive information from callers. Once
you have this level of detail about a person’s identity, as well as potentially
their second factor for logging into accounts (including some financial
institution accounts), then you can start your work as soon as conveniently
possible. DO NOT FORGET that your victim WILL receive a switch over text from
the carrier notifying them of the switch!
MALWARE & PHISHING:
If you don’t already have your target’s information then phishing emails can be
used to steal their operator login credentials.
Furthermore, malware can then also installed giving you remote access to the
operator’s system and any SIM card data and process.
There is rarely, if ever, a “silver bullet” when it comes to security. Usually,
you have to use a multi-pronged approach to committing to this type of work.
Identity theft is certainly a good start to make a SIM swap process more
effective:
PROTECTION TIPS:
We are going to outline some important tips for you to protect your identity as
a spoofer hustler. If your plan involves email spoofing or online work being
carried out then the first thing you’ll need to do is start with having a multi-hop
VPN.
Once you are in control of your victim’s phone number do NOT connect that
phone to your local WIFI, do NOT make phone calls to your personal contacts,
remember the SIM SWAP is temporary and it’s generally a race against time as
your victim might already be taking active steps to shut it down and to restore
access to their number back to their cellphone so stay focus and act quickly
towards your goals.
Good Luck, see you on the other side!

You might also like