T-Mobile employees across the country are reportedly receiving text messages offering cash in exchange for SIM replacements. SIM swapping is when cybercriminals trick the mobile phone service provider into switching the victim's service to her SIM card that they control, effectively hijacking the victim's phone number. to access her two-factor authentication code. From the mobile report: The text offers employees $300 for each SIM replacement and asks them to contact them via telegram. The texts are all coming from different numbers across multiple area codes, making them more difficult to block. The documents also claim they obtained employee numbers “from T-Mo's employee directory.” If true, this could mean that T-Mobile's employee directory and contact numbers were somehow accessed. It's also possible that the attacker has live/current access to this data, but the fact that some of those affected are former employees who haven't worked for the company in several months makes that possible. considered to be of low sex.
Still, the biggest question here is how did this person (or people) obtain the employee's phone number? We don't yet know which employees will be affected, but it appears at least a few third-party employees are affected, based on online comments. We have also independently confirmed that current company employees are also receiving the message. Although we can't say for sure, this likely means that the information is not the same data that was leaked during the connection source breach. [from September]. However, we cannot exclude that possibility. As mentioned above, some of the people contacted are former employees who reportedly have not worked for T-Mobile in months, so the information being responded to is at least several months old. There may be. That being said, we are fairly confident that this is another source of data being used based on the company employees included.