What Can Hackers Do With Your Mobile Number?

What Can Hackers Do With Your Mobile Number?
Image by Gerd Altmann 

Boris Johnson’s personal phone number has been publicly available on the internet for 15 years, it has been revealed. Listed at the bottom of a 2006 press release, the number has reportedly been accessible online from the time the prime minister was shadow higher education minister through to his rise to Number 10.

That such a high-value mobile number has been publicly available for so long has raised cybersecurity concerns. If hostile states had access to the number, it’s possible they could have used it to spy on the prime minister. That would pose a serious security risk to the UK.

Hackers and cybercriminals place a high premium on our mobile phone numbers – with which they can do a lot of damage with very little effort. While there is currently no evidence that Boris Johnson’s data and communications have been compromised, having your mobile phone number being freely available significantly increases your vulnerability to cyber-attacks.

Impersonation

One such cyber-attack is the “SIM swap” – a very common technique that’s difficult to stop. It’s usually used by hackers to exploit a high-value individual’s exposed phone number.

SIM swaps see hackers call up the victim’s mobile phone provider, impersonating them and requesting to “port-out” the phone number to a different carrier or a new SIM card. They can use other publicly available information – such as the victim’s date of birth and their address – to make a more convincing case.

On completion of the port-out, the phone number activates on the attacker’s SIM card, and the hacker can send and receive messages and make calls as if they were the victim.

Phone companies have been aware of this problem for years, but the only routine solution they’ve come up with is offering PIN codes that a phone owner must provide in order to switch devices. Even this measure has proved ineffective. Hackers can get the codes by bribing phone company employees, for instance.


 Get The Latest By Email

Weekly Magazine Daily Inspiration

Access

Once hackers gain control of a phone number, they can then access their online profiles – on Facebook, Twitter, Gmail and WhatsApp – which are all usually linked to the mobile number. All they need to do is ask the social media companies to send a temporary login code, via text message, to the victim’s phone.

This was reported to be the case for Twitter CEO Jack Dorsey, whose mobile phone SIM swap resulted in hackers posting offensive messages to millions of his followers. Other high-value individuals have also fallen victim to these kinds of attacks, including the actress Jessica Alba, and online personalities like Shane Dawson and Amanda Cerny.

Aside from posting offensive messages, hackers have been reported to use the accounts to spam, steal identities, access private communications, steal cryptocurrency, and maliciously delete mobile phone data.

Surveillance

Hackers can also use another even simpler method to attack a phone – though some advanced spyware is needed to make the attack stick. Hackers armed with someone’s phone number can send them a text message with a hyperlink within it. If clicked, the link allows spyware to infiltrate the phone, compromising much of its data.

It appears this method was used to infiltrate and spy on Jeff Bezos’ phone in 2020, after reports found it to be “highly probable” that a text sent from Mohammed bin Salman, the crown prince of Saudi Arabia, delivered the spyware to Bezos’ phone. Similar spyware has been used to monitor the phones of journalists and human rights activists.

It is possible that Boris Johnson’s mobile phone has never been hacked, in spite of the 15 years that his number was freely available online. However, seeing as the exposed phone numbers of high-value individuals can be taken advantage of by criminals or hackers from hostile states, tight new security measures should be put in place to avoid such an oversight happening again.The Conversation

About The Author

Edward Apeh, Principal Academic in Computing, Bournemouth University

This article is republished from The Conversation under a Creative Commons license. Read the original article.

 

You May Also Like

AVAILABLE LANGUAGES

enafarzh-CNzh-TWnltlfifrdehiiditjakomsnofaptruessvtrvi

follow InnerSelf on

facebook icontwitter iconyoutube iconinstagram iconpintrest iconrss icon

 Get The Latest By Email

Weekly Magazine Daily Inspiration

Marie T. Russell's Daily Inspiration

INNERSELF VOICES

Becoming Parents: A Path to Transformation
Becoming Parents: A Path to Transformation
by Barry and Joyce Vissell
For almost every couple, the thought of bringing a child into this world triggers a whole range of…
I Was Born during the late Eastern Han Dynasty...
I Was Born during the late Eastern Han Dynasty...
by Dena Merriam
I was born during the late Eastern Han Dynasty (25 CE-220 CE) into a family of ardent Daoists who…
Healing Otherness: Your Changes, Reflected in Community
Healing Otherness: Your Changes, Reflected in Community
by Stacee L. Reicherzer PhD
Seeking out a community of healing, being exploited in it, perhaps assuming the shame and…
Horoscope Week: June 14 - 20, 2021
Horoscope Current Week: June 14 - 20, 2021
by Pam Younghans
This weekly astrological journal is based on planetary influences, and offers perspectives and…
Being A Better Person
Being A Better Person
by Marie T. Russell
"He makes me want to be a better person." As I reflected on this statement later, I realized that…
Modeling Behavior is the Best Teacher: Respect Must Be Mutual
Modeling Behavior is the Best Teacher: Respect Must Be Mutual
by Carmen Viktoria Gamper
Socially respected behavior is learned behavior and some of it (for instance, table manners) varies…
Separation and Isolation vs. Community and Compassion
Separation and Isolation vs. Community and Compassion
by Lawrence Doochin
When we are in community, we automatically fall into service to those in need because we know them…
The Only Easy Day Was Yesterday
The Only Easy Day Was Yesterday
by Jason Redman
Ambushes don’t just happen in combat. In business and life, an ambush is a catastrophic event that…

MOST READ

Becoming Parents: A Path to Transformation
Becoming Parents: A Path to Transformation
by Barry and Joyce Vissell
For almost every couple, the thought of bringing a child into this world triggers a whole range of…
image
IRS hitting you with a fine or late fee? Don't fret – a consumer tax advocate says you still have options
by Rita W. Green, Instructor of Accountancy, University of Memphis
Tax Day has come and gone, and you think you filed your return in the nick of time. But several…
From deadly enemy to covidiots: Words matter when talking about COVID-19
Words matter when talking about COVID-19
by Ruth Derksen, PhD, Philosophy of Language, Faculty of Applied Science, Emeritus, University of British Columbia
So much has been said and written about the COVID-19 pandemic. We’ve been flooded with metaphors,…
How Well Your Immune System Works Can Depend On The Time Of Day
How Well Your Immune System Works Can Depend On The Time Of Day
by Annie Curtis, RCSI University of Medicine and Health Sciences
When microorganisms – such as bacteria or viruses – infect us, our immune system jumps into action.…
A teen reads her phone with a confused look on her face
Why teens have a hard time finding truth online
by Stanford
A new national study shows a woeful inability by high schoolers to detect fake news on the internet.
image
The mystery of long COVID: up to 1 in 3 people who catch the virus suffer for months. Here's what we know so far
by Vanessa Bryant, Laboratory Head, Immunology Division, Walter and Eliza Hall Institute
Most people who get COVID suffer the common symptoms of fever, cough and breathing problems, and…
image
4 ways to have a positive experience when engaging with social media
by Lisa Tang, PhD Candidate in Family Relations and Applied Nutrition, University of Guelph
Have you ever thought about all the ways social media is woven within your everyday life? This has…
An Open Letter to the Entire Human Family
An Open Letter to the Entire Human Family
by Ruchira Avatar Adi Da Samraj
This is the moment of truth for humankind. Critical choices must now be made in order to protect…

New Attitudes - New Possibilities

InnerSelf.comClimateImpactNews.com | InnerPower.net
MightyNatural.com | WholisticPolitics.com | InnerSelf Market
Copyright ©1985 - 2021 InnerSelf Publications. All Rights Reserved.