Threat and monetary advisory options supplier Kroll on Friday disclosed that considered one of its workers fell sufferer to a “extremely subtle” SIM swapping assault.
The incident, which occurred on August 19, 2023, focused the worker’s T-Cell account, the corporate mentioned.
“Particularly, T-Cell, with none authority from or contact with Kroll or its worker, transferred that worker’s telephone quantity to the menace actor’s telephone at their request,” it mentioned in an advisory.
This enabled the unidentified actor to achieve entry to sure recordsdata containing private data of chapter claimants within the issues of BlockFi, FTX, and Genesis.

SIM swapping (aka SIM splitting or simjacking), whereas typically a benign course of, may very well be exploited by menace actors to fraudulently activate a SIM card below their management with a sufferer’s telephone quantity. This makes it doable to intercept SMS messages and voice calls and obtain MFA-related messages that management entry to on-line accounts.
Fraudsters accomplish this by typically utilizing phishing or social media to gather private details about their targets, similar to birthdays, mom’s maiden names, and the excessive faculties they went to, in order that they’ll persuade the mobile provider to port the victims’ telephone numbers to considered one of their very own SIM playing cards.
The corporate famous that it took fast steps to safe the three affected accounts and that it has notified impacted people by electronic mail. Whereas an investigation is underway, Kroll mentioned it discovered no proof to point that different methods or accounts have been affected.

The disclosure arrives days after Bart Stephens, the co-founder of Blockchain Capital, filed a lawsuit towards an nameless hacker who stole $6.3 million price of crypto in an alleged SIM swap assault.
Earlier this month, the U.S. Division of Homeland Safety’s Cyber Security Overview Board (CSRB) urged telecommunications suppliers to make use of stronger safety protocols to stop SIM swapping, together with by offering choices for patrons to lock their accounts and implement stringent id verification checks.
If something, the frequency of SIM swapping assaults is a reminder for customers to maneuver away from SMS-based two-factor authentication (2FA) and change to phishing-resistant strategies to safe on-line accounts.
