Threat and financial advisory methods service provider Kroll on Friday disclosed that one particular of its staff fell victim to a “extremely sophisticated” SIM swapping assault.
The incident, which took position on August 19, 2023, focused the employee’s T-Mobile account, the company mentioned.
“Specifically, T-Mobile, devoid of any authority from or make contact with with Kroll or its worker, transferred that employee’s mobile phone selection to the risk actor’s cellular phone at their ask for,” it reported in an advisory.
This enabled the unknown actor to attain accessibility to specified data files that contains own facts of personal bankruptcy claimants in the matters of BlockFi, FTX, and Genesis.

SIM swapping (aka SIM splitting or simjacking), when commonly a benign system, could be exploited by menace actors to fraudulently activate a SIM card less than their management with a victim’s cellular phone selection. This tends to make it feasible to intercept SMS messages and voice phone calls and obtain MFA-related messages that manage access to on-line accounts.
Fraudsters accomplish this by normally working with phishing or social media to accumulate private data about their targets, this kind of as birthdays, mother’s maiden names, and the superior colleges they went to, so that they can persuade the mobile carrier to port the victims’ cellular phone numbers to a single of their personal SIM playing cards.
The business famous that it took immediate actions to secure the a few afflicted accounts and that it has notified impacted individuals by email. Though an investigation is underway, Kroll mentioned it located no evidence to reveal that other devices or accounts have been influenced.

The disclosure comes times following Bart Stephens, the co-founder of Blockchain Funds, submitted a lawsuit against an anonymous hacker who stole $6.3 million truly worth of crypto in an alleged SIM swap attack.
Previously this month, the U.S. Department of Homeland Security’s Cyber Basic safety Evaluate Board (CSRB) urged telecommunications vendors to utilize more powerful protection protocols to avoid SIM swapping, like by supplying possibilities for customers to lock their accounts and implementing stringent identification verification checks.
If just about anything, the frequency of SIM swapping attacks is a reminder for users to go away from SMS-based two-element authentication (2FA) and switch to phishing-resistant procedures to protected on the net accounts.