Online Credential Scam Becomes a Phone Port Attack and then Turns into a Sextortion Scam

Stu Sjouwerman | Jan 3, 2020

PhishingOneMinuteIf experiencing a single cyberattack isn’t enough, this complex attack that shifted mid-stream demonstrates how attackers take advantage of victim details as an attack unfolds.

Toronto businessman Randall Baran-Chong received a notification on his phone one night that his device was no longer in service. This was the initial indicator of an attack that began with a simple phone SIM port attack – used to take over someone’s phone account and then use the newly ported phone as a second form of authentication as part of an online credential compromise attack.

Baran-Chong had become the victim of an attack bent on accessing his email, bank accounts, credit cards, and anything else the cybercriminals responsible could find. And find they did… Baran-Chong had videos of himself engaged in sex acts with women on cloud storage – something that caused the scam to shift from a rather simple online identity theft to full-blown extortion, threatening to expose Baran-Chong if he didn’t pay up.

Attacks like this in Canada have led to calls for more strict porting laws to make it more difficult for cybercriminals to port a phone’s SIM to a criminal-controlled device. Currently, all that’s needed in some cases is little more than the phone number and associated account number.

The real issue here for organizations is that often times, a user’s mobile phone is the device used as part of a secondary authentication – whether via text, using an app, or via email, mobile devices are the medium by which multi-factor authentication is achieved. With control over this device, the possibilities of what a cybercriminal can do is somewhat unlimited.

Organization’s wanting to ensure the security of their accounts – and the systems, applications, and data those accounts can access – need to ensure their mobile carriers have strict policies in place to make porting difficult for the would-be scammer.

At the same time, what also puts the organization at risk is users who are like Baran-Chong – those who maintain compromising photos, videos, and content that can be used to extort money, passwords, and access. Cybercriminals today are keenly aware of the business opportunities that an extortion affords. Organizations should educate users via Security Awareness Training on secure online personal practices, as well as good security hygiene – both at home and work.

Discover Your Organization’s Phish-prone™ Percentage

Ninety-one percent of data breaches begin with spear phishing. Launch our Free Phishing Security Test for up to 100 users to uncover your team's vulnerability and see how your security posture stacks up against industry benchmarks.

Get Your Free Phishing Security Test

Secure the Digital Workforce: Human + AI

KnowBe4 empowers the human and AI workforce to make safer security decisions every day. Trusted by over 70,000 organizations worldwide, we help strengthen security culture and manage risk. Our comprehensive AI-driven platform includes awareness and compliance training, cloud email security, real-time coaching, crowdsourced anti-phishing, AI Defense Agents, agent security and more. As the only global security platform of its kind, KnowBe4 provides personalized content, tools, and techniques to keep the modern workforce safe from phishing, vishing, deepfakes, and emerging threats.

Get the latest insights, trends and security news. Subscribe to CyberheistNews.