Schlanger Law Group In The Media

Like most cellular users, you probably know that your phone needs a SIM card to connect to your chosen wireless carrier such as T-Mobile or AT&T. However, most cell phone customers don’t fully understand how a SIM card works or what information is found on this little piece of technology. If you use a cell phone, you need to understand how a SIM swap (also called SIM jacking) can occur and what to do if it happens to you.
Anyone can be a SIM swap victim. This crime is not limited to celebrities or wealthy Americans who are swindled out of millions of dollars or cryptocurrencies. Average citizens have also lost thousands of dollars to hackers who steal, sell, and misuse personal data for their own financial gain.
The stories are frustrating, scary, and downright heart-breaking. Mostly because the companies involved refuse to accept responsibility for protecting their customers. Or even worse, they blame the consumer for not adequately protecting their account.
At Schlanger Law Group we fight for victims of all forms of identity theft including cyber scams like SIM swapping. We are currently working with several SIM swap victims, and we stand ready to help consumers across the country who are facing similar situations.
When you choose a wireless service provider, you receive a small card called a SIM (Subscriber Identity Module) that must be inserted into your phone to begin your cellular service. All phone calls, messaging, emails, and text messages use the SIM card to send information. If you lose or damage your cell phone or buy a new phone, you will legitimately need to transfer your SIM card to the new phone.
To make the transfer, you must contact your service provider. You’ll need to provide information such as your name, date of birth, billing address, email address, or other personal data to prove your identity. Then the customer service representative can make the switch in a matter of minutes.
But what if a thief has acquired your personal data through a data breach or some other illegal activity? With the right information, they can call your cellular company, pretend they are you, provide the requested information, and have your SIM card information transferred to their phone instead of yours. Instantaneously, your phone is disabled, and you cannot make or receive calls or messages. It’s that easy.
You are now a SIM swap victim, and you need to act quickly.
SIM fraud attacks can begin with data breaches in companies that gather and maintain a large amount of consumer information. For example, The Washington Post reported T-Mobile has experienced several data breaches (at least five in the past three years) impacting millions of current and former T-Mobile customers from as far back as 2014.
During these breaches, hackers access consumers’ personally identifiable information (PII) through a weak security system and steal the data for criminal use. Identity thieves buy the stolen data which allows them to make unauthorized bank or credit card transactions and commit other financially devastating crimes.
In SIM card scams, hackers gather and sell consumers’ PII, often through the dark web—the place where scammers and hackers exchange stolen information on the internet. For example, after the T-Mobile breaches, 124 million data entries were offered for sale on the dark web and many T-Mobile customers became SIM-jacking victims.
Using the PII stolen in data breaches, identity thieves contact the wireless carrier, impersonate the victim, claim their phone was lost or damaged, and request a “SIM swap.” When the unsuspecting wireless employee transfers the SIM information to the thief’s phone, the thief takes control of the victim’s cell phone and the data associated with it.
Scammers also use social engineering to steal PII. Some may scour social media accounts for relevant information. More aggressive criminals may contact their target directly by phone call or text pretending to be a bank or credit card representative. The scammer explains there is unusual activity in the target’s account and asks for a password, PIN, date of birth, or other information that will allow them to “fix” the problem. Once the criminal has this information, they contact the wireless carrier and request a new SIM card.
Once a criminal has control of your SIM card, they can access the apps on your phone, your emails and text messages, and financial information or transactions you have completed through your cell phone. The thief then tries to access your credit card or financial accounts online.
During the takeover, the thief will be prompted to enter a password. By using the “Forgot Password?” option the thief requests a code to change the password. Most companies use two-factor authentication that denies access until the user is verified. However, the second verification step is usually a call, text, or email through the cell phone’s SIM that is now in the thief’s possession. When the company sends a message or calls the phone number on file, the thief receives the message, resets the password, and receives immediate access to your account.
With so many forms of identity theft, you should regularly monitor your financial accounts for unusual activities. We created this checklist of Seven Ways to Detect Identity Theft and 17 Steps to Reduce its Impact to address general forms of ID theft.
However, in SIM card hijacking cases, look for these specific warning signs that might occur when a scammer takes control of your SIM card:
If any of these problems arise, follow these six steps:
No one is immune to cyber scams. And SIM card jacking can happen to anyone. But if you are extremely careful with your personal information, you may reduce your chances of falling victim to consumer fraud scams. In general,
When you contact Schlanger Law Group’s team of identity theft attorneys, we will listen to your story and determine your legal options. We can explain whether you have the right to pursue your cell phone company, bank, credit card issuer, or other financial entity if they are not following the law.
Our consumer fraud lawyers have already initiated several SIM swap fraud cases, and we are currently accepting new clients in this emerging area of law. Because many wireless carriers include arbitration clauses in their customer contracts, we are prepared to bring arbitration cases on behalf of SIM-jacking victims in addition to filing lawsuits nationwide.
Identity theft and consumer fraud schemes are two of SLG’s core practice areas. Several SIM swap victims have already entrusted us to bring arbitration or litigation claims against wireless carriers and financial companies to address their financial losses and protect against future problems.
We regularly litigate against leading financial institutions, such as TD Bank, Citibank, Wells Fargo and others in cases regarding unauthorized bank account access. We are proud of the excellent outcomes we have achieved on behalf of victims..
Call (212) 500-6114 or click the button below to schedule your free case consultation today.
Schlanger Law Group In The Media
Reach out to Schlanger Law Group for a free consultation, and let’s discuss your case with no upfront fees.
The information on this website is for general information purposes only. Nothing on this site should be taken as legal advice for any individual case or situation.
This information is not intended to create, and receipt or viewing does not constitute, an attorney-client relationship.
ATTORNEY ADVERTISEMENT | Past Results Do Not Guarantee Similar Outcomes in the Future
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
WEBSITE BY: VISIONTRACTION