12_real_world_sim_identity

Part 12: Real-World Attacks — Subscriber Identity, SIM & Carrier Data

Learning Objective: Understand how real-world attackers exploit carrier data breaches, SIM provisioning systems, and subscriber identity to enable fraud, account takeover, and targeted surveillance — with detailed network diagrams showing where each attack originates and how it propagates.

Important

These five case studies target the identity layer of mobile networks — the subscriber records, SIM cards, and provisioning systems that bind a person to a phone number. Unlike signaling-plane attacks (Part 11), these attacks often begin with a data breach or insider compromise at the carrier, then cascade into downstream fraud across every service that trusts a phone number as an identity anchor.


Table of Contents


The Mobile Identity Trust Chain

Before diving into attacks, it is important to understand why subscriber identity matters beyond the carrier itself. Phone numbers are used as identity anchors across the entire digital ecosystem.

graph TB
    subgraph "Carrier Identity Systems"
        CRM[🖥️ CRM / Customer Portal
Name, SSN, Account PIN] Provisioning[⚙️ Provisioning System
SIM ↔ IMSI ↔ MSISDN binding] HLR_HSS[(🔐 HLR/HSS
IMSI, K, OPc, profile)] BSS[💰 BSS/Billing
CDRs, payment info] end subgraph "SIM Card (Physical Identity)" SIM[📶 UICC/SIM
IMSI + K stored
in tamper-resistant chip] end subgraph "Downstream Trust (Phone Number = Identity)" Bank[🏦 Banking
SMS 2FA, account recovery] Email[📧 Email
Phone-based recovery] Social[💬 Social Media
Phone verification] Cloud[☁️ Cloud / SaaS
SSO MFA via SMS] Crypto[₿ Crypto Exchange
SMS withdrawal auth] end CRM <--> Provisioning Provisioning <--> HLR_HSS Provisioning <--> SIM CRM <--> BSS SIM -.->|"Phone number
= identity proof"| Bank SIM -.->|"Phone number
= recovery method"| Email SIM -.->|"Phone number
= verification"| Social SIM -.->|"Phone number
= MFA channel"| Cloud SIM -.->|"Phone number
= withdrawal auth"| Crypto Attacker[🔴 Attacker] Attacker -.->|"❌ Breach CRM
→ harvest PII"| CRM Attacker -.->|"❌ Bribe insider
→ swap SIM"| Provisioning Attacker -.->|"❌ Social engineer
→ port number"| CRM style Attacker fill:#ff6666,color:#fff style CRM fill:#ffaa66 style Provisioning fill:#ffaa66 style Bank fill:#ffee66 style Crypto fill:#ffee66
Note

The core problem: The mobile industry has created a system where a phone number serves as both a communication endpoint and an identity token. When an attacker controls the number — via SIM swap, SS7, or interception — they inherit all the identity trust associated with that number across hundreds of downstream services.


6. Mass Carrier PII Breaches Enabling SIM-Swap Waves (I, E)

Executive Summary

Major data breaches at mobile carriers — most notably the 2021 T-Mobile breach affecting 76 million subscribers — exposed names, Social Security numbers, dates of birth, driver's license numbers, and account PINs. This data became the ammunition for massive waves of SIM-swap attacks, as criminals could now pass carrier identity verification for any breached subscriber and take control of their phone number.

Real-World Incident

Detail Value
When August 2021 (T-Mobile); similar breaches at AT&T, Verizon subsidiaries
Who John Binns (initial breach); subsequent exploitation by multiple fraud gangs
Targets 76.6 million T-Mobile current, former, and prospective customers
Data Exposed Full names, SSNs, dates of birth, driver's license/ID numbers, phone numbers, account PINs, IMEI/IMSI identifiers
Downstream Impact Fueled SIM-swap campaigns, identity theft, targeted phishing, and credential fraud for years afterward
Settlement $350 million class-action settlement + $150 million security investment commitment

Network Position — Where the Attack Starts

graph TB
    subgraph "T-Mobile Infrastructure"
        Web_Portal[🌐 Customer Portal
Web / API] CRM[(🖥️ CRM Database
76M subscriber records
Name, SSN, DOB, PIN)] Provisioning[⚙️ SIM Provisioning
IMSI ↔ MSISDN binding] HLR[(🔐 HLR/HSS
Subscriber profiles)] end subgraph "Attacker (Breach Phase)" Hacker[🔴 Attacker
Exploits exposed API /
misconfigured server] end subgraph "Downstream Fraud (Post-Breach)" Fraud_Gang[🔴 Fraud Gang
Purchases breach data
on dark web] SIM_Swapper[🔴 SIM Swapper
Calls carrier with
stolen PII to swap SIM] end subgraph "Victim Impact" Victim[📱 Victim
Loses phone number control] Bank[🏦 Bank Account
Drained via SMS 2FA bypass] Email[📧 Email
Account recovery hijacked] end Hacker -.->|"1. ❌ Exploit exposed
API / server"| Web_Portal Web_Portal -.->|"2. Access CRM"| CRM Hacker -.->|"3. Exfiltrate 76M
subscriber records"| CRM Fraud_Gang -.->|"4. Purchase data
on dark web"| Hacker Fraud_Gang -->|"5. Sells to
SIM swappers"| SIM_Swapper SIM_Swapper -.->|"6. ❌ Social engineer
carrier support with
victim's SSN, DOB, PIN"| Provisioning Provisioning -.->|"7. ❌ Reassign MSISDN
to new SIM"| HLR Victim -.->|"8. ❌ Phone goes dead"| HLR SIM_Swapper -.->|"9. Receives victim's
SMS/calls"| Bank SIM_Swapper -.->|"10. Account takeover"| Email style Hacker fill:#ff6666,color:#fff style Fraud_Gang fill:#ff6666,color:#fff style SIM_Swapper fill:#ff6666,color:#fff style CRM fill:#ffaa66 style Provisioning fill:#ffaa66 style Victim fill:#ffee66 style Bank fill:#ffee66

Attack Sequence — Step by Step

sequenceDiagram
    participant Hacker as 🔴 Breach Attacker
    participant TMobile as 🖥️ T-Mobile Systems
    participant DarkWeb as 🌑 Dark Web Markets
    participant Swapper as 🔴 SIM Swapper
    participant Carrier as 📞 Carrier Support
    participant Provisioning as ⚙️ SIM Provisioning
    participant HLR as 🔐 HLR/HSS
    participant Victim as 📱 Victim Phone
    participant Bank as 🏦 Victim's Bank

    Note over Hacker: Phase 1: Data Breach
    Hacker->>TMobile: Exploit exposed API gateway
(misconfigured test environment) TMobile->>Hacker: 76M records: Name, SSN, DOB,
DL#, Phone, PIN, IMEI, IMSI Note over Hacker: Phase 2: Monetization Hacker->>DarkWeb: Post breach data for sale
($0.01-$1.00 per record) DarkWeb->>Swapper: Purchase targeted records
(filter by high-value indicators) Note over Swapper: Phase 3: SIM Swap Swapper->>Carrier: Call support: "I lost my phone,
need new SIM activated" Carrier->>Swapper: Verify identity:
"Name? DOB? Last 4 SSN? PIN?" Swapper->>Carrier: Provides all answers
(from breach data) Carrier->>Provisioning: Activate new SIM
for MSISDN +1-XXX-XXX-XXXX Provisioning->>HLR: Update IMSI binding
(new SIM card IMSI) Note over Victim: Phone loses signal ❌ Victim--xHLR: Deregistered from network Note over Swapper: Phase 4: Account Takeover Swapper->>Bank: "Forgot password"
→ sends SMS reset code Bank->>HLR: SMS to +1-XXX-XXX-XXXX HLR->>Swapper: SMS delivered to new SIM Swapper->>Bank: Enter code → reset password Swapper->>Bank: Transfer funds out

Technical Deep Dive

The breach itself: The T-Mobile breach exploited a misconfigured API gateway in a test environment that was accessible from the public internet. The attacker used automated tools to query the customer database, extracting records in bulk over several weeks before detection.

Why carrier PII is uniquely dangerous:

Data Field Fraud Use
Full Name + SSN Pass carrier identity verification; open new accounts
Date of Birth Secondary verification factor at carriers and banks
Account PIN Direct authentication to carrier customer service
IMEI Clone device identity for certain attacks
IMSI Target for SS7 attacks (Part 11); identify SIM in HLR
Phone Number Entry point for SIM swap; maps to all downstream accounts
Driver's License # Create fake physical ID for in-store SIM swaps

The SIM swap mechanism: At the HLR/HSS level, a SIM swap is simply an Update Subscriber Data operation that changes the IMSI associated with an MSISDN. The old SIM (old IMSI) is deregistered, and the new SIM (attacker's IMSI) becomes the active identity for that number. All incoming calls and SMS route to the new SIM.

Detection Indicators

STRIDE Assessment

Category Rating Justification
Spoofing N/A Breach itself is not spoofing
Tampering N/A Data exfiltrated, not modified
Repudiation Medium Attacker may delete access logs
Information Disclosure Critical 76M records with SSN, DOB, PIN, IMSI exposed
Denial of Service N/A Not applicable to breach itself
Elevation of Privilege Critical Stolen PII enables SIM swap → account takeover across all linked services

Mitigation

References


7. Targeted SIM Swapping for Cryptocurrency and Enterprise Accounts (S, I, E)

Executive Summary

Criminal gangs have repeatedly targeted high-value individuals — cryptocurrency holders, tech executives, and enterprise administrators — by social-engineering or bribing carrier employees to reassign the victim's phone number to an attacker-controlled SIM. With control of the number, attackers intercept SMS-based MFA to drain crypto wallets (single thefts exceeding $20M) or hijack enterprise SSO admin accounts for broader corporate compromise.

Real-World Incident

Detail Value
When 2018–present (ongoing); major prosecutions in 2019–2023
Who "The Community" gang (9 indicted), Joel Ortiz (first convicted SIM swapper), various syndicates
Targets Crypto holders, blockchain founders, VC partners, enterprise IT admins
Method Bribe/social-engineer carrier reps → SIM swap → intercept SMS MFA → drain wallets
Impact Individual thefts of $5M–$24M in cryptocurrency; enterprise account compromise
Prosecution Multiple FBI operations; Joel Ortiz sentenced to 10 years (2019)

Network Position — Where the Attack Starts

graph TB
    subgraph "Mobile Carrier"
        Call_Center[📞 Customer Service
/ Retail Store] Provisioning[⚙️ Provisioning System
SIM Management] HLR[(🔐 HLR/HSS)] SMSC[📨 SMSC] end subgraph "Attacker" Social_Eng[🔴 Social Engineer
Calls carrier with
OSINT on victim] Bribed_Rep[🔴 Bribed Insider
Carrier employee
paid $500-$5000] Attacker_SIM[🔴 Attacker SIM
New SIM card
with victim's number] end subgraph "Victim's Digital Life" Victim_Phone[📱 Victim Phone
Goes dead after swap] Crypto_Exchange[₿ Crypto Exchange
Coinbase / Binance] Enterprise_SSO[☁️ Enterprise SSO
Okta / Azure AD] Email[📧 Email
Gmail / O365] end Social_Eng -.->|"1. ❌ Impersonates victim
or bribes rep"| Call_Center Bribed_Rep -.->|"1b. ❌ Direct access
to provisioning"| Provisioning Call_Center -->|"2. Authorize
SIM change"| Provisioning Provisioning -->|"3. Update IMSI
for MSISDN"| HLR Victim_Phone -.->|"4. ❌ Deregistered"| HLR Attacker_SIM -.->|"5. Now receives
all SMS/calls"| SMSC Attacker_SIM -.->|"6. ❌ Password reset
+ intercept SMS OTP"| Crypto_Exchange Attacker_SIM -.->|"7. ❌ Hijack admin SSO
via SMS MFA"| Enterprise_SSO Attacker_SIM -.->|"8. ❌ Take over email
for persistence"| Email style Social_Eng fill:#ff6666,color:#fff style Bribed_Rep fill:#ff6666,color:#fff style Attacker_SIM fill:#ff6666,color:#fff style Call_Center fill:#ffaa66 style Provisioning fill:#ffaa66 style Victim_Phone fill:#ffee66 style Crypto_Exchange fill:#ffee66 style Enterprise_SSO fill:#ffee66

Attack Sequence — Step by Step

sequenceDiagram
    participant Attacker as 🔴 Attacker
    participant OSINT as 🌐 OSINT / Social Media
    participant Carrier as 📞 Carrier (Rep/Insider)
    participant HLR as 🔐 HLR/HSS
    participant Victim as 📱 Victim Phone
    participant Exchange as ₿ Crypto Exchange

    Note over Attacker: Phase 1: Reconnaissance
    Attacker->>OSINT: Research target on social media,
conference talks, blockchain explorers OSINT->>Attacker: Name, phone number, carrier,
crypto holdings (on-chain), email Note over Attacker: Phase 2: SIM Swap alt Social Engineering Path Attacker->>Carrier: Call: "I'm [victim], lost my phone,
need emergency SIM activation" Carrier->>Attacker: Verify: Name, DOB, last 4 SSN? Attacker->>Carrier: Provides info (from OSINT / breach data) Carrier->>HLR: Activate new SIM for victim's MSISDN else Insider Bribe Path Attacker->>Carrier: Pay $500-$5000 to insider
via Telegram / crypto Carrier->>HLR: Insider directly swaps SIM end HLR->>Victim: ❌ Old SIM deregistered (no signal) Note over Attacker: Phase 3: Account Takeover (~2 min window) Attacker->>Exchange: "Forgot password" for victim's account Exchange->>HLR: Send SMS verification code HLR->>Attacker: SMS OTP delivered to new SIM Attacker->>Exchange: Enter OTP → password reset Attacker->>Exchange: Login → initiate withdrawal Attacker->>Exchange: Transfer $5M+ in crypto
to tumbler/mixer wallet Note over Victim: Notices phone dead → calls carrier
→ 30-60 min to restore number
→ funds already gone

Technical Deep Dive

Why crypto is the primary target: Cryptocurrency transactions are irreversible. Unlike bank wires (which can be recalled within 24–72 hours), crypto sent to a new wallet cannot be clawed back. Combined with SMS-based 2FA at most exchanges (until recently), this created a perfect attack monetization path.

The insider problem: Multiple federal prosecutions revealed that carrier employees across T-Mobile, AT&T, and Verizon were actively recruited via Telegram and Discord channels. Payments ranged from $500 for a single swap to $5,000+ for VIP accounts. In one case, a single T-Mobile employee performed over 50 unauthorized SIM swaps before detection.

Attack timeline (from swap to cash-out):

Time Action
T+0 SIM swap executed at carrier
T+30s Attacker's SIM registers on network
T+1min Attacker initiates password reset at crypto exchange
T+2min OTP received, password changed, MFA reconfigured
T+3-5min Withdrawal initiated to tumbler wallet
T+10min Funds pass through 2-3 mixer hops
T+30-60min Victim notices phone is dead, contacts carrier
T+1-2hr Victim's number restored — but funds are gone

Detection Indicators

STRIDE Assessment

Category Rating Justification
Spoofing Critical Attacker fully impersonates victim to carrier and downstream services
Tampering Medium Subscriber profile modified in HLR (IMSI reassignment)
Repudiation Medium Carrier logs may show legitimate-looking support ticket
Information Disclosure High SMS content, account access exposed
Denial of Service High Victim loses phone service entirely during swap
Elevation of Privilege Critical Full control of victim's phone identity → all linked accounts

Mitigation

References


8. Insider-Enabled SIM Fraud and IMSI Re-Provisioning (S, T, I, E)

Executive Summary

Law enforcement and industry investigations have revealed systematic insider-enabled fraud at mobile carriers where employees — recruited and paid by criminal gangs — used their access to internal provisioning tools to clone or reassign IMSIs, enabling call/SMS interception and identity takeover at scale. Unlike social-engineering-based SIM swaps (Attack #7), these attacks bypass all customer verification because the insider has direct system access.

Real-World Incident

Detail Value
When Documented 2019–2024; ongoing
Who Carrier employees recruited by organized crime via Telegram, Discord, encrypted messaging
Targets Any subscriber; priority given to high-value targets identified by the criminal buyers
Method Insider uses OAM (Operations, Administration, Maintenance) tools to reassign IMSI/MSISDN bindings
Impact Full number takeover without any social engineering of the victim; undetectable by customer
Scale Individual insiders have performed 50-100+ unauthorized changes before detection

Network Position — Where the Attack Starts

graph TB
    subgraph "Carrier Operations Center"
        OAM[🖥️ OAM Portal
Operations Admin &
Maintenance] Provisioning_DB[(⚙️ Provisioning DB
IMSI ↔ MSISDN
↔ SIM ICCID mapping)] HLR[(🔐 HLR/HSS
Active subscriber
records)] end subgraph "Network Infrastructure" MSC[🎛️ MSC/MME] SMSC[📨 SMSC] BTS[📡 BTS/eNB] end subgraph "Insider Threat" Insider[🔴 Bribed Employee
Has OAM credentials
and physical access] Crime_Gang[🔴 Criminal Gang
Pays insider per swap
$500-$5000] end subgraph "Attack Result" Cloned_SIM[🔴 Cloned/New SIM
Receives victim's
calls + SMS] Victim_SIM[📱 Victim SIM
May or may not
lose service] end Crime_Gang -.->|"1. Request target
MSISDN swap
(encrypted msg)"| Insider Insider -.->|"2. ❌ Login to OAM
with legitimate
credentials"| OAM OAM -.->|"3. ❌ Modify IMSI
binding in
provisioning DB"| Provisioning_DB Provisioning_DB -.->|"4. ❌ Push update
to HLR/HSS"| HLR HLR --> MSC HLR --> SMSC Cloned_SIM -.->|"5. Registers on
network with
new IMSI"| BTS SMSC -.->|"6. SMS routes to
cloned SIM"| Cloned_SIM style Insider fill:#ff6666,color:#fff style Crime_Gang fill:#ff6666,color:#fff style Cloned_SIM fill:#ff6666,color:#fff style OAM fill:#ffaa66 style Provisioning_DB fill:#ffaa66 style Victim_SIM fill:#ffee66

Attack Sequence — Step by Step

sequenceDiagram
    participant Gang as 🔴 Criminal Gang
    participant Insider as 🔴 Carrier Insider
    participant OAM as 🖥️ OAM System
    participant Prov as ⚙️ Provisioning DB
    participant HLR as 🔐 HLR/HSS
    participant Network as 📡 Network
    participant Clone as 🔴 Cloned SIM
    participant Victim as 📱 Victim

    Gang->>Insider: Request via Telegram:
"Swap +1-555-0123, ICCID: [new SIM]"
Payment: $2000 BTC Insider->>OAM: Login with legitimate credentials Note over OAM: No anomaly — valid login from
authorized workstation during shift Insider->>OAM: Look up MSISDN +1-555-0123 OAM->>Prov: Query: MSISDN → IMSI mapping Prov->>OAM: Current: IMSI=310260XXXXXXXXX
ICCID=8901260XXXXXXXXXXXX alt Method A: Full SIM Swap Insider->>OAM: Change SIM:
New ICCID → New IMSI for same MSISDN OAM->>Prov: Update binding Prov->>HLR: Cancel old IMSI, register new IMSI HLR->>Victim: ❌ Deregistered (phone goes dead) HLR->>Network: New IMSI for MSISDN registered Clone->>Network: Attach with new SIM Network->>Clone: ✅ Connected as +1-555-0123 else Method B: Parallel SIM (Stealth) Insider->>OAM: Add secondary IMSI for same MSISDN
(multi-SIM / twin-SIM feature) OAM->>Prov: Add parallel IMSI Prov->>HLR: Both IMSIs active for MSISDN Note over Victim,Clone: Both victim AND attacker
receive calls/SMS simultaneously
Victim may not notice anything end Gang->>Clone: Use for SMS interception,
account takeover, surveillance

Technical Deep Dive

Method A vs. Method B — The critical distinction:

Method Victim Awareness Detection Difficulty Capability
Full SIM Swap High — phone goes dead immediately Medium — sudden deregistration event in HLR Full number takeover
Parallel SIM / Twin SIM Very Low — victim's phone continues working Very High — both SIMs active simultaneously Silent interception of SMS/calls

Parallel SIM (Method B) is particularly dangerous because:

OAM tool access: Carrier OAM portals (e.g., Amdocs CRM, Ericsson ENM, Nokia NetAct) typically provide full CRUD (create, read, update, delete) access to subscriber provisioning. Access controls often rely on role-based permissions that are overly broad — a customer service agent may have the same provisioning access as a fraud team member.

Detection Indicators

STRIDE Assessment

Category Rating Justification
Spoofing Critical Attacker operates a SIM with victim's identity
Tampering Critical Subscriber provisioning data directly modified
Repudiation High Insider uses legitimate credentials; may delete audit logs
Information Disclosure Critical All SMS/calls visible to attacker; silent interception possible
Denial of Service Medium Full swap causes service loss; parallel SIM may not
Elevation of Privilege Critical Full identity takeover via provisioning system

Mitigation

References


9. Large-Scale Subscriber Metadata Abuse After Carrier Breaches (I)

Executive Summary

When carrier breaches expose call detail records (CDRs), account metadata, and social graph information, the downstream impact extends far beyond the initial data theft. Threat actors use this metadata to map social networks of high-value targets, identify VIPs by calling patterns, and fuel precision-targeted phishing, extortion, and physical surveillance campaigns. The metadata — who called whom, when, for how long, and from where — is often more valuable for intelligence than the content of communications.

Real-World Incident

Detail Value
When 2021–2024 (post-breach exploitation ongoing)
Who APT groups, organized crime, private investigators, data brokers
Targets Executives, politicians, journalists, witnesses, individuals in sensitive relationships
Data Exploited CDRs (call detail records), SMS metadata, cell-site location, account billing, device info
Impact Social graph mapping, VIP identification, targeted spear-phishing, extortion, physical tracking
Scale Tens of millions of CDRs available per major carrier breach

Network Position — Where the Attack Starts

graph TB
    subgraph "Carrier Data Systems"
        CDR_DB[(📊 CDR Database
Who called whom, when,
duration, cell-site)] Billing[(💰 Billing System
Plans, payment methods,
usage patterns)] CRM[(🖥️ CRM
Names, addresses,
account details)] Location[(📍 Location Records
Cell-site history,
approximate GPS)] end subgraph "Data After Breach" Breach_Data[🔴 Exfiltrated Dataset
CDRs + Billing +
CRM + Location] end subgraph "Intelligence Analysis (Attacker)" Social_Graph[🔴 Social Graph
Analysis
Who talks to whom] VIP_ID[🔴 VIP Identification
High-call-volume nodes,
premium plan holders] Location_Pattern[🔴 Location Patterns
Home, work, travel,
meeting locations] Targeting[🔴 Targeting Package
Combined profile for
phishing / extortion] end subgraph "Downstream Attacks" Phishing[📧 Spear-Phishing
Personalized lures] Extortion[💀 Extortion
Sensitive relationship
exposure threats] Physical[📍 Physical
Surveillance
Known patterns] end CDR_DB --> Breach_Data Billing --> Breach_Data CRM --> Breach_Data Location --> Breach_Data Breach_Data --> Social_Graph Breach_Data --> VIP_ID Breach_Data --> Location_Pattern Social_Graph --> Targeting VIP_ID --> Targeting Location_Pattern --> Targeting Targeting -.->|"❌"| Phishing Targeting -.->|"❌"| Extortion Targeting -.->|"❌"| Physical style Breach_Data fill:#ff6666,color:#fff style Social_Graph fill:#ff6666,color:#fff style VIP_ID fill:#ff6666,color:#fff style Location_Pattern fill:#ff6666,color:#fff style Targeting fill:#ff6666,color:#fff style CDR_DB fill:#ffaa66 style Billing fill:#ffaa66 style CRM fill:#ffaa66 style Location fill:#ffaa66 style Phishing fill:#ffee66 style Extortion fill:#ffee66 style Physical fill:#ffee66

Attack Sequence — Step by Step

sequenceDiagram
    participant Attacker as 🔴 Threat Actor
    participant Data as 📊 Breach Data
    participant Analysis as 🔴 Analysis Tools
    participant Target as 📱 Target (VIP)
    participant Contact as 📱 Target's Contact
    participant Service as 🏦 Target's Bank

    Note over Attacker: Phase 1: Data Acquisition
    Attacker->>Data: Acquire carrier breach dataset
(dark web purchase or direct breach) Note over Attacker: Phase 2: Social Graph Analysis Attacker->>Analysis: Process CDRs through
graph analysis tools (Maltego, i2) Analysis->>Attacker: Identify hub nodes:
Target makes 50+ calls/day to
unique numbers (likely executive) Analysis->>Attacker: Map inner circle:
5 numbers called daily =
family + assistant + lawyer Note over Attacker: Phase 3: Pattern Extraction Attacker->>Analysis: Correlate cell-site data Analysis->>Attacker: Target's pattern:
Home: Cell 4521 (7PM-7AM)
Office: Cell 8903 (8AM-6PM)
Gym: Cell 2201 (6AM Tu/Th) Note over Attacker: Phase 4: Targeted Attack alt Spear-Phishing Attacker->>Target: Email spoofing target's lawyer:
"Per our call Tuesday at 2PM,
please review attached contract" Note over Target: Highly convincing because
attacker knows exact call history else Extortion Attacker->>Target: "We know you call [number]
30 times/week. Does your spouse
know? Pay 5 BTC." else Physical Targeting Attacker->>Target: Attacker knows target's
gym schedule (Tu/Th 6AM)
and which cell tower = location end

Technical Deep Dive

What CDR metadata reveals:

Metadata Field Intelligence Value
A-party / B-party numbers Full social graph — every person the target communicates with
Timestamp Daily patterns, work schedule, sleep schedule, meeting times
Duration Relationship strength — long calls = close relationships
Cell-ID (originating) Physical location at time of call (50m-2km accuracy)
IMEI Device identification — know when target switches phones
SMS metadata Text communication patterns (content not stored in CDRs, but metadata is)
Data usage App usage patterns (e.g., heavy data at midnight = VPN/streaming habits)
Billing plan Income indicator — premium unlimited plan = likely high-value target

Why metadata is more dangerous than content: Former NSA director Michael Hayden famously stated: "We kill people based on metadata." Metadata at scale reveals patterns that individual call content cannot: organizational structures, relationship dynamics, travel patterns, and behavioral routines.

Detection Indicators

STRIDE Assessment

Category Rating Justification
Spoofing N/A Metadata exfiltration, not identity spoofing
Tampering N/A Read-only data theft
Repudiation Medium Hard to prove metadata was used for targeting
Information Disclosure Critical Complete communication patterns for millions of subscribers
Denial of Service N/A Not applicable
Elevation of Privilege N/A Not directly, but enables escalation through downstream attacks

Mitigation

References


10. Mass Credential Phishing (Smishing) With Carrier Data (S, I)

Executive Summary

When carrier breaches expose subscriber datasets containing names, phone numbers, plan types, and partial SSNs, criminal organizations use this information to craft extremely convincing SMS phishing (smishing) campaigns. Unlike generic spam, these messages reference the victim's actual carrier, plan details, and partial personal information — dramatically increasing click-through rates. The campaigns harvest banking credentials, one-time codes, and SaaS login tokens at massive scale.

Real-World Incident

Detail Value
When Continuous; major waves following every carrier breach (2021–present)
Who Organized fraud rings, phishing-as-a-service operators
Targets Millions of subscribers whose data was exposed in carrier breaches
Method Bulk SMS campaigns using leaked subscriber data for personalization
Impact Credential theft at scale; banking fraud; SaaS account takeover
Scale Millions of personalized smishing messages per campaign

Network Position — Where the Attack Starts

graph TB
    subgraph "Carrier Breach Data"
        Leak[(🔴 Leaked Dataset
Name, Phone, Carrier,
Plan, Last-4 SSN)] end subgraph "Smishing Infrastructure" Smishing_Platform[🔴 Smishing Platform
Bulk SMS sender
+ personalization engine] Phish_Site[🔴 Phishing Site
Fake bank / carrier /
SaaS login page] C2[🔴 C2 / Credential
Collection Server] end subgraph "SMS Delivery (Abused)" A2P[📨 A2P SMS Gateway
Bulk SMS provider
(legitimate, abused)] SMSC[📨 Carrier SMSC
Delivers to subscriber] end subgraph "Victim" Victim_Phone[📱 Victim Phone
Receives personalized
smishing message] end subgraph "Victim's Accounts" Bank[🏦 Bank] SaaS[☁️ SaaS / Cloud] end Leak -->|"1. Feed subscriber
data"| Smishing_Platform Smishing_Platform -->|"2. Generate
personalized SMS"| A2P A2P -->|"3. SMS delivered"| SMSC SMSC -->|"4. SMS to victim"| Victim_Phone Victim_Phone -.->|"5. ❌ Clicks link"| Phish_Site Phish_Site -.->|"6. ❌ Enters
credentials"| C2 C2 -.->|"7. ❌ Use stolen
credentials"| Bank C2 -.->|"7. ❌ Use stolen
credentials"| SaaS style Leak fill:#ff6666,color:#fff style Smishing_Platform fill:#ff6666,color:#fff style Phish_Site fill:#ff6666,color:#fff style C2 fill:#ff6666,color:#fff style A2P fill:#ffaa66 style SMSC fill:#ffaa66 style Victim_Phone fill:#ffee66 style Bank fill:#ffee66

Attack Sequence — Step by Step

sequenceDiagram
    participant Gang as 🔴 Fraud Ring
    participant Platform as 🔴 Smishing Platform
    participant Gateway as 📨 A2P SMS Gateway
    participant SMSC as 📨 Carrier SMSC
    participant Victim as 📱 Victim
    participant PhishSite as 🔴 Phishing Site
    participant Bank as 🏦 Bank

    Note over Gang: Phase 1: Campaign Setup
    Gang->>Platform: Upload breach dataset (1M records)
Configure message template:
"Hi {name}, your {carrier} bill
shows unusual charge of $247.83.
Verify at: {phish_link}" Note over Gang: Phase 2: Personalized Message Generation Platform->>Platform: For each record, generate:
"Hi John, your T-Mobile bill
shows unusual charge of $247.83.
Verify SSN ending 4523 at:
t-mobi1e-verify[.]com/bill" Note over Gang: Phase 3: Bulk Delivery Platform->>Gateway: Send 50,000 SMS/hour
(via compromised or complicit
A2P SMS provider) Gateway->>SMSC: Deliver via SS7/SMPP SMSC->>Victim: SMS arrives from
short code or spoofed number Note over Victim: Phase 4: Victim Interaction Victim->>PhishSite: Clicks link → sees convincing
carrier-branded login page Victim->>PhishSite: Enters carrier username + password PhishSite->>Gang: Credentials captured Note over Gang: Phase 5: Real-Time Relay (for 2FA bypass) Gang->>Bank: Login with captured credentials Bank->>SMSC: Send OTP to victim SMSC->>Victim: SMS OTP arrives PhishSite->>Victim: "Enter the verification code
we just sent to confirm identity" Victim->>PhishSite: Enters OTP PhishSite->>Gang: OTP relayed in real-time Gang->>Bank: Enter OTP → access granted

Technical Deep Dive

Why carrier data makes smishing so effective:

Generic Smishing Carrier-Data-Enhanced Smishing
"Your account has been compromised" "Hi John, your T-Mobile account shows unusual activity"
Random sender Spoofed to match carrier's short code
No personal details "Verify SSN ending 4523"
Generic URL Domain mimicking carrier (t-mobi1e-verify.com)
~2% click rate ~15-30% click rate

The real-time phishing relay: Modern smishing kits (e.g., based on Evilginx2 or custom platforms) act as transparent proxies between the victim and the real service. When the victim enters credentials + OTP on the phishing page, the attacker's server relays them to the real bank/SaaS login in real-time, capturing the authenticated session cookie. This defeats traditional SMS-based 2FA entirely.

A2P SMS delivery abuse: Attackers use multiple channels to send bulk smishing:

Detection Indicators

STRIDE Assessment

Category Rating Justification
Spoofing High Messages appear to come from legitimate carrier/bank
Tampering N/A No data modification in the network
Repudiation High SMS sender ID easily spoofed; difficult to trace origin
Information Disclosure Critical Credentials, OTPs, session tokens harvested at scale
Denial of Service Low Bulk SMS may cause minor SMSC load
Elevation of Privilege N/A Not directly, but enables downstream account takeover

Mitigation

References


Identity Attack Summary

Attack Comparison Matrix

# Attack Entry Point Data Required Attacker Type Skill Level Detectability
6 Carrier PII Breach API / server exploit N/A (creates the data) Hacker High Medium
7 Targeted SIM Swap Social engineering / bribe Name, DOB, SSN, PIN Crime gang Medium Medium
8 Insider SIM Fraud OAM provisioning tools OAM credentials (insider) Insider + gang Low (insider) Low
9 Metadata Abuse Breach data analysis CDRs, cell-site data APT / PI / crime Medium Very Low
10 Smishing with Carrier Data A2P SMS channel Name, phone, carrier, SSN-4 Fraud ring Low-Medium Medium

Combined STRIDE Profile

Attack S T R I D E Overall Severity
6. Carrier PII Breach ⚠️ Critical
7. Targeted SIM Swap ⚠️ ⚠️ Critical
8. Insider SIM Fraud ⚠️ Critical
9. Metadata Abuse ⚠️ High
10. Smishing with Data High

✅ = Primary impact, ⚠️ = Secondary/moderate impact

Standards Mapping

Attack 3GPP Reference GSMA Reference NIST Reference
6 TS 23.003 (numbering) SIM Swap Prevention SP 800-63B (identity)
7 TS 23.003 SIM Swap Prevention SP 800-63B §5.1.3
8 TS 23.003, TS 32.240 (OAM) Insider Threat Guidelines SP 800-53 (AC, AU controls)
9 TS 32.297/32.298 (CDR) Data Protection Guidelines SP 800-122 (PII protection)
10 TS 23.040 (SMS) A2P SMS Guidelines SP 800-63B §5.1.3

Lab Replicability

Attack Replicable in Docker Lab? How
6 ⚠️ Partial Demonstrate MongoDB (HSS) exposure: query subscriber records without authentication
7 ✅ Yes Modify subscriber IMSI in MongoDB (simulating SIM swap); observe UE deregistration
8 ✅ Yes Same as #7 but emphasize provisioning access; add second IMSI for same subscriber
9 ⚠️ Partial Capture Diameter/GTP signaling and extract CDR-equivalent metadata from pcap
10 ❌ No SMS infrastructure not included in Docker lab

🔬 Lab Exercises

Exercise 1: Examine HSS Subscriber Data in MongoDB

# Connect to the MongoDB instance backing the HSS
docker exec -it open5gs_mongo mongosh open5gs

# List all subscribers (equivalent to carrier CRM data)
db.subscribers.find().pretty()

# Observe what's stored: IMSI, K, OPc, APN, QoS
# Question: If an attacker compromised this database, what could they do?
# Answer: Clone SIM cards (K+OPc), map all subscribers, modify profiles

Exercise 2: Simulate a SIM Swap in the Lab

# Record the current IMSI for a subscriber
db.subscribers.findOne({imsi: "999700000000001"})

# "SIM swap" — change the IMSI to a new value (simulating new SIM)
db.subscribers.updateOne(
  {imsi: "999700000000001"},
  {$set: {imsi: "999700000000099"}}
)

# Observe: The original UERANSIM UE will fail to attach
# A new UE configured with IMSI 999700000000099 will attach successfully
# This demonstrates the HLR/HSS identity binding mechanism

Exercise 3: Extract Metadata from Signaling Captures

# Capture Diameter S6a signaling
docker exec -it open5gs_mme tcpdump -i any -w /tmp/metadata.pcap tcp port 3868 &

# Register multiple UEs and generate traffic
# Then analyze the capture:
# In Wireshark, filter: diameter
# Extract: IMSI, visited PLMN, UE location info, timestamps
# Question: What social graph could you build from this signaling metadata?
Warning

These exercises are for educational purposes only in your isolated Docker lab. Never access real carrier systems or subscriber data without authorization.


3GPP and Industry References

Document Title Relevance
3GPP TS 23.003 Numbering, Addressing, and Identification IMSI/MSISDN structure and provisioning
3GPP TS 23.040 SMS Technical Realization SMS delivery mechanisms (abused by smishing)
3GPP TS 32.240 Charging Architecture and Principles CDR generation and storage
3GPP TS 32.297 CDR File Format and Transfer CDR data structures
GSMA SIM Swap Fraud Prevention Best Practices Carrier-level SIM swap controls
NIST SP 800-63B Digital Identity Guidelines: Authentication SMS as restricted authenticator (§5.1.3.3)
NIST SP 800-122 Guide to Protecting PII PII handling in carrier systems

Summary

Next: Part 13: Real-World Attacks — SMS Abuse, Malware & MFA Bypass