Fraudsters Target Russian Phone Numbers via eSIM to Access Banking

No time to read?
Get a summary

Fraudulent actors have targeted the phone numbers of Russians to access online banking and withdraw funds. This information surfaced in the newspaper News and was reported to FAS.C.T. — the Russian developer of cybercrime countermeasures.

The company explains that the number theft occurs through replacing or restoring an eSIM, the digital component embedded in modern smartphones that performs the same functions as a traditional SIM card.

To capture a number using eSIM profiles, FAC.CT notes that criminals require a device that supports an eSIM, along with a compromised account in the victim’s telecom or a widely used government service. This combination enables the attackers to manipulate credentials and initiate the fraud process.

Since autumn of the prior year, analysts have logged more than a hundred attempts to breach customers’ personal accounts in the online portals of financial institutions. The scheme, which first appeared abroad over a year ago, has already found fertile ground in criminal practice and is being actively exploited.

Security experts warn that such schemes are likely to rise in frequency, especially in Russia. The arrival of digital card technology, powered by a growing range of smartphones—even affordable models with lower security standards—means subscribers should be more vigilant about protecting their phone numbers and the accounts tied to them.

FAC.CT adds that there are several routes to capture a person’s number, and those whose data has been exposed remain at risk. Criminals often obtain usernames and passwords and then reach out to victims to trick them into revealing the two factor authentication code, bypassing basic safeguards.

A new method of eSIM fraud involves moving the victim’s number from the physical SIM to the attacker’s device via eSIM. In this scenario, criminals submit a request through the operator’s website or app to transfer the number from the physical card to the eSIM, thereby gaining control over the victim’s line.

Once the transfer is completed, the attacker can cut the victim off from their own SIM and take full control of the number. In such cases, it is advised to contact the operator immediately and request the card be blocked to prevent further misuse.

In related news, a separate report notes that a five kopek coin once sold for a surprisingly high price, reflecting the volatile dynamics of contemporary markets and the enduring interest in currency and security matters.

No time to read?
Get a summary
Previous Article

Broadcast Realities: Playback vs. Live Singing in TV Studios

Next Article

The Hero of Our Dreams — A Surreal Satire on Fame and Memes