Verizon customer is blaming the carrier after criminal stole their number

A criminal stole a Verizon customer's SIM to access their bank account.

0comments
verizon customer sim swap attack
A Verizon billboard. | Image by Sommer Panage on X
For years, SIM swapping — the theft of a customer's number by a bad actor — has been the scourge of the wireless industry. While carrier-led protections have mitigated the problem, a recent incident involving a Verizon customer suggests the system is still full of holes.

30 minutes is all it took



Reddit user nos583 claims their Verizon account was compromised in a matter of minutes. Apparently, a scammer entered a Verizon store with a fake ID to transfer nos583's number to a SIM card in their possession. This illegal SIM swapping allows criminals to bypass two-factor authentication to gain access to a victim's financial and social media accounts.

While Verizon sent several messages in quick succession to confirm the SIM swap, nos583 wasn't able to deny the request promptly because their phone was on silent. After about 30 minutes, the transfer was finalized, and the user lost service. Shortly after, bank emails regarding username recovery requests began to flood in, signalling an attempt to drain their account.

Recommended For You

Though nos583 eventually reclaimed their number, they are disappointed about the ease with which someone with a fake ID can steal a customer's number. 

Account controls




nos583 didn't have the recommended security measures enabled, and their ID had been stolen, which made it easy for the criminal to hijack their number.



Verizon recommends that customers activate Number Lock and SIM Protection, both of which prevent someone from transferring a Verizon number until it is turned off. The SIM Protection feature cannot be turned off by retail and customer service representatives, effectively neutralizing attempts to trick or bribe employees for SIM swap attacks.

Recommended For You


nos583 has still questioned Verizon's accountability and the swiftness of the process, given that users cannot be expected to be by their devices around the clock to manually deny such requests.

The system is still broken


While safeguards exist, they aren't activated by default. Many customers remain unaware of these tools, leaving them vulnerable.

Verizon typically requests a Personal Identification Number (PIN) for number transfers, but criminals exploit a loophole which allows ID to be presented if a customer has forgotten their PIN.

Who should be held responsible for this SIM swap attack?
5 Votes

Who is at fault?


Whether the responsibility entirely falls on Verizon is debatable, but there are certain ways to improve the system. For one, Verizon should increase awareness of existing account controls. Secondly, number transfers should require a waiting period to ensure customers see the notifications. Lastly, no response from customers should be treated as a no, rather than an automatic yes.

SIM swapping has long been a problem not just for Verizon, but also AT&T and T-Mobile. And while the industry has come a long way, incidents like these are reminders that criminals are still lurking in a corner to prey on susceptible customers.
Google News Follow
Follow us on Google News

Recommended For You

COMMENTS (0)
FCC OKs Cingular\'s purchase of AT&T Wireless