The Problem

Our private client experienced a severe cybersecurity incident when her phone number was hijacked through a SIM swap, occurring shortly after she traded in an old iPhone. Despite assurances that her old device would be wiped, bad actors gained control of her phone number, leveraging it to bypass multi-factor authentication (MFA) across numerous critical accounts. This immediate loss of her phone service was quickly followed by fraudulent American Express charges totaling tens of thousands of dollars, attempts to open new bank accounts for illicit money transfers, and a debilitating spam attack on her email. She found herself locked out of virtually all her online services, including her business email, CapitalOne, PayPal, Venmo, and social media, as her MFA was critically tied to the compromised phone number.

She needed help from a trusted partner. She turned to BlackCloak.

BlackCloak’s Guidance

Our Security Operations team immediately launched a remote support session to assess the full extent of the compromise. We quickly identified the SIM swap as the root cause, understanding how the attackers had exploited her phone number to gain unauthorized access to her digital life. Our team confirmed the widespread account lockouts, the fraudulent financial activity, and the business email compromise.

Our four-step plan

01. Harden Her Accounts: We prioritized regaining control of her compromised phone number, which was critical for restoring her digital identity. Our team assisted her in changing passwords for her business email, social media, and other affected accounts. We then implemented stronger, device-specific multi-factor authentication (MFA) using authenticator apps like Authy, ensuring that future access attempts would require a physical device not tied to her SIM card. We also worked to disconnect any unauthorized devices from her Verizon account.

02. Changed Account Permissions: While the primary vector was the SIM swap, we systematically reviewed and secured her new Apple ID account, ensuring recovery keys were set up and that no unauthorized devices or numbers could be linked. We also ensured that the Verizon account portal itself was hardened, enabling number locks and credit/identity protection features to prevent future unauthorized transfers.

03. Identified Other “Pivot Points” Accessed by the Bad Actor: The threat actor had successfully gained access to numerous personal and financial accounts, including her Apple ID, American Express, CapitalOne, PayPal, Venmo, Facebook, Instagram, Delta Airlines, and Amazon. We meticulously worked through each compromised platform, changing passwords, setting up robust MFA, disputing fraudulent charges (like the $13,000 on AMEX and a line of credit on PayPal), and submitting information to reactivate suspended accounts like Venmo.

04. Began Ongoing Identity Monitoring: The client had already initiated credit freezes and filed FTC and police reports. BlackCloak guided her through the process of extending fraud alerts and onboarded her to our identity monitoring services. We also began the crucial process of digital footprint minimization, scrubbing her personal information from data broker sites to reduce future exposure risks.