Home

    About Us

    • Who We Are
    • Our Difference
    • IT Industry Secret
    • Testimonials
    • Employment
    • Refer a Colleague or Friend

    IT Services

    • Managed IT Services
      • Why Managed IT Service
      • IT Consulting
      • IT Support – Helpdesk Services
      • Remote Monitoring and Maintenance
      • Co-Managed IT
      • Infrastructure Support Services
      • Professional Server Support
      • Understanding IT
    • IT Security Services
      • Network Security
      • Unified Threat Management
      • Spam Protection
      • Sophos Security Solutions
      • Email Encryption
      • Cisco-Certified Solutions
      • Security Networking
    • Cloud Computing Services
      • Cloud IT Solutions
      • Hosted Microsoft Exchange
      • Hosted Server
      • Hardware Virtualization
      • Cloud Backup & File Sharing
      • Managed WordPress Hosting
    • Industry Specific
      • Health Care IT
      • Electronic Medical Records
      • IT for Law
      • IT for Education
      • IT for Accountants
      • IT for Engineers and Architects
    • Data Services
      • Business Continuity
      • Disaster Recovery as a Service
      • Compusync Backup
    • Hardware Services
      • Hardware as a Service
      • Computer Repair
      • Cabling and Wiring
      • Lenovo Official Reseller
      • Server Migration
      • SensorGnome
    • Software Services
      • Microsoft Office 365
      • G Suite by Google
      • Microsoft Partner Network
    • Business Communication
      • Fax Server

    Blog

    Contact Us

    Support

logo

1-855-405-8889

  • Home
  • About Us
    • Who We Are
    • Our Difference
    • IT Industry Secret
    • Testimonials
    • Employment
    • Refer a Colleague or Friend
  • IT Services
    • Managed IT Services
      • Why Managed IT Service
      • IT Consulting
      • IT Support – Helpdesk Services
      • Remote Monitoring and Maintenance
      • Co-Managed IT
      • Infrastructure Support Services
      • Professional Server Support
      • Understanding IT
    • IT Security Services
      • Network Security
      • Unified Threat Management
      • Spam Protection
      • Sophos Security Solutions
      • Email Encryption
      • Cisco-Certified Solutions
      • Security Networking
    • Cloud Computing Services
      • Cloud IT Solutions
      • Hosted Microsoft Exchange
      • Hosted Server
      • Hardware Virtualization
      • Cloud Backup & File Sharing
      • Managed WordPress Hosting
    • Industry Specific
      • Health Care IT
      • Electronic Medical Records
      • IT for Law
      • IT for Education
      • IT for Accountants
      • IT for Engineers and Architects
    • Data Services
      • Business Continuity
      • Disaster Recovery as a Service
      • Compusync Backup
    • Hardware Services
      • Hardware as a Service
      • Computer Repair
      • Cabling and Wiring
      • Lenovo Official Reseller
      • Server Migration
      • SensorGnome
    • Software Services
      • Microsoft Office 365
      • G Suite by Google
      • Microsoft Partner Network
    • Business Communication
      • Fax Server
  • Blog
  • Contact Us
  • Support

Social engineering: the go to method for hackers

Published: 08 Feb 2019
Social engineering: the go to method for hackers

Social engineering attacks are happening every day, and it is often the first technique hackers turn to, because "calling somebody on the phone is so much easier than doing the technical magic you need to break into a computer."

 

Is your name and your phone number all it takes for a hacker to take over your cellphone account?

 

It turns out it can be. Former cryptocurrency executive Erynn Tomlinson lost about $30,000 in cryptocurrency after hackers used a few of her personal details during interactions with Rogers customer service representatives to ultimately gain access to her account. Tomlinson is a victim of the latest type of hack plaguing the telecommunications industry: it's called a SIM swap, and hackers use what's known as social engineering to make it happen. Social engineering fraud typically occurs through email, phone, or text — or in Tomlinson's case, through online chat windows. Hackers use charm and persuasion to convince a customer service representative they are actually the account holder.

 

How does it work?

The hackers might have a few pieces of publicly available personal information: a person's name, email address, birthdate, postal code or phone number. Hackers use some of those details to try to sweet talk a representative into handing over more information and ultimately gain access to an account. "The attackers are very sophisticated. In this case, Rogers didn't provide any friction for them and made it far too easy," Tomlinson said of her experience.

As far as Tomlinson can tell, the hackers had only her name and her phone number. Over a series of eight different online chats, the hackers managed to obtain her date of birth, email address, account number, the last four digits of her credit card, and other details about her account. Armed with this information, the hacker convinced a Rogers rep to activate a new SIM card linked to Tomlinson's account, which could then be placed into a phone in their possession. A SIM card is a chip used to identify and authenticate a subscriber to a service provider. Once the hackers had executed the SIM swap, they were able to use their own phone to gain access to a number of Tomlinson's sensitive accounts, including those tied to her finances.

Tomlinson used two-factor authentication on her sensitive accounts, an extra security step that sends a message to your cellphone before granting access. Tomlinson believes the SIM swap allowed the hackers to divert those incoming messages to a new device, effectively bypassing her security measures. She first became aware something was wrong when her cellphone stopped working. After stopping by a nearby café to use the Wi-Fi, she realized one of her financial accounts was at zero. She rushed home and logged onto her other accounts, and also saw them being drained. In total, the hackers managed to steal the equivalent of $30,000 in cryptocurrency. "I hope this is a bit more of an extreme case," she said. "But I think … every Canadian is at risk right now."

 

Social Engineering attacks on the rise

Tomlinson's losses may sound extreme, but companies around the world say social engineering attacks are on the rise. Canada's federal privacy commissioner now requires all companies to report any security or privacy breaches. Since November 2018, there have been more than a dozen reports of social-engineering breaches in this country's telecommunications sector alone. Privacy commissioner calling on wireless networks to plug security gap. In an email, the Office of the Privacy Commissioner told CBC Marketplace the trend "clearly raises concerns." The emergence of social engineering fraud comes as no surprise to ethical hacker and cybersecurity expert Joshua Crumbaugh. "Social engineering's been a popular thing, I mean, since the beginning of time — we just gave it a new term. It's the same thing that grifters and con men have been doing forever ... they're just exploiting basic human weaknesses or vulnerabilities."

See original full CBC article here


Posted in Blog, Security, Technology  
Tagged Cybersecurity, Security, Technology  
 

Posts by Topic

  • Blog
    • Miscellaneous
    • IT Blog
    • Technology
    • How to
    • Security
    • Cloud
    • Alerts
    • Off Topic/Fun
    • Best practices
    • Business
    • Tip of the Week

Tag Cloud

Android Backup Best practices Business Business Computing Cloud Collaboration Communication Computer Current Events Cybersecurity Data Data Recovery Disaster Recovery Efficiency Email Google Hackers Hardware Hosted Solutions Innovation Internet IT Services IT Support Malware Managed IT Services Microsoft Mobile Device Network Security Phishing Privacy Productivity Quick Tips Ransomware Saving Money Security Small Business Software Technology Tip of the Week Users User Tips VoIp Workplace Strategy Workplace Tips
Home > Blog > Social engineering: the go to method for hackers

Latest Blog

The Environmental Impact of Your Business Technology

May 9, 2025 8:30 am | By Compudata

For any business, technology is humming in the background. It's the engine driving sales, communication, and operations. We have all come to rely on it daily. With all the benefits, it’s not that often that we sit back and consider the environmental footprint of the technology that keeps our businesses running. It’s absolutely a conversation worth having. Read More

Contact Us

Learn more about what Compudata can do for your business.

1-855-405-8889

Compudata
4-85 Midpark Rd
London, Ontario N6N 1B2

twitter RSS feed

About Compudata

Compudata strives to provide the best comprehensive IT, Computer, and Networking services to small businesses. We can handle all of your organization's technology challenges, starting with planning, implementing, and supporting the IT solutions that are critical to your growth and success.
About Us

Navigation

  • Catalog
  • Sitemap
  • Understanding IT
  • Privacy Policy
  • Accessibility Policy
Remote Support Tool

Trust

Consumer Choice Award Winner
© Compudata Systems London Inc — "Defining What IT Can Be Since 1995."

S5 Box – Login

Publish a login form or anything you want to this position.

S5 Box – Register

Publish a registration form or anything you want to this position.