coingecko (thumbnail mini)
Continue in app
Track prices in real-time
coingecko (thumbnail mini)
Continue in app
Track prices in real-time

Sim Swapping

By Cryptomcmillan1 | Updated on May 24, 2020
It is a tactic where hacker overtake the mobile phone to exploit the two-factor authentication and two-step verification. Once the hacker gotten hold of the victim's mobile phone number, they could proceed to convince the telco company to migrate the victim's phone number to the hacker's number. Otherwise, they could also intercept any authentication and verification number via text messages or mobile phone and bypass the security of personal accounts such as bank accounts and social media accounts.

Share this with a friend!

Related Terms

Goblin Town
A term used to describe the market's persistent downtrend, synonymous with "bear market".
Decentralized Finance (DeFi)
Decentralized Finance (DeFi) refers to the movement of building decentralized financial applications that have no central authority and is censorship free.
Validator
A block-signing participant of a Proof of Stake blockchain network, whom have significant tokens staked on the network.
Decentralized Autonomous Organization (DAO)
Open source and decentralized systems that do not require centralized operators or controllers.
Hungry for more knowledge?
Back to Glossary or Subscribe to our newsletter.