← Back to context

Comment by bhouston

5 months ago

"The agency said on Tuesday that last month it found more than 300 SIM servers and 100,000 SIM cards that could have been used for telecom attacks within the area encompassing parts of New York, New Jersey and Connecticut."

Isn't it costly to acquire that many SIM cards? Or maybe they were inactive until they were associated with an account? So it was just to keep allowing for a rotating set of SIM accounts?

Are we going to find out that all these cellphones were used to run bots on X or similar?

100k is the number of active cards. It is being reported that they had 2-3x as many cards in total.

Seems like a nation-state level attack from somebody that has millions to spend to keep this up their sleeve

  • Why even have cards when there are eSims, but maybe cards have some advantages in terms of deniability or something?

    It sounds sophisticated, but nation state or cartel or something else big?

    • Probably because it's way easier to pull a SIM out of the package and stuff it into the reader than it is to go through the QR code/web site/phone app you need to get the eSIM up and running for your provider.

      What I'm really curious about is the money trail. These cards weren't bought in one off cash purchases or via some penny ante crypto reseller. Someone bought in bulk using real money. They probably had to talk with the salesguy at the MVNO to make an order that large. This kind of thing must leave a footprint.

      3 replies →