
The mobile virtual network operator, Cloaked Wireless, is implementing strong measures against unauthorized SIM swaps and port-out attacks, typical vectors for SIM swap fraud. Additionally, it differentiates itself by accepting Bitcoin as a payment method, a move that signals its adoption of cryptocurrency in America’s telecommunications sector. The threat of SIM swap fraud is of high concern within the crypto ecosystem, as it presents risks to personal and financial security.
Cloaked Wireless is committed to protecting user data. CEO Jeremy Hill believes the company can accomplish this by employing advanced authentication technologies and minimizing data collection, thereby bolstering mobile security and reducing the potential for data breaches. The company offers both eSIM and traditional SIM card options, with stringent controls in place to prevent unauthorized account alterations.
Cloaked Wireless’s strategy to prevent SIM swap attacks benefits from the expertise of security and privacy professionals, as well as those within the crypto community. The company has offered free lifetime service to significant Bitcoin core developers. However, it is yet to establish a proven track record in the prevention of SIM swap incidents.
Collaborations have been critical in the shared industry quest to combat SIM swap fraud. Recently, global telecommunications heavyweight, Telefónica, partnered with Chainlink Labs to develop blockchain solutions. This collaboration aims to fuse telecommunications with blockchain technology to secure networks from SIM swap attacks.
Recent cybersecurity breaches have highlighted the importance of such preventive measures. For example, a SIM swap attack in January affected the US Securities and Exchange Commission’s account, causing a disturbance in the cryptocurrency market. The FTX crypto exchange also lost over $400 million owing to a SIM swap attack, when in November 2022, hackers exploited personal data, manipulating phone carriers, and transferring the exchange’s phone numbers to devices they controlled. These incidents point to the weaknesses in traditional mobile networks and emphasize the importance of enhanced security protocols.