company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

Ransom

Phishing

loading..
loading..
loading..

Lapsus$ Hackers Elevate SIM-Swapping Attacks to Unprecedented Heights

Unveiling Lapsus$ Cyber Saga: Ingenious SIM-swapping tactics, audacious breaches, and lessons for cybersecurity. Dive deep into this evolving threat.

11-Aug-2023
4 min read

The U.S. government has unveiled a riveting report that dissects the seemingly simple yet devastating techniques employed by the Lapsus$ extortion group to infiltrate highly secured organizations.

This Threatfeed meticulously delves into the operations of Lapsus$, scrutinizing their methods and motives on this comprehensive exposé navigates through the maze of Lapsus$'s tactics.

Lapsus$ Emerges

Initiated in December, an extensive review of Lapsus$ operations followed a trail of incidents marked by proprietary data leaks. This infamous group left its mark on industry titans, including T-Mobile, Samsung, Cisco, and more.

A motley crew primarily composed of teenagers scattered across the U.K. and Brazil, Lapsus$ operated between 2021 and 2022.

Their motivations ranged from notoriety and financial gain to the sheer thrill of the act. Yet, their operations were an intricate blend of simplicity and astonishing innovation.

Unmasking SIM-Swapping Mastery

Intriguingly, the Department of Homeland Security (DHS) Cyber Safety Review Board (CSRB) concluded its investigation, spotlighting the tactics of Lapsus$.

The report unveils that Lapsus$ adeptly employed low-cost techniques, exploiting vulnerabilities in our cyber infrastructure that were overlooked—their weapon of choice: SIM swapping—a seemingly rudimentary technique wielded with surgical precision.

SIM-Swapping Decoded

SIM swapping, the cornerstone of Lapsus$'s approach, involves hijacking a victim's phone number through social engineering or insider assistance at the mobile carrier. Armed with the victim's number, the attacker intercepts SMS-based two-factor authentication (2FA) codes, thus breaching corporate networks and accessing a treasure trove of confidential information.

Lapsus showcased remarkable resourcefulness in executing fraudulent SIM swaps. Some swaps were executed directly from telecommunications provider tools by commandeering employee and contractor accounts. Their quest for victim information extended to fraudulent emergency disclosure requests (EDRs) forged by impersonating legitimate requestors.

Collaborators in Intrusion

Intriguingly, Lapsus$ didn't solely rely on their prowess; they leveraged insiders from targeted organizations. Employees and contractors played pivotal roles, providing credentials, approving multi-factor authentication (MFA) requests, and facilitating internal access for the threat actor.

Breach & Steal

Lapsus employed their fraudulent SIM swap victories to seize control of online accounts. —Sign-in account recovery workflows, propelled by SMS or voice calls, unlocked pathways to unauthorized access. The audacity peaked when Lapsus$ targeted accounts linked to the FBI and Department of Defense.

Chasing the Money Trail

During the investigation, CSRB uncovered a startling revelation—Lapsus$ invested as much as $20,000 weekly to access telecom platforms for SIM swaps. While the stolen data's destination remained obscured, some victims reportedly paid ransoms. Additionally, the group exploited Microsoft Active Directory vulnerabilities, amplifying their network access.

Resilience Amidst Vulnerability

Amidst their spree, Lapsus$ encountered stumbling blocks. Robust intrusion detection systems and proactive security measures thwarted their attacks. Incident response procedures proved vital in mitigating their impact, underscoring the significance of a coordinated defense.

From Exposure to Preparedness

Despite the chorus of cybersecurity experts warning against SMS-based authentication vulnerabilities, organizations remained unprepared. The CSRB's clarion call for secure, password-less solutions reverberates, advocating robust authentication capabilities to curtail social engineering-driven breaches.

Guiding the Way Forward

The CSRB's recommendations chart a robust roadmap. Transitioning to passwordless environments, fortifying authentication systems, and demanding stringent identity verification for SIM swaps are paramount. Enhanced oversight by regulatory bodies and collaboration with law enforcement agencies offer a united front against threats.

A Silence That Speaks

Lapsus$, once an audacious menace, fell silent in September 2022. Law enforcement efforts culminated in the arrest of numerous members, sending a stern message to those who dared exploit vulnerabilities. This endeavor proved that even loosely structured groups can cast profound shadows.

A Call for Unified Defense

The tale of Lapsus$ reverberates as a wake-up call. The need for holistic cybersecurity strategies transcends organizations and industries. The war against cyber threats demands perpetual vigilance, technological innovation, and, above all, unity. Lapsus$ has illuminated the path to resilience; it's up to us to heed the lesson.