Federal Deposit Insurance Corporation FDIC-Insured - Backed by the full faith and credit of the U.S. Government

CB&S Bank Logo

SIM Swapping Scam

CB&S Star Subscriber Identity Module (SIM) cards contain all the information your mobile device needs to connect to a cellular network. Cybercriminals employ SIM swapping scams, also known as “SIM hijacking attacks,” to access your cell phone number and obtain your personal and financial information.

Scammers are trying to intercept the unique access codes (two-factor authentication codes) that banks and other companies send to verify your identity when logging into an online account. Their ultimate goal is to use your cell phone to access your information to steal your money.

How Does the Scam Work?

Fraudsters learn about you through data breaches by researching your social media profiles, via phishing scams, vishing scams, smishing scams and the dark web. They use this information to impersonate you and trick your mobile carrier into switching your SIM card with theirs.

When your mobile carrier activates the criminal’s SIM card, your phone number will be transferred to the criminal’s device. In other instances, criminals try and steal your physical SIM cards. In either situation, you’ll suddenly be unable to communicate using your mobile phone, including making phone calls, sending/receiving text messages or accessing your accounts. Essentially, all communication with your number will be directed to and controlled by the criminal.

 

Recognize the Signs of an Attack

  • Sudden loss of cell service – you can’t make phone calls or send/receive text messages.
  • You’re unable to use any apps on your phone.
  • You receive security alerts indicating that your settings have changed, which you did not authorize.
  • Unusual login activity for any of your online accounts (e.g., email, financial, phone, social media, etc.).

 

Protect Yourself

  • Use unique passwords or passphrases. Using hard-to-guess, distinct passwords for each of your accounts will make it harder for fraudsters to gain access to your information.
  • Don’t respond to unsolicited messages, particularly those with an unusually high sense of urgency. Typically, phone providers will not contact you requesting any sensitive information — be sure to check with your carrier to confirm their policy.
  • Utilize non-text messaging two-factor authentication methods when possible. Authentication apps, biometrics or hardware tokens are preferable because fraudsters can’t digitally access them.
  • Set up a SIM PIN. When enabled, this unique code is required each time your mobile device is restarted. This adds an additional layer of protection in the event of a lost or stolen cell phone. You can access the feature within settings on your phone or contact your phone manufacturer (Apple, Samsung, Google, etc.) for assistance.
  • Limit what you share online. Refrain from discussing your financial assets and personal details (date of birth, first car, mother’s maiden name, anniversary) on social media. The less you can make yourself a target for fraudsters, the better.
  • Contact your mobile provider to learn what protections they offer. The major carriers typically allow you to enable extra security measures to safeguard your number and account.
  • Download your provider’s mobile app. These apps can be a quick way to receive security alerts and check for unusual account activity.

 

What if You are a Victim?

  • Contact your phone carrier immediately. Use your landline, a friend’s or relative’s phone.
  • Immediately change all your passwords, starting with your bank account password!
  • Regularly check your bank accounts for unusual activity and inform your bank.
  • In case of a fraud, contact the bank immediately to have your account blocked and avoid further fraud.
  • Register for regular SMS as well as e-mail alerts for your banking transactions. (This way, even if your SIM is de-activated, you shall continue to receive the alerts via your email).
  • Place a fraud alert with the three credit bureaus: Equifax, Experian and TransUnion.
  • Monitor your credit reports: Visit AnnualCreditReport.com.
  • Report it to the FTC at https://www.identitytheft.gov/ and report it to the FBI's Internet Crime Complaint Center at www.ic3.gov.

 

Where to Learn More

 

What are Two-Factor Authentication Codes?

To prevent unauthorized access to your accounts, sites usually require you to sign in with a username and password. This process verifies who you are and is known as authentication. The credential you give to log in — your password, in this example — is a type of authentication factor. Authentication factors fall into three categories:

    • Something you know, like a password, a PIN, or the answer to a security question.
    • Something you have, like a one-time verification passcode you get by text, email, or from an authenticator app; or a security key.
    • Something you are, like your fingerprint, your face, or your retina.

Accounts with two-factor authentication require you to enter a credential from two of the three categories to log in.

 

Two Factors Are Better Than One

Using only one factor — say, something you know, like a password — to log in to your account is like having one lock on your front door. And not a very secure one.

Using two-factor authentication is like using two locks on your door — and is much more secure. Even if a hacker knows your username and password, they can’t log in to your account without the second credential or authentication factor.

 

Miscellaneous Definitions

Phishing: the fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.

Vishing: the fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as bank details and credit card numbers. “Many victims of vishing are people who are not tech-savvy”.

Smishing: the fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords or credit card numbers.

 

  1. Personal

    1. Personal Banking
      1. Personal Accounts
        1. Personal Account Comparison
        2. Star Account
        3. Star Rewards Account
        4. Prime Advantage
        5. All About U Student Account
        6. Golden Customer Club
      2. Personal Savings
        1. Savings Account Comparison
        2. Star Savings
        3. Star Rewards Savings
        4. Super Star Savers Club
        5. Christmas Club Savings
        6. Vacation Club Savings
        7. Certificates of Deposit (CDs)
        8. Individual Retirement Account (IRAs)
      3. Debit Cards
      4. Safe Deposit Boxes
    2. Personal Borrowing
      1. Home Loans
      2. Personal Loans
      3. Auto Loans
      4. Credit Cards
    3. Account Tools & Resources
      1. Personal Financial Insights
      2. Personal Financial Calculators
      3. ID Protection
      4. Access Line
      5. Reorder Checks
      6. Report Lost/Stolen Card
      7. Download a Switch Kit
  2. Business

    1. Business Banking
      1. Business Checking
        1. Business Checking Account Comparison
        2. Free Business Checking
        3. Business Select Checking
        4. Business Analysis Checking
        5. Business Interest Checking
        6. Business Prime Advantage
        7. Workplace Advantage Checking (For Your Employees)
      2. Business Savings
        1. Business Savings Accounts
        2. Simplified Employee Pension (SEP) Account
        3. Business Advantage Money Market
      3. Business Mobile Banking
      4. Business Debit Cards
      5. Treasury Management
        1. Treasury Management Services
      6. Merchant Services
    2.  Business Borrowing
      1. Small Business Loans
      2. Commercial Loans
      3. Commercial Real Estate Loans
      4. Credit Cards
    3. Account Tools & Resources
      1. Business Financial Insights
    4. Business Financial Calculators
      1. Capital Calculator
      2. Cash Flow Calculator
      3. Commercial Loan Calculator
      4. Debt Service Calculator
      5. Ratios Calculator
  3. Digital Banking

    1. Personal Digital Banking
      1. Mobile Banking
      2. Mobile Deposit
      3. Internet Banking
      4. Internet Bill Pay
      5. Zelle
      6. eStatements
      7. Mobile Wallet
      8. Make a Loan Payment
    2. Business Digital Banking
      1. Mobile Banking
      2. Treasury Management Internet Banking
      3. Business Express Deposit
  4. Home Loans

    1. Home Loan Options
      1. Apply For A Home Loan
    2. Meet Our Mortgage Team
      1. Scott Pride
      2. Charlotte Loines
      3. Alana Beaugez
      4. Derona Wilson
      5. Blake Bendall
    3. Mortgage Tools & Resources
      1. Home Loan Insights
      2. Home Loan Toolkit
      3. Home Loan Glossary & FAQ
      4. Loan Calculator
      5. NMLS Registry
  5. Financial Services

    1. Insurance
    2. Personal Investments
      1. Meet Our Team
  6. About Us

    1. Our Story & History
    2. Locations & Hours
      1. Adamsville
      2. Ardmore
      3. Birmingham Doug Baker
      4. Birmingham Mountain Brook
      5. Bolivar
      6. Cherokee
      7. Clarksdale
      8. Corinth Alcorn Dr
      9. Corinth Harper Rd
      10. Cornersville
      11. Decatur 6th Ave
      12. Decatur Beltline Rd
      13. Eupora
      14. Fayetteville
      15. Florence Downtown
      16. Florence Hough Rd
      17. Greenville Downtown
      18. Greenville Highway 1
      19. Greenwood Downtown
      20. Greenwood Park Ave
      21. Hodges
      22. Hohenwald 
      23. Huntsville Downtown
      24. Huntsville Hampton Cove
      25. Huntsville Perimeter Park
      26. Killen
      27. Lewisburg
      28. Madison
      29. Main Office
      30. Moulton
      31. Murfreesboro Church St
      32. Murfreesboro Cason Lane
      33. Muscle Shoals
      34. North Russellville
      35. Parsons Main St
      36. Phil Campbell
      37. Pike Road
      38. Pulaski
      39. Red Bay
      40. Ripley
      41. Savannah Main St
      42. Russellville Franklin Plaza
      43. Savannah Water St
      44. Scotts Hill
      45. Selmer 
      46. Starkville
      47. Sturgis
      48. Tallassee Gilmer Ave
      49. Tallassee Main St
      50. Town Creek
      51. Tuscaloosa
      52. Tupelo Main St
      53. Walnut
      54. Wetumpka
      55. Whiteville
    3. Contact Us
    4. Career Opportunities
    5. Privacy Notice
    6. Mobile Privacy Policy
    7. Privacy & Security
    8. Terms & Conditions
    9. Disclosures
  7. Education Center


    1. Personal Financial Insights
    2. Business Financial Insights
    3. Home Loan Insights
    4. Home Loan Toolkit
    5. Home Loan Glossary & FAQ
    6. Product Video Demos
    7. Financial Calculators
Go To Top