{"id":55875,"date":"2024-04-17T15:32:51","date_gmt":"2024-04-17T15:32:51","guid":{"rendered":"http:\/\/b991228e-49ca-4839-b931-44354d656808"},"modified":"2024-04-17T15:32:51","modified_gmt":"2024-04-17T15:32:51","slug":"criminals-want-to-pay-t-mobile-and-verizon-staff-for-sim-swaps-heres-what-you-need-to-know","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/criminals-want-to-pay-t-mobile-and-verizon-staff-for-sim-swaps-heres-what-you-need-to-know\/","title":{"rendered":"Criminals want to pay T-Mobile and Verizon staff for SIM swaps. Here&#8217;s what you need to know"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/a94e863363e1c3861abd146d83febf7967adb673\/2024\/03\/16\/18a3c7f0-7b01-47b4-82f2-0d99cd884678\/img-9072.jpg?auto=webp&amp;width=768\" alt=\"Yes, there's a SIM tray for cellular data that can accommodate two SIM cards, or one SIM card and a microSD card.\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/ec96f00ea2fd158ef34afb54d706c36bc1f00180\/2024\/03\/16\/18a3c7f0-7b01-47b4-82f2-0d99cd884678\/img-9072.jpg?auto=webp&amp;width=1024\" alt=\"Yes, there's a SIM tray for cellular data that can accommodate two SIM cards, or one SIM card and a microSD card.\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/f19837a480ce81a38ce9ab7fb1f17bbb68be0367\/2024\/03\/16\/18a3c7f0-7b01-47b4-82f2-0d99cd884678\/img-9072.jpg?auto=webp&amp;width=1280\" alt=\"Yes, there's a SIM tray for cellular data that can accommodate two SIM cards, or one SIM card and a microSD card.\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/f19837a480ce81a38ce9ab7fb1f17bbb68be0367\/2024\/03\/16\/18a3c7f0-7b01-47b4-82f2-0d99cd884678\/img-9072.jpg?auto=webp&amp;width=1280\" alt=\"Yes, there's a SIM tray for cellular data that can accommodate two SIM cards, or one SIM card and a microSD card.\" width=\"1280\" height=\"720\" fetchpriority=\"low\"><\/picture><\/div>\n<\/p><\/div><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Adrian Kingsley-Hughes\/ZDNET<\/span><\/figcaption><\/figure>\n<p>In an attempt to steal mobile users&#8217; data, malicious actors are targeting Verizon and T-Mobile employees.<\/p>\n<p>Current and former Verizon and T-Mobile employees <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/t-mobile-verizon-workers-get-texts-offering-300-for-sim-swaps\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">told Bleeping Computer<\/a> that they&#8217;ve received unsolicited messages from unidentified cybercriminals offering up to $300 to perform SIM swaps. In some cases, the attackers are asking the employees to respond to them by text, while others said they could discuss the details on encrypted messaging platform Telegram.<\/p>\n<p>&#8220;I got your number from the T-Mo employee directory,&#8221; one of the messages to a T-Mobile employee said. &#8220;I&#8217;m looking to pay someone up to $300 per sim swap done, if you&#8217;re interested, reply and we can talk.&#8221;<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/6-ways-to-protect-yourself-from-getting-scammed-online-by-phone-or-irl\/\" rel=\"follow\">6 ways to protect yourself from getting scammed online, by phone, or IRL<\/a><\/strong><\/p>\n<p>A SIM swap attack typically involves a cybercriminal getting a wireless carrier to <a href=\"https:\/\/www.zdnet.com\/article\/sim-swap-horror-story-ive-lost-decades-of-data-and-google-wont-lift-a-finger\/\" rel=\"follow\">direct service to their phone<\/a> instead of the actual customer paying for that service. This often leads to identity theft, loss of sensitive information, and financial scams. What&#8217;s worse, SIM swap attacks are on the rise.<\/p>\n<p>In 2022, the FBI&nbsp;<a href=\"https:\/\/www.ic3.gov\/Media\/Y2022\/PSA220208\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">issued a warning<\/a> to consumers that&nbsp;<a href=\"https:\/\/www.zdnet.com\/finance\/blockchain\/fbi-warns-sim-swapping-attacks-are-rocketing-dont-brag-about-your-crypto-online\/\" rel=\"follow\">SIM swap attacks are growing<\/a>. The agency received 320 SIM swapping complaints between January 2018 and December 2020 that cost victims $12 million. In 2021, that number jumped to 1,611 complaints and more than $68 million in losses. In 2022, complaints jumped to more than 2,000 and losses <a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2022_IC3Report.pdf\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">totaled<\/a> nearly $73 million.<\/p>\n<p><!----><\/p>\n<p>Since the attackers also targeted former Verizon and T-Mobile employees, it&#8217;s possible they are using outdated directories. As of this writing, it doesn&#8217;t appear that the malicious actors obtained the records in a data breach. In a <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/t-mobile-verizon-workers-get-texts-offering-300-for-sim-swaps\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">statement<\/a> to Bleeping Computer, T-Mobile said the company didn&#8217;t suffer &#8220;a systems breach,&#8221; and is investigating &#8220;messages that are being sent to solicit illegal activity.&#8221;<\/p>\n<p>It&#8217;s unclear from the report whether any employees attempted to take the cybercriminals up on their offer. We also don&#8217;t know how many employees the malicious actors targeted.<\/p>\n<p>We reached out to both Verizon and T-Mobile for more information. We&#8217;ll update this space as new details emerge.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/criminals-want-to-pay-t-mobile-and-verizon-staff-for-sim-swaps-heres-what-you-need-to-know\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The attackers are offering up to $300 to T-Mobile and Verizon employees for help with stealing from their employers&#8217; customers.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-55875","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Criminals want to pay T-Mobile and Verizon staff for SIM swaps. Here&#039;s what you need to know 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/criminals-want-to-pay-t-mobile-and-verizon-staff-for-sim-swaps-heres-what-you-need-to-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Criminals want to pay T-Mobile and Verizon staff for SIM swaps. Here&#039;s what you need to know 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/criminals-want-to-pay-t-mobile-and-verizon-staff-for-sim-swaps-heres-what-you-need-to-know\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-17T15:32:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/f19837a480ce81a38ce9ab7fb1f17bbb68be0367\/2024\/03\/16\/18a3c7f0-7b01-47b4-82f2-0d99cd884678\/img-9072.jpg?auto=webp&amp;width=1280\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminals-want-to-pay-t-mobile-and-verizon-staff-for-sim-swaps-heres-what-you-need-to-know\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminals-want-to-pay-t-mobile-and-verizon-staff-for-sim-swaps-heres-what-you-need-to-know\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Criminals want to pay T-Mobile and Verizon staff for SIM swaps. Here&#8217;s what you need to know\",\"datePublished\":\"2024-04-17T15:32:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminals-want-to-pay-t-mobile-and-verizon-staff-for-sim-swaps-heres-what-you-need-to-know\\\/\"},\"wordCount\":364,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminals-want-to-pay-t-mobile-and-verizon-staff-for-sim-swaps-heres-what-you-need-to-know\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/f19837a480ce81a38ce9ab7fb1f17bbb68be0367\\\/2024\\\/03\\\/16\\\/18a3c7f0-7b01-47b4-82f2-0d99cd884678\\\/img-9072.jpg?auto=webp&amp;width=1280\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminals-want-to-pay-t-mobile-and-verizon-staff-for-sim-swaps-heres-what-you-need-to-know\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminals-want-to-pay-t-mobile-and-verizon-staff-for-sim-swaps-heres-what-you-need-to-know\\\/\",\"name\":\"Criminals want to pay T-Mobile and Verizon staff for SIM swaps. Here's what you need to know 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminals-want-to-pay-t-mobile-and-verizon-staff-for-sim-swaps-heres-what-you-need-to-know\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminals-want-to-pay-t-mobile-and-verizon-staff-for-sim-swaps-heres-what-you-need-to-know\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/f19837a480ce81a38ce9ab7fb1f17bbb68be0367\\\/2024\\\/03\\\/16\\\/18a3c7f0-7b01-47b4-82f2-0d99cd884678\\\/img-9072.jpg?auto=webp&amp;width=1280\",\"datePublished\":\"2024-04-17T15:32:51+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminals-want-to-pay-t-mobile-and-verizon-staff-for-sim-swaps-heres-what-you-need-to-know\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminals-want-to-pay-t-mobile-and-verizon-staff-for-sim-swaps-heres-what-you-need-to-know\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminals-want-to-pay-t-mobile-and-verizon-staff-for-sim-swaps-heres-what-you-need-to-know\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/f19837a480ce81a38ce9ab7fb1f17bbb68be0367\\\/2024\\\/03\\\/16\\\/18a3c7f0-7b01-47b4-82f2-0d99cd884678\\\/img-9072.jpg?auto=webp&amp;width=1280\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/f19837a480ce81a38ce9ab7fb1f17bbb68be0367\\\/2024\\\/03\\\/16\\\/18a3c7f0-7b01-47b4-82f2-0d99cd884678\\\/img-9072.jpg?auto=webp&amp;width=1280\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/criminals-want-to-pay-t-mobile-and-verizon-staff-for-sim-swaps-heres-what-you-need-to-know\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Criminals want to pay T-Mobile and Verizon staff for SIM swaps. Here&#8217;s what you need to know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Criminals want to pay T-Mobile and Verizon staff for SIM swaps. Here's what you need to know 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/criminals-want-to-pay-t-mobile-and-verizon-staff-for-sim-swaps-heres-what-you-need-to-know\/","og_locale":"en_US","og_type":"article","og_title":"Criminals want to pay T-Mobile and Verizon staff for SIM swaps. Here's what you need to know 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/criminals-want-to-pay-t-mobile-and-verizon-staff-for-sim-swaps-heres-what-you-need-to-know\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-04-17T15:32:51+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/f19837a480ce81a38ce9ab7fb1f17bbb68be0367\/2024\/03\/16\/18a3c7f0-7b01-47b4-82f2-0d99cd884678\/img-9072.jpg?auto=webp&amp;width=1280","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/criminals-want-to-pay-t-mobile-and-verizon-staff-for-sim-swaps-heres-what-you-need-to-know\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/criminals-want-to-pay-t-mobile-and-verizon-staff-for-sim-swaps-heres-what-you-need-to-know\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Criminals want to pay T-Mobile and Verizon staff for SIM swaps. Here&#8217;s what you need to know","datePublished":"2024-04-17T15:32:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/criminals-want-to-pay-t-mobile-and-verizon-staff-for-sim-swaps-heres-what-you-need-to-know\/"},"wordCount":364,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/criminals-want-to-pay-t-mobile-and-verizon-staff-for-sim-swaps-heres-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/f19837a480ce81a38ce9ab7fb1f17bbb68be0367\/2024\/03\/16\/18a3c7f0-7b01-47b4-82f2-0d99cd884678\/img-9072.jpg?auto=webp&amp;width=1280","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/criminals-want-to-pay-t-mobile-and-verizon-staff-for-sim-swaps-heres-what-you-need-to-know\/","url":"https:\/\/www.threatshub.org\/blog\/criminals-want-to-pay-t-mobile-and-verizon-staff-for-sim-swaps-heres-what-you-need-to-know\/","name":"Criminals want to pay T-Mobile and Verizon staff for SIM swaps. Here's what you need to know 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/criminals-want-to-pay-t-mobile-and-verizon-staff-for-sim-swaps-heres-what-you-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/criminals-want-to-pay-t-mobile-and-verizon-staff-for-sim-swaps-heres-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/f19837a480ce81a38ce9ab7fb1f17bbb68be0367\/2024\/03\/16\/18a3c7f0-7b01-47b4-82f2-0d99cd884678\/img-9072.jpg?auto=webp&amp;width=1280","datePublished":"2024-04-17T15:32:51+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/criminals-want-to-pay-t-mobile-and-verizon-staff-for-sim-swaps-heres-what-you-need-to-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/criminals-want-to-pay-t-mobile-and-verizon-staff-for-sim-swaps-heres-what-you-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/criminals-want-to-pay-t-mobile-and-verizon-staff-for-sim-swaps-heres-what-you-need-to-know\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/f19837a480ce81a38ce9ab7fb1f17bbb68be0367\/2024\/03\/16\/18a3c7f0-7b01-47b4-82f2-0d99cd884678\/img-9072.jpg?auto=webp&amp;width=1280","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/f19837a480ce81a38ce9ab7fb1f17bbb68be0367\/2024\/03\/16\/18a3c7f0-7b01-47b4-82f2-0d99cd884678\/img-9072.jpg?auto=webp&amp;width=1280"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/criminals-want-to-pay-t-mobile-and-verizon-staff-for-sim-swaps-heres-what-you-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Criminals want to pay T-Mobile and Verizon staff for SIM swaps. Here&#8217;s what you need to know"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55875","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=55875"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55875\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=55875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=55875"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=55875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}