The recent discovery of a SIM farm operation in New York has highlighted a long-standing issue within the cybercrime landscape. SIM farms, which consist of large collections of SIM cards that can be remotely managed, have been exploited by criminals for various illicit activities, including spam distribution, swatting incidents, and the creation of fake accounts for deceptive engagement on social media and advertising platforms. Typically, these operations are managed using specialized equipment known as SIM boxes that can handle over a hundred SIM cards simultaneously, each connected to servers capable of controlling thousands.
A telecommunications industry source, who wished to remain anonymous due to the ongoing investigation by the Secret Service, remarked that SIM farms enable “bulk messaging at a rate and volume unachievable by individual users.” This technological capability allows criminals to evade detection systems through techniques such as SIM rotation, geographic traffic masking, and emulating legitimate user behaviors.
The evidence presented by the Secret Service, according to the source, indicates a highly organized criminal network may have orchestrated this SIM farm. Such professionalism implies considerable intelligence and resources were mobilized to sustain these operations.
While this SIM farm is not the largest known in the United States, it is notable for its density within a confined geographic area. The investigation revealed a multitude of SIM boxes, which are illegal in the U.S., suggesting they were smuggled into the country. One instance involved SIM boxes concealed as audio amplifiers while being transported from China.
Cathal Mc Daid, Vice President of Technology at Enea, a telecommunications and cybersecurity firm, noted that the well-maintained racks of equipment observed during the investigation hint at a methodically organized operation. The infrastructure depicted in the photos shared by the Secret Service shows systematically arranged telecom equipment, meticulously labeled devices, and well-organized cabling, creating an impression of a professional standard not commonly seen in smaller SIM operations.
Despite this significant discovery in New York, Mc Daid pointed to similar, if not larger, operations reported in Ukraine. Ukrainian law enforcement agencies have dismantled numerous SIM farms, some linked to Russian interests, that have involved the seizure of tens of thousands of SIM cards. Such operations are often utilized to fake social media profiles for disseminating disinformation and propaganda.
The relevance of the MITRE ATT&CK framework in analyzing operations such as this becomes evident. Adversary tactics that may have been employed include initial access through social engineering to obtain SIM cards, followed by persistence techniques that ensure continued access to these systems. Activities related to privilege escalation may have also been crucial as criminals sought to maximize their control over network resources and associated account functionalities.
As businesses increasingly rely on digital communication channels, the emergence of sophisticated SIM farm operations underlines the necessity for robust cybersecurity measures. Understanding these tactics is vital for organizations aiming to fortify their defenses against potential exploitation through similar schemes.