Adversaries may gain access to mobile devices through transfers or swaps from victims’ phone numbers to adversary-controlled SIM cards and mobile devices.[1][2] | attack.mitre.org
Scattered Spider| attack.mitre.org
Duo’s product and engineering teams build world-class solutions to solve major security problems; here’s the how and why behind the features they design and develop.| Cisco Duo
T1098 | attack.mitre.org