{"id":3148,"date":"2022-01-28T13:37:29","date_gmt":"2022-01-28T10:37:29","guid":{"rendered":"https:\/\/mailsafi.com\/blog\/?p=3148"},"modified":"2022-01-31T11:05:06","modified_gmt":"2022-01-31T08:05:06","slug":"sim-swap-fraud-sms-2fa","status":"publish","type":"post","link":"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/","title":{"rendered":"How SIM-SWAP Fraud Affects Your SMS-based Two-Factor Authentication 2-FA"},"content":{"rendered":"\n<p>If you or your staff access protected information with authentication codes sent to your mobile phone, you might want to rethink this. Two-factor authentication (2FA) or multi-factor authentication (MFA) is not a problem. On the contrary. We highly<a href=\"https:\/\/mailsafi.com\/blog\/two-factor-2fa-authentication-why-you-should-use-it\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\"> recommend that you use two-factor (2FA) or multi-factor (MFA) authentication wherever possible<\/span><\/strong><\/a>. SMS-based two-factor or multi-factor authentication can, however, fall prey to SIM-SWAP fraud scams.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_49 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"ez-toc-toggle-icon-1\"><label for=\"item-69d9d30c2fa44\" aria-label=\"Table of Content\"><span style=\"display: flex;align-items: center;width: 35px;height: 30px;justify-content: center;direction:ltr;\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/label><input  type=\"checkbox\" id=\"item-69d9d30c2fa44\"><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/#Overview\" title=\"Overview\">Overview<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/#What_is_SIM-SWAP_fraud\" title=\"What is SIM-SWAP fraud?\">What is SIM-SWAP fraud?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/#How_SIM-SWAP_Fraud_is_Done\" title=\"How SIM-SWAP Fraud is Done\">How SIM-SWAP Fraud is Done<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/#Stage_1\" title=\"Stage 1\">Stage 1<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/#Stage_2\" title=\"Stage 2\">Stage 2<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/#Summary_of_Dangers_of_SIM-SWAP\" title=\"Summary of Dangers of SIM-SWAP\">Summary of Dangers of SIM-SWAP<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/#How_to_Avoid_Becoming_a_Victim_of_SIM-SWAP_Fraud\" title=\"How to Avoid Becoming a Victim of SIM-SWAP Fraud\">How to Avoid Becoming a Victim of SIM-SWAP Fraud<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/#DO_NOT\" title=\"DO NOT:\">DO NOT:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/#DO\" title=\"DO\">DO<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/#What_To_Do_If_you_Become_a_Victim_of_SIM_SWAP_Fraud\" title=\"What To Do If you Become a Victim of SIM SWAP Fraud\">What To Do If you Become a Victim of SIM SWAP Fraud<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/#Conclusion\" title=\"Conclusion\">Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:32px\"><span class=\"ez-toc-section\" id=\"Overview\"><\/span>Overview<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>In this article, we will discuss:<\/p>\n\n\n\n<ul><li>What is SIM-SWAP Fraud?<\/li><li>How does SIM-SWAP fraud occur?<\/li><li>What are the dangers of SIM-SWAP fraud?<\/li><li>What are the risks of SIM-SWAP fraud when it comes to 2FA (two-factor authentication)?<\/li><li>How can you avoid becoming a victim of SIM-SWAP fraud?<\/li><li>What to do if you become a victim of a SIM SWAP scam<\/li><\/ul>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:32px\"><span class=\"ez-toc-section\" id=\"What_is_SIM-SWAP_fraud\"><\/span>What is SIM-SWAP fraud?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>So you\u2019ve lost your phone, damaged your phone or you just need a new SIM card because your current one does not fit in your new phone. You walk into your nearest mobile service provider store and request a SIM-SWAP. There, done. Now I\u2019m good to go! Or are you, really?<\/p>\n\n\n\n<p>SIM-SWAP, once considered a fairly safe procedure, has in fact turned out to be a present-day scam across the globe resulting in heavy financial loss to multiple victims. In 2019, South Africa reported that SIM-SWAP scams had doubled in a span of a year. SIM-SWAP scams were also reported in UAE, Turkey and other parts of Africa.<\/p>\n\n\n\n<p>SIM-SWAP is a form of identity theft. It occurs when fraudsters replace your SIM card so as to take over your line. <\/p>\n\n\n\n<p>SIM-SWAP fraud occurs&nbsp;<strong>when fraudsters replace a customer\u2019s mobile phone line and take over a customer\u2019s line. The criminal fraudulently obtains a new SIM card from a mobile service provider using<\/strong>&nbsp;the victim\u2019s registered phone number. This sometimes even happens with the assistance of the telco companies\u2019 internal staff \u2013 working together with fraudsters. Fraudsters can even register an existing number on a new SIM card.<\/p>\n\n\n\n<figure class=\"wp-block-pullquote is-style-default\"><blockquote><p>The end goal of SIM-SWAP fraud is to intercept notifications, messages, one-time passwords, online banking codes and profiles and transactions as well as changing account settings.<\/p><\/blockquote><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:32px\"><span class=\"ez-toc-section\" id=\"How_SIM-SWAP_Fraud_is_Done\"><\/span>How SIM-SWAP Fraud is Done<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"913\" height=\"557\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/01\/SIM-SWAP-Fraud-Process-MailSafi.png\" alt=\"\" class=\"wp-image-3157\" srcset=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/01\/SIM-SWAP-Fraud-Process-MailSafi.png 913w, https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/01\/SIM-SWAP-Fraud-Process-MailSafi-300x183.png 300w, https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/01\/SIM-SWAP-Fraud-Process-MailSafi-768x469.png 768w\" sizes=\"(max-width: 913px) 100vw, 913px\" \/><figcaption>The SIM SWAP Fraud Process<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Stage_1\"><\/span><strong>Stage 1<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul><li>The scammer will gather personal information about you.<\/li><li>The fraudster will call you and identify himself\/herself as being from your network service provider. He\/she will refer to you by name, typically, your full name, and also read out your ID number to you to ask for confirmation of whether the digits are correct. This is a social engineering method used to get you to win their confidence.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Stage_2\"><\/span><strong>Stage 2<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul><li>The fraudster will get you to follow certain instructions, typically, to dial certain codes on your phone. For example, USSD code 33*0000* or #253257# or ##72786#. These codes are intended to signal that you\u2019ve lost your SIM card and are, therefore, initiating the process of a SIM-SWAP.<\/li><li>Once you initiate this process, the network on your device\/handset disappears. While you\u2019re offline and struggling to figure out why and probably getting in touch with your network service provider or heading to their shop, the fraudster contacts your network service provider impersonating themselves as you. They\u2019ll report their phone and\/or SIM as stolen and ask for replacement.<\/li><\/ul>\n\n\n\n<ul><li>The fraudster will, thereafter, provide your details to the mobile service agent who will unknowingly help in issuing a new SIM and reactivating the line. You may receive a message on your SIM saying \u201cYour SIM-SWAP application was successful.\u201d However, you will no longer be able to access your text, mobile money, make calls, access the internet or perform any other tasks on which relied on the SIM to function.<\/li><li>The fraudster will now have access to all your SIM services including calls, text messages, mobile money, mobile banking, etc.<\/li><\/ul>\n\n\n\n<p>Other ways in which this can happen include a stranger having a convincing story that allows him to simply have the phone owner willingly hand over his phone handset to him. For instance, the fraudster may request to make a call on your phone because he has lost his phone, or pretend to be a mobile money agent who wants to sort out an issue with your phone. Even so, quite a number of these scams involve compromised staff working with the mobile service provider.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"756\" height=\"446\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/01\/SIM-SWAP-Fraud.png\" alt=\"\" class=\"wp-image-3154\" srcset=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/01\/SIM-SWAP-Fraud.png 756w, https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/01\/SIM-SWAP-Fraud-300x177.png 300w\" sizes=\"(max-width: 756px) 100vw, 756px\" \/><figcaption>SIM-SWAP Fraud<\/figcaption><\/figure>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:32px\"><span class=\"ez-toc-section\" id=\"Summary_of_Dangers_of_SIM-SWAP\"><\/span>Summary of <strong>Dangers of SIM-SWAP<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Having your SIM swapped by a fraudster who takes over your phone is not just an inconvenience. Once a criminal takes over your phone number, they can use it to:<\/p>\n\n\n\n<ul><li>Impersonate you and\/or log into your online accounts.<\/li><li>Get instant access to any two-factor authentication codes you receive through text messages, the secret code that a company or service provider would ordinarily text you to verify your identity.&nbsp;<\/li><\/ul>\n\n\n\n<p>In effect, if the scammer has your password or other personal identifying information, they&#8217;re just a few clicks away from accessing your email account, bank account and\/or social media accounts. Anyone with access to your email account can:<\/p>\n\n\n\n<ul><li>Scour through your email archive to build a list of your entire online presence.<\/li><li>Change your other account passwords, effectively locking you out of your accounts.<\/li><li>Log in to your bank account and steal your money or take over you.<\/li><\/ul>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:32px\"><span class=\"ez-toc-section\" id=\"How_to_Avoid_Becoming_a_Victim_of_SIM-SWAP_Fraud\"><\/span><strong>How to Avoid Becoming a Victim of SIM-SWAP Fraud<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Here are a few ways to avoid becoming a victim of SIM-SWAP fraud.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"DO_NOT\"><\/span><strong>DO NOT:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ol type=\"1\"><li>Don&#8217;t reply to calls, text messages or emails that request for your personal information: Should you receive a call from a stranger (even who introduces him\/herself as being from your phone company), do not follow instructions to key in anything on your phone. Instead, contact the company directly using a phone contact or email address you now to be the real one to confirm you are not being scammed.<\/li><li>Do not answer any questions requesting for your personal information (full name, date of birth, Identity card number) from strangers who call you.<\/li><\/ol>\n\n\n\n<p><strong>Limit the personal information you share online.<\/strong>\u00a0If possible, avoid posting your full name, address, or phone number on public sites. An identity thief could find that information and use it to answer the security questions required to verify your identity and log in to your accounts.<\/p>\n\n\n\n<ol type=\"1\"><li>Likewise, do not confirm information read out to you such as your ID, full names, etc., to strangers in person or over the phone.<\/li><li>Protect your mobile phone PIN numbers.<\/li><li>Avoid using SMS-based two-factor authentication. Read more on the <a href=\"https:\/\/mailsafi.com\/blog\/problems-with-sms-for-2fa\/\"><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">risks of SMS-based two-factor authentication and what you should use instead.<\/span><\/strong><\/a><\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"DO\"><\/span><strong>DO<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ol type=\"1\"><li>Hang up or ignore calls from strangers directing you to share your personal identifying information or requesting you to key in characters on your phone to perform certain tasks. If you&#8217;re unsure, call your service provider or go to their physical stores to confirm.<\/li><li>Ensure that your phone SIM has an active SIM card lock.<\/li><li>Limit the personal identifying information that you share online and on social meida. This includes your full name, address or phone number. A scammer could use this information to build a profile about you that allows them to answer security questions required to verify your identity and login to your accounts or initiate a SIM SWAP succesfully. <\/li><li>Know the trusted lines that belong to your mobile service provider support line so as to instantly become suspicious should you receive a call from an alternate number.<\/li><li>Stop using SMS-based 2FA. Instead <a href=\"https:\/\/mailsafi.com\/blog\/problems-with-sms-for-2fa\/\"><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">use application-based 2-FA methods<\/span><\/strong><\/a> such as <a href=\"https:\/\/support.google.com\/accounts\/answer\/1066447?hl=en&amp;co=GENIE.Platform%3DAndroid\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">Google Authenticator<\/span><\/strong><\/a>.<\/li><\/ol>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:32px\"><span class=\"ez-toc-section\" id=\"What_To_Do_If_you_Become_a_Victim_of_SIM_SWAP_Fraud\"><\/span>What To Do If you Become a Victim of SIM SWAP Fraud<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>In the unfortunate event that you become a victim of a SIM SWAP fraud, here are two things you should do.<\/p>\n\n\n\n<ol><li>Contact your mobile service provider immediately so that you can regain control your phone number from the scammer.<\/li><li>Once you regain control of your account, change your account passwords &#8211; starting with your email account passwords<\/li><li>Check your bank account, credit card, mobile money and other accounts for transactions you did not authorize. Notify the relevant bank or other institution of the fraudulent transactions to stop any further losses on your accounts.<\/li><\/ol>\n\n\n\n<h2 class=\"has-vivid-red-color has-text-color wp-block-heading\" style=\"font-size:32px\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-pullquote is-style-default\"><blockquote><p>If you&#8217;re still using SMS for two-factor authentication, it&#8217;s time to stop. <\/p><\/blockquote><\/figure>\n\n\n\n<p>Consider alternative application-based methods or even physical devices such as a token or biometrics.<\/p>\n<div class=\"pvc_clear\"><\/div><p id=\"pvc_stats_3148\" class=\"pvc_stats all  \" data-element-id=\"3148\" style=\"\"><i class=\"pvc-stats-icon large\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.0\" viewBox=\"0 0 502 315\" preserveAspectRatio=\"xMidYMid meet\"><g transform=\"translate(0,332) scale(0.1,-0.1)\" fill=\"\" stroke=\"none\"><path d=\"M2394 3279 l-29 -30 -3 -207 c-2 -182 0 -211 15 -242 39 -76 157 -76 196 0 15 31 17 60 15 243 l-3 209 -33 29 c-26 23 -41 29 -80 29 -41 0 -53 -5 -78 -31z\"\/><path d=\"M3085 3251 c-45 -19 -58 -50 -96 -229 -47 -217 -49 -260 -13 -295 52 -53 146 -42 177 20 16 31 87 366 87 410 0 70 -86 122 -155 94z\"\/><path d=\"M1751 3234 c-13 -9 -29 -31 -37 -50 -12 -29 -10 -49 21 -204 19 -94 39 -189 45 -210 14 -50 54 -80 110 -80 34 0 48 6 76 34 21 21 34 44 34 59 0 14 -18 113 -40 219 -37 178 -43 195 -70 221 -36 32 -101 37 -139 11z\"\/><path d=\"M1163 3073 c-36 -7 -73 -59 -73 -102 0 -56 133 -378 171 -413 34 -32 83 -37 129 -13 70 36 67 87 -16 290 -86 209 -89 214 -129 231 -35 14 -42 15 -82 7z\"\/><path d=\"M3689 3066 c-15 -9 -33 -30 -42 -48 -48 -103 -147 -355 -147 -375 0 -98 131 -148 192 -74 13 15 57 108 97 206 80 196 84 226 37 273 -30 30 -99 39 -137 18z\"\/><path d=\"M583 2784 c-38 -19 -67 -74 -58 -113 9 -42 211 -354 242 -373 16 -10 45 -18 66 -18 51 0 107 52 107 100 0 39 -1 41 -124 234 -80 126 -108 162 -133 173 -41 17 -61 16 -100 -3z\"\/><path d=\"M4250 2784 c-14 -9 -74 -91 -133 -183 -95 -150 -107 -173 -107 -213 0 -55 33 -94 87 -104 67 -13 90 8 211 198 130 202 137 225 78 284 -27 27 -42 34 -72 34 -22 0 -50 -8 -64 -16z\"\/><path d=\"M2275 2693 c-553 -48 -1095 -270 -1585 -649 -135 -104 -459 -423 -483 -476 -23 -49 -22 -139 2 -186 73 -142 361 -457 571 -626 285 -228 642 -407 990 -497 242 -63 336 -73 660 -74 310 0 370 5 595 52 535 111 1045 392 1455 803 122 121 250 273 275 326 19 41 19 137 0 174 -41 79 -309 363 -465 492 -447 370 -946 591 -1479 653 -113 14 -422 18 -536 8z m395 -428 c171 -34 330 -124 456 -258 112 -119 167 -219 211 -378 27 -96 24 -300 -5 -401 -72 -255 -236 -447 -474 -557 -132 -62 -201 -76 -368 -76 -167 0 -236 14 -368 76 -213 98 -373 271 -451 485 -162 444 86 934 547 1084 153 49 292 57 452 25z m909 -232 c222 -123 408 -262 593 -441 76 -74 138 -139 138 -144 0 -16 -233 -242 -330 -319 -155 -123 -309 -223 -461 -299 l-81 -41 32 46 c18 26 49 83 70 128 143 306 141 649 -6 957 -25 52 -61 116 -79 142 l-34 47 45 -20 c26 -10 76 -36 113 -56z m-2057 25 c-40 -58 -105 -190 -130 -263 -110 -324 -59 -707 132 -981 25 -35 42 -64 37 -64 -19 0 -241 119 -326 174 -188 122 -406 314 -532 468 l-58 71 108 103 c185 178 428 349 672 473 66 33 121 60 123 61 2 0 -10 -19 -26 -42z\"\/><path d=\"M2375 1950 c-198 -44 -350 -190 -395 -379 -18 -76 -8 -221 19 -290 114 -284 457 -406 731 -260 98 52 188 154 231 260 27 69 37 214 19 290 -38 163 -166 304 -326 360 -67 23 -215 33 -279 19z\"\/><\/g><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p><div class=\"pvc_clear\"><\/div>","protected":false},"excerpt":{"rendered":"<p>If you or your staff access protected information with authentication codes sent to your mobile phone, you might want to rethink this. Two-factor authentication (2FA) or multi-factor authentication (MFA) is not a problem. On the contrary. We highly recommend that you use two-factor (2FA) or multi-factor (MFA) authentication wherever possible. SMS-based two-factor or multi-factor authentication [&hellip;]<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_3148\" class=\"pvc_stats all  \" data-element-id=\"3148\" style=\"\"><i class=\"pvc-stats-icon large\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.0\" viewBox=\"0 0 502 315\" preserveAspectRatio=\"xMidYMid meet\"><g transform=\"translate(0,332) scale(0.1,-0.1)\" fill=\"\" stroke=\"none\"><path d=\"M2394 3279 l-29 -30 -3 -207 c-2 -182 0 -211 15 -242 39 -76 157 -76 196 0 15 31 17 60 15 243 l-3 209 -33 29 c-26 23 -41 29 -80 29 -41 0 -53 -5 -78 -31z\"\/><path d=\"M3085 3251 c-45 -19 -58 -50 -96 -229 -47 -217 -49 -260 -13 -295 52 -53 146 -42 177 20 16 31 87 366 87 410 0 70 -86 122 -155 94z\"\/><path d=\"M1751 3234 c-13 -9 -29 -31 -37 -50 -12 -29 -10 -49 21 -204 19 -94 39 -189 45 -210 14 -50 54 -80 110 -80 34 0 48 6 76 34 21 21 34 44 34 59 0 14 -18 113 -40 219 -37 178 -43 195 -70 221 -36 32 -101 37 -139 11z\"\/><path d=\"M1163 3073 c-36 -7 -73 -59 -73 -102 0 -56 133 -378 171 -413 34 -32 83 -37 129 -13 70 36 67 87 -16 290 -86 209 -89 214 -129 231 -35 14 -42 15 -82 7z\"\/><path d=\"M3689 3066 c-15 -9 -33 -30 -42 -48 -48 -103 -147 -355 -147 -375 0 -98 131 -148 192 -74 13 15 57 108 97 206 80 196 84 226 37 273 -30 30 -99 39 -137 18z\"\/><path d=\"M583 2784 c-38 -19 -67 -74 -58 -113 9 -42 211 -354 242 -373 16 -10 45 -18 66 -18 51 0 107 52 107 100 0 39 -1 41 -124 234 -80 126 -108 162 -133 173 -41 17 -61 16 -100 -3z\"\/><path d=\"M4250 2784 c-14 -9 -74 -91 -133 -183 -95 -150 -107 -173 -107 -213 0 -55 33 -94 87 -104 67 -13 90 8 211 198 130 202 137 225 78 284 -27 27 -42 34 -72 34 -22 0 -50 -8 -64 -16z\"\/><path d=\"M2275 2693 c-553 -48 -1095 -270 -1585 -649 -135 -104 -459 -423 -483 -476 -23 -49 -22 -139 2 -186 73 -142 361 -457 571 -626 285 -228 642 -407 990 -497 242 -63 336 -73 660 -74 310 0 370 5 595 52 535 111 1045 392 1455 803 122 121 250 273 275 326 19 41 19 137 0 174 -41 79 -309 363 -465 492 -447 370 -946 591 -1479 653 -113 14 -422 18 -536 8z m395 -428 c171 -34 330 -124 456 -258 112 -119 167 -219 211 -378 27 -96 24 -300 -5 -401 -72 -255 -236 -447 -474 -557 -132 -62 -201 -76 -368 -76 -167 0 -236 14 -368 76 -213 98 -373 271 -451 485 -162 444 86 934 547 1084 153 49 292 57 452 25z m909 -232 c222 -123 408 -262 593 -441 76 -74 138 -139 138 -144 0 -16 -233 -242 -330 -319 -155 -123 -309 -223 -461 -299 l-81 -41 32 46 c18 26 49 83 70 128 143 306 141 649 -6 957 -25 52 -61 116 -79 142 l-34 47 45 -20 c26 -10 76 -36 113 -56z m-2057 25 c-40 -58 -105 -190 -130 -263 -110 -324 -59 -707 132 -981 25 -35 42 -64 37 -64 -19 0 -241 119 -326 174 -188 122 -406 314 -532 468 l-58 71 108 103 c185 178 428 349 672 473 66 33 121 60 123 61 2 0 -10 -19 -26 -42z\"\/><path d=\"M2375 1950 c-198 -44 -350 -190 -395 -379 -18 -76 -8 -221 19 -290 114 -284 457 -406 731 -260 98 52 188 154 231 260 27 69 37 214 19 290 -38 163 -166 304 -326 360 -67 23 -215 33 -279 19z\"\/><\/g><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/mailsafi.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":3160,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[3,175],"tags":[227,280,278,279],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How SIM-SWAP Fraud Affects Your SMS-based 2-FA | MailSafi<\/title>\n<meta name=\"description\" content=\"If you or your staff rely on SMS-based methods for 2FA authentication, you are at risk of becoming a victim of SIM-SWAP fraud.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How SIM-SWAP Fraud Affects Your SMS-based 2-FA | MailSafi\" \/>\n<meta property=\"og:description\" content=\"If you or your staff rely on SMS-based methods for 2FA authentication, you are at risk of becoming a victim of SIM-SWAP fraud.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/\" \/>\n<meta property=\"og:site_name\" content=\"The MailSafi Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/msgafricaltd\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-28T10:37:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-31T08:05:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/01\/SIM-SWAP-Fraud-MailSafi.png\" \/>\n\t<meta property=\"og:image:width\" content=\"759\" \/>\n\t<meta property=\"og:image:height\" content=\"451\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"the_leaders\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@msgafricaltd\" \/>\n<meta name=\"twitter:site\" content=\"@msgafricaltd\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"the_leaders\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/\"},\"author\":{\"name\":\"the_leaders\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14\"},\"headline\":\"How SIM-SWAP Fraud Affects Your SMS-based Two-Factor Authentication 2-FA\",\"datePublished\":\"2022-01-28T10:37:29+00:00\",\"dateModified\":\"2022-01-31T08:05:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/\"},\"wordCount\":1382,\"publisher\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/01\/SIM-SWAP-Fraud-MailSafi.png\",\"keywords\":[\"SMS for authentication\",\"sms for two-factor authentication\",\"sms fraud\",\"sms-fraud\"],\"articleSection\":[\"Email Security\",\"Resources\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/\",\"url\":\"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/\",\"name\":\"How SIM-SWAP Fraud Affects Your SMS-based 2-FA | MailSafi\",\"isPartOf\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/01\/SIM-SWAP-Fraud-MailSafi.png\",\"datePublished\":\"2022-01-28T10:37:29+00:00\",\"dateModified\":\"2022-01-31T08:05:06+00:00\",\"description\":\"If you or your staff rely on SMS-based methods for 2FA authentication, you are at risk of becoming a victim of SIM-SWAP fraud.\",\"breadcrumb\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/#primaryimage\",\"url\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/01\/SIM-SWAP-Fraud-MailSafi.png\",\"contentUrl\":\"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/01\/SIM-SWAP-Fraud-MailSafi.png\",\"width\":759,\"height\":451,\"caption\":\"Sim-Swap Fraud\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/mailsafi.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How SIM-SWAP Fraud Affects Your SMS-based Two-Factor Authentication 2-FA\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#website\",\"url\":\"https:\/\/mailsafi.com\/blog\/\",\"name\":\"The MailSafi Blog\",\"description\":\"We Stop Spam\",\"publisher\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mailsafi.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#organization\",\"name\":\"Message Labs Africa\",\"url\":\"https:\/\/mailsafi.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Message Labs Africa\"},\"image\":{\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/msgafricaltd\/\",\"https:\/\/x.com\/msgafricaltd\",\"https:\/\/www.linkedin.com\/feed\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14\",\"name\":\"the_leaders\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g\",\"caption\":\"the_leaders\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How SIM-SWAP Fraud Affects Your SMS-based 2-FA | MailSafi","description":"If you or your staff rely on SMS-based methods for 2FA authentication, you are at risk of becoming a victim of SIM-SWAP fraud.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/","og_locale":"en_US","og_type":"article","og_title":"How SIM-SWAP Fraud Affects Your SMS-based 2-FA | MailSafi","og_description":"If you or your staff rely on SMS-based methods for 2FA authentication, you are at risk of becoming a victim of SIM-SWAP fraud.","og_url":"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/","og_site_name":"The MailSafi Blog","article_publisher":"https:\/\/www.facebook.com\/msgafricaltd\/","article_published_time":"2022-01-28T10:37:29+00:00","article_modified_time":"2022-01-31T08:05:06+00:00","og_image":[{"width":759,"height":451,"url":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/01\/SIM-SWAP-Fraud-MailSafi.png","type":"image\/png"}],"author":"the_leaders","twitter_card":"summary_large_image","twitter_creator":"@msgafricaltd","twitter_site":"@msgafricaltd","twitter_misc":{"Written by":"the_leaders","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/#article","isPartOf":{"@id":"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/"},"author":{"name":"the_leaders","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14"},"headline":"How SIM-SWAP Fraud Affects Your SMS-based Two-Factor Authentication 2-FA","datePublished":"2022-01-28T10:37:29+00:00","dateModified":"2022-01-31T08:05:06+00:00","mainEntityOfPage":{"@id":"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/"},"wordCount":1382,"publisher":{"@id":"https:\/\/mailsafi.com\/blog\/#organization"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/#primaryimage"},"thumbnailUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/01\/SIM-SWAP-Fraud-MailSafi.png","keywords":["SMS for authentication","sms for two-factor authentication","sms fraud","sms-fraud"],"articleSection":["Email Security","Resources"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/","url":"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/","name":"How SIM-SWAP Fraud Affects Your SMS-based 2-FA | MailSafi","isPartOf":{"@id":"https:\/\/mailsafi.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/#primaryimage"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/#primaryimage"},"thumbnailUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/01\/SIM-SWAP-Fraud-MailSafi.png","datePublished":"2022-01-28T10:37:29+00:00","dateModified":"2022-01-31T08:05:06+00:00","description":"If you or your staff rely on SMS-based methods for 2FA authentication, you are at risk of becoming a victim of SIM-SWAP fraud.","breadcrumb":{"@id":"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/#primaryimage","url":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/01\/SIM-SWAP-Fraud-MailSafi.png","contentUrl":"https:\/\/mailsafi.com\/blog\/wp-content\/uploads\/2022\/01\/SIM-SWAP-Fraud-MailSafi.png","width":759,"height":451,"caption":"Sim-Swap Fraud"},{"@type":"BreadcrumbList","@id":"https:\/\/mailsafi.com\/blog\/sim-swap-fraud-sms-2fa\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailsafi.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How SIM-SWAP Fraud Affects Your SMS-based Two-Factor Authentication 2-FA"}]},{"@type":"WebSite","@id":"https:\/\/mailsafi.com\/blog\/#website","url":"https:\/\/mailsafi.com\/blog\/","name":"The MailSafi Blog","description":"We Stop Spam","publisher":{"@id":"https:\/\/mailsafi.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailsafi.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailsafi.com\/blog\/#organization","name":"Message Labs Africa","url":"https:\/\/mailsafi.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Message Labs Africa"},"image":{"@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/msgafricaltd\/","https:\/\/x.com\/msgafricaltd","https:\/\/www.linkedin.com\/feed\/"]},{"@type":"Person","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/d2ec682ba327149927593938af3f9d14","name":"the_leaders","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailsafi.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7ca448387530cb3177261ca8cd87ff2a?s=96&d=mm&r=g","caption":"the_leaders"}}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/3148"}],"collection":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/comments?post=3148"}],"version-history":[{"count":19,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/3148\/revisions"}],"predecessor-version":[{"id":3171,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/posts\/3148\/revisions\/3171"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/media\/3160"}],"wp:attachment":[{"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/media?parent=3148"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/categories?post=3148"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailsafi.com\/blog\/wp-json\/wp\/v2\/tags?post=3148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}