meta_pixel
Tapesearch Logo
Log in
Slate News

What Next TBD: If They Can Get Sydney Sweeney They Can Get You

Slate News

Slate Podcasts

News, News Commentary, Politics

4.66K Ratings

🗓️ 4 August 2024

⏱️ 25 minutes

🧾️ Download transcript

Summary

Earlier this month, AT&T was hit by the largest telecom hack ever. Not long after, Sydney Sweeney’s phone number was stolen by criminals, who used it to hack her social media and promote a memecoin. With how much sensitive data telecom companies have on us, why is their security so bad? And how can we protect ourselves? Guests: Joseph Cox, investigative reporter and cofounder of 404 media. Want more What Next TBD? Subscribe to Slate Plus to access ad-free listening to the whole What Next family and all your favorite Slate podcasts. Subscribe today on Apple Podcasts by clicking “Try Free” at the top of our show page. Sign up now at slate.com/whatnextplus to get access wherever you listen. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

Earlier this month, the actress Sydney Sweeney started promoting a

0:09.4

crypto meme coin on her Twitter account. It was called Sweeney and there was a post saying

0:15.3

stay tuned to see what Sweeney can do. As you might be able to guess that wasn't

0:21.6

really Sidney Sweeney promoting that coin.

0:25.6

Shocker.

0:26.6

Exactly.

0:27.6

That's Joseph Cox, an investigative reporter and co-founder of 404 media.

0:34.9

Joseph covers hackers and the shadowy corners of the internet.

0:40.0

Sydney Sweeney had of course been hacked, but it was more complex than just your standard social media hack.

0:46.2

They have actually taken over her Verizon phone number as well, which is what granted them access to the Twitter account.

0:57.0

And the reason I know this is because I spend a lot of time in these online chat rooms where hackers gather and several people actually

1:08.2

posted this photo of an iPhone laying on the trunk of a Mercedes along with some sort of receipt or

1:17.3

invoice from Verizon and in big capital letters it said thank you for your purchase Sydney Sweeney

1:28.2

that was immediately suspicious I don't think said the Sweeney was going to be posting let alone a tweet promoting a

1:35.7

cryptocurrency but also some sort of receipt in the criminal chat room and that led me

1:40.5

down the rabbit hole of it looks like these hackers actually took over

1:44.6

her phone number as well.

1:48.7

How does a hacker do something like that take over someone's phone number?

1:55.0

So the practice is called Sim swapping or sim porting or sim hijacking. I usually say

2:01.9

sim swapping and basically what or Sim hijacking, I usually say Sim swapping.

2:03.2

And basically what that entails is a hacker

2:07.6

somehow tricking a telecom, be that Verizon,

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from Slate Podcasts, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of Slate Podcasts and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.