The attackers ported victims’ cell phone lines and then defeated 2FA to access accounts and apps.
Source: Threadpost