1) SIM fraud for passwordless SMS logins or MFA bypassing 2) Persistence via similar methods by registered an adversary controlled phone number (as opposed to ghost logins)