Explainer: What is SIM swapping, why it is dangerous and how to stay safe
Amidst the proliferating dangers of phishing, malware and ransomware attacks, SIM swapping gets rather overlooked. By this term, we mean cybercriminals getting the duplicate of your mobile SIM card in their hands and using it to avoid the two-factor authentication, which can then allow them access to your sensitive banking details.
For SIM swapping to work, the first thing a cybercriminal needs is your SIM card which can be obtained through impersonation. To get a duplicate of the victim’s card, all they need is their personal data like your full name, ID proof, phone number etc.. Then they can get in touch with your mobile services operator over the phone or internet or by actually visiting a physical store. Impersonating the victim can be very easy if the mobile operator is not vigilant about verifying the identity of the user to whom the original SIM card was issued. If precautions are not taken in regards to issuing another SIM, then it becomes quite easy for someone with an ill intent to harm you via SIM swapping.
So, the next thing a cybercriminal does after procuring a duplicate SIM is to put it into another device. Doing this gets them access to all the data on the victim’s original SIM like call logs and message history. Now, even if you think that for a banking transaction or transfer to happen, the OTP is needed which only you will get, you are wrong. Also, cybercriminals can even know your banking details and transfer your money to some other account.
SIM swapping: Tips to stay safe
To stay safe from the threat of SIM swapping, cybersecurity experts from Check Point Software Technologies have some tips:
For SIM swapping to work, the first thing a cybercriminal needs is your SIM card which can be obtained through impersonation. To get a duplicate of the victim’s card, all they need is their personal data like your full name, ID proof, phone number etc.. Then they can get in touch with your mobile services operator over the phone or internet or by actually visiting a physical store. Impersonating the victim can be very easy if the mobile operator is not vigilant about verifying the identity of the user to whom the original SIM card was issued. If precautions are not taken in regards to issuing another SIM, then it becomes quite easy for someone with an ill intent to harm you via SIM swapping.
So, the next thing a cybercriminal does after procuring a duplicate SIM is to put it into another device. Doing this gets them access to all the data on the victim’s original SIM like call logs and message history. Now, even if you think that for a banking transaction or transfer to happen, the OTP is needed which only you will get, you are wrong. Also, cybercriminals can even know your banking details and transfer your money to some other account.
SIM swapping: Tips to stay safe
To stay safe from the threat of SIM swapping, cybersecurity experts from Check Point Software Technologies have some tips:
- The most important thing to note is to check if you have lost your mobile signal. Whenever a duplicate SIM gets inserted, the victim’s SIM card completely loses the mobile signal as it loses its network access and hence, cannot be used to call or send a text message. If such a thing happens, contact the authorities at once and ask them to deactivate your SIM.
- You have to be very cautious about what personal information you are giving to some website. Try not to give your personal details on just any website and keep it to a bare minimum.
- Before entering your personal details on any website, please check whether the website is a safe and trusted one.
- Plus, you have to make sure that the link is of the correct website only by checking if the connection is a secure one (padlock symbol in the address bar, URL starts with https://, etc.)
- Be aware of phishing emails and look out for some of the tell-tale signs of one like spelling errors, incorrect domain name, suspicious email attachments, etc.
For all the latest Technology News Click Here
For the latest news and updates, follow us on Google News.
Denial of responsibility! TechNewsBoy.com is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – [email protected]. The content will be deleted within 24 hours.