IZULAT Info : What is SIM Take-Over? - IZULAT

News & Information

test banner

Post Top Ad

Responsive Ads Here

Monday, March 14, 2022

IZULAT Info : What is SIM Take-Over?

 

A SIM or Subscriber Identity Module or Subscriber Identification Module or simply called “SIM Card” is a card inserted in a cellular phone within it the cellular number but lately, news of SIM take -over happens. The question is how is that happen how can one hack and hijack one’s cellular number or SIM?


SIM take -over is when someone is pretending to be you and trying to transfer your SIM number into another SIM number or trying to convince the telco to port your SIM into another one through what is called “social engineering technique”. I t is hijacking and hacking your SIM and all your personal information and once the fraudster got it, it can gain access to your account for example your bank account and e-mail address. It is getting one’s SIM into one’s possession. It is also called SIM swapping. All the text messages, calls, and others that is supposed to be received into your SIM will be transfer into fraud SIM, thus called “SIM take-over” or “SIM swapping” or “SIM hijacking” and from then the fraud SIM can gain access to your personal information.


What is “Social Engineering Technique”?


Social engineering technique is a manipulating technique or strategy or manipulation tactic to gain private information, valuables, and access through human error exploitation or through one’s error to be convinced.


We are issuing this advisory as a reminder to be vigilant, as always, from being a victim of SIM swapping, when cybercriminals try to transfer the mobile number of an existing SIM to another SIM in their possession. 

If successful, all text messages (SMS) and calls that are supposed to be received by the existing SIM will be routed to the new SIM card. The cybercriminals can then use the harvested data to hack banking, email, and other online accounts. “ (SMART)





No comments:

Post a Comment

Post Bottom Ad

Responsive Ads Here