IPS NEWS

“SIM Hijacking” a Growing Global Concern

While cell phones have had a profound effect on how humans all across the globe communicate and get their information, the convenience that comes with the little hand-held digital devices can also give way to nefarious telecommunications crimes that can cause real headaches not only for phone owners but also their service providers.

Says the legal professionals at Silver Miller Law located in the U.S., “Sim hijacking,” “SIM swapping,” or “SIM Swap Fraud,” is a rapidly growing global telecommunications crime that doesn’t require much more than a Google search, an electronic impersonation of the victim, and a willing phone carrier representative. When an unauthorized person is granted access to a wireless account, it not only costs the phone owner his or her precious personal information and financial assets, but the phone service bears the legal burden.

That said, SIM hijacking is becoming a problem that must be swiftly dealt with. According to a recent report by Microsoft, when a criminal SIM hijacks your phone, they not only get control of your phone number but also your two-factor authentication, which allows them to gain access to your social media accounts, your bank accounts, and even your crypto accounts.

Two factor-authentication while effective in protecting your privacy doesn’t work 100 percent of the time. That’s because two-factor authentication automatically entails providing your phone number to receive unique codes, which must be used every time you log in after entering your username and password.

Codes can also be forwarded to your email. In fact, two-factor authentication has become so pervasive and common that hackers now have one more challenge to gain access to your information. That is, they need to get ahold of your cell phone number also.

Defining a SIM card

At base, SIM is the acronym for “subscriber identity module.” Physically speaking, the SIM is a small, pinky fingernail-sized chip that’s inserted inside the mechanical workings of your cell phone. It has a unique string of numbers that are preassigned to it, which will identify the mobile carrier, the phone’s user, and the cell phone’s originating country. The SIM card is directly associated with your cell phone number.

How SIM Hijacking Works

Hijackers and hackers can gain access to your phone number if they make contact with your mobile carrier and are able to convince them to transfer the number to one of the SIM cards they presently own. However, mobile carriers are hesitant to transfer cell phone numbers simply because someone asks. They require more detailed information before that becomes a possibility.

Hijackers will often use social media to collect the personal information they require to answer security questions like your mother’s maiden name or the name of the high school you attended to gain access to your phone number. Or they can use a nefarious tactic called phishing, in which a scammer impersonates an individual or organization to lure you into sharing your personal information, such as passwords and security codes.

Once the hijacker gathers your information, they contact your mobile carrier. If they correctly answer your security questions, there’s a good chance your cell phone number will be transferred to their SIM card. The SIM hijacking will be a success.

Detecting a SIM Hijacking

If you can’t make phone calls or receive or send text messages, you are likely the victim of a SIM hijacking. The reason for this is that hijackers are now in charge of your phone number.

If your phone is giving you a “Searching” or “No Service” message, this is another telltale sign that your phone has been hacked. You’ve also likely been hacked if you are suddenly notified that your phone number is now available on a new device. This is when you need to contact your mobile carrier and your bank to warn them about any suspicious activity that might occur.

Protecting Yourself against SIM Hijacking

Here are some tips on securing your SIM card, along with your personal information, so that you can better protect against SIM hijacking.

Be Careful When Using the Internet

Hijackers will often use phishing techniques to rob you of your personal information. You need to be able to recognize and understand the techniques. Never connect with links from people or organizations you do not know. Keep in mind that banks and phone carriers will not ask you for your sensitive information via your email account.

It’s also a good idea to make your social media accounts private so that scammers cannot get at your most sensitive material and, therefore, impersonate you online.

Update your Account Security Regularly

Mobile carriers in the 2020s will allow customers to establish a special PIN number that must be entered to make any changes to their accounts. Your PIN number should not be anything obvious, such as your birthday, which is likely available on your social media accounts. Create strong passwords for your cell phone account to make it nearly impossible for hijackers to gain access.

Use an Authentication APP

Apps are available that have been engineered to utilize two-factor authentication that’s linked directly to your device, instead of your phone number. This type of authentication will be protected, even if a hijacker is able to intercept your texts and phone calls.

In the end, make sure to sign up for security alerts with your carrier if you wish to protect your cell phone from scammers and hijackers. Remember, once they steal your information, money, and/or crypto, you’ll more than likely never get it back. Don’t fall for the “This could never happen to me” situation. Instead, think of SIM hijacking like this: “It can and will happen to me.” It’s just a matter of time.

Leave a Reply

Your email address will not be published. Required fields are marked *