Source: THE HINDU
Disclaimer: Copyright infringement not intended.
Context:
- Caller ID spoofing is a technique used by malicious individuals to falsify the phone number and/or name displayed on the recipient's caller ID.
Details:
About Caller ID Spoofing:
Caller ID spoofing is a cybercrime technique where malicious actors manipulate the displayed phone number on the recipient’s caller ID to appear as though it is coming from a trusted source. This practice is increasingly being used for fraudulent activities, such as scamming individuals and businesses.
Mechanism of Caller ID Spoofing
- Acquisition of Target Number: Cybercriminals often acquire the phone number of the person they want to impersonate through various means, including the dark web.
- Spoofing Tools: They use special software or applications, often available on the dark web, to alter the caller ID information that appears on the recipient’s phone.
- Communication: The spoofed call appears to be from a legitimate or familiar number, making the victim more likely to answer and trust the caller.
Case Study: Andhra Pradesh Incident
In Andhra Pradesh, a group of youngsters used caller ID spoofing to impersonate the Chief Minister’s personal assistant. They managed to collect about ₹15 lakh before being apprehended.
Methodology:
- The miscreants obtained the PA’s phone number through dark web hackers.
- They also used spoofed voice samples of the PA to gain the trust of the victims.
Implications of Caller ID Spoofing
- Financial Fraud: As illustrated by the Andhra Pradesh incident, spoofing can lead to significant financial losses.
- Trust Erosion: Repeated spoofing incidents can erode public trust in communication systems, making individuals wary of legitimate calls.
- Cybersecurity Challenges: Spoofing adds complexity to cybersecurity efforts, as it involves the manipulation of digital communication channels.
Prevention and Countermeasures
- Technological Solutions: Implementation of caller ID authentication systems such as STIR/SHAKEN (Secure Telephone Identity Revisited/Signature-based Handling of Asserted Information Using toKENs).
- Telecom companies are investing in spoof detection technologies.
- Legislation and Regulation: Governments worldwide are instituting laws to combat caller ID spoofing.
- For instance, the U.S. has enacted the TRACED Act (Telephone Robocall Abuse Criminal Enforcement and Deterrence Act).
- Public Awareness: Raising awareness about the risks and signs of spoofed calls can help individuals avoid falling victim to scams.
MUST READ ARTICLES:
Cybercrime
TYPES OF CYBERCRIME
DARK NET
Personally Identifiable Information
Cyber attacks
Source:
https://epaper.thehindu.com/ccidist-ws/th/th_international/issues/92859/OPS/GVUD4DAHH.1.png?cropFromPage=true
https://www.financialexpress.com/tech/cybersecurity/caller-id-spoofing-a-rising-threat/
PRACTICE QUESTION
Q. Examine the technique of Caller ID spoofing, its mechanism, and the implications it has for cybersecurity and public trust. Explain with a relevant case study and suggest measures to prevent and counteract this cybercrime.
|