Free Courses Sale ends Soon, Get It Now
Source: The Hindu
Disclaimer: Copyright infringement not intended.
Context:
Details:
What is a SIM?
About SIM Swapping
SIM swapping is a sophisticated form of identity theft where cybercriminals manipulate mobile carriers to port a victim’s phone number to a SIM card they control.
Once successful, the attacker receives all calls, messages, and two-factor authentication (2FA) codes meant for the victim. This gives them access to personal information, financial accounts, and other sensitive data.
The FBI Internet Crime Complaint Center reports that SIM-swapping complaints have increased more than 400% from 2018 to 2021, with associated personal losses estimated to be more than $68 million.
The Modus Operandi
What are the signs of a SIM swap attack?
Sign |
Description |
Action |
Strange notifications |
●Texts or calls about unexpected service changes. |
●Contact the service provider immediately. |
No phone service |
●Sudden loss of ability to make/receive calls, texts, or use data. |
●Confirm with service provider if a swap occurred. |
Unusual social media posts |
●Posts on social media profiles not created by the account owner. |
●Check for unauthorized access and secure accounts. |
Account lockouts |
●Sudden inability to access bank accounts, social media profiles, or emails. |
●Investigate and secure affected accounts. |
Unexpected transactions |
●Suspicious transactions on bank or credit card statements. |
●Report and investigate with financial institutions. |
Preventative Measures:
Smart Online Habits |
●Adhere to basic online safety rules, avoid phishing emails, suspicious links, and sharing sensitive information online. |
Secure Phone Accounts |
●Set unique passwords, PIN codes, and security questions for phone accounts to enhance security. |
Use Authentication Apps |
●Prefer secure apps for two-factor authentication instead of phone numbers to reduce SIM hijacking risk. |
Ask for Call-Backs |
●Request banks or service providers to call the registered number for any account changes to prevent fraud. |
Avoid Linking to Phone Number |
●Use alternative methods for account setup and authentication to limit hacker access in case of SIM swap fraud. |
Conclusion
READ IN DETAIL ABOUT THE TOPIC- https://www.iasgyan.in/daily-current-affairs/sim-swap-scam
Source:
PRACTICE QUESTION Examine the phenomenon of SIM swapping as a growing cybercrime challenge in India. Discuss its modus operandi, impact on individuals and businesses, and the measures required to prevent and mitigate its consequences. |
© 2024 iasgyan. All right reserved