Cybercriminals aim to send verification codes to mobile phones during the multi-factor authentication process, so they can easily access apps that allow profit and instant earnings (eg home-banking): the scam is called “SIM swapping”. Here’s what it is, how it occurs, and three tips to stay away from it.
The victim, in this case, is us Sim: Cybercriminals create a fake – or a clone – So that you can control all web services provided through apps and portals They need us Telephone number Send us a small message Warning or a Notice “Call-to-action” (ie: a communication asking us to perform a specific operation).
This is the defining cyber-criminal incident.”SIM Swap“- Less Known Than Notorious”fishing“And, also for this reason, more prevalent and trendy – even focused Federal Bureau of Investigation US (FBI) which through an official statement informed the telephone companies and users about the alarming increase in cases between 2020 and 2021, 12 million Dollar losses in the first year are about six times those in the second year or more 68 million dollar
The world’s most important cyber security company, CHECK POINT SOFTWARE TECHNOLOGIES LIMITEDDecided to contact the company and users directly to provide suggestions Three tips With the dual purpose of making people aware of the phenomenon and implementing simple strategies to better protect themselves: let’s look at them together.
Three tips to stop SIM swapping by Check Point Softwares Technologies Ltd
Tip 1: Be careful Personal information We need to clone the sim. The essentials are: Name and designation, Telephone number e Identity card no. When a hacker has it, he can contact our company and impersonate us easily. So pay maximum attention to the websites you visit, make sure they are officialthey are secure And there is one Security Certificate is valid and active (checked by the padlock icon) and the protocol used ishttps (and no, attention, only http).
Tip 2: Phishing is still with us, especially through email and text messages. Even if the sender appears familiar and familiar to us, even a friend or family member, we pay attention to their possible presence misspellingone’s Different conversation styles From normal, let’s check it domain Used and, in the case of links and attachments, let’s make sure they are authentic, for example Contact the sender directly and to verify that the remittance was made by him or her.
Tip 3: suddenly We miss the reception signal? But should the line be taken naturally? Then maybe we are victim of sim swapping attack. so We immediately contact our mobile operator To verify the situation and get necessary advice for further operations, such as intervention requests Competent Authority.
Source: www.tomshw.it