Request the mobile operator to block the SIM Here the fraudsters approach the mobile operator with a fake ID proof with details collected from you and ask them to block the existing SIM on the pretext that the mobile is lost or hacked.The porting request is done on various pretexts like mobile being lost, stolen, broken etc., After convincing the operator, they request for porting the mobile number to the new SIM card. Request mobile operator to port the number to new SIM In this approach, after collecting your personal details the fraudsters calls the service provider or mobile operator, impersonating you and giving your details by answering relevant identification queries.The fraudster may carry out this step in the following ways:
FREE CELL PHONE CLONING APP SOFTWARE
Malware or software attacks to hack into your device.Smishing or fake text messages (SMS) to collect information.Vishing or fake calls to collect personal details.Phishing or sending fraudulent mails to collect your personal information.The fraudster employs various digital social engineering techniques to extract your personal information, they include. What is the Modus Operandi of SIM Swapping usually followed by fraudsters? A SIM, stores user data in Global System for Mobile (GSM) phones, without a SIM card, GSM phone will not be authorized to use a mobile network. It is by managing to register a new SIM card with your current mobile details that the fraudster resorts to SIM swapping fraudĪ Subscriber Identity Module (SIM) is a chip in your mobile phone, which tells your device which cellular network to connect to, and which phone number to use. Having control over your cell phone number or mobile SIM, will enable the scamster/fraudster to have access to your OTPs, PIN numbers and authentication text messages (SMS), which gives them access to your valuable and sensitive personal and financial information to commit frauds. Why do fraudsters resort to SIM swapping and how does it affect you? The cybercriminal gains access to your sensitive personal and financial related information through this fraud. SIM Swapping also known as SIM splitting, SIM jacking, SIM hijacking is basically taking over the control of your mobile operations from your existing SIM to another SIM, that is in control of the cyber fraudster. SIM Swapping and Cloning are online scamming methods in which the fraudsters gain control over your phone number and your mobile is compromised. Mobile SIM swapping and SIM cloning are two such kinds of cyber frauds, being practiced by fraudsters for cheating the mobile subscribers. This wide spread prevalence and usage of mobile technology, has lured the cyber criminals to resort to new and sophisticated ways of committing cybercrimes and frauds. The mobile phone has revolutionized communication and enabled transaction of every kind possible at the click of button. With the help of a mobile phone, the technology has made everything available on the go for us. In the current age we are living in a parallel virtual world where mobile phones have become an integral part.