SIM HIGHJACKERS: HOW CRIMINALS ARE STEALING MILLIONS BY HIGHJACKING PHONE NUMBERS

A news release from Europol on 13 March was concerned with “SIM swapping”.  It explains that SIM swap fraud is committed when a fraudster dupes the victim’s mobile phone operator into porting the victim’s mobile number to a SIM in the possession of the fraudster and so starts receiving any incoming calls and text messages, including banking one-time-passwords which are sent to the victim’s phone number.  The fraudster can then perform transactions, using credentials gathered by other techniques such as malware, and when the bank sends a one-time-password via SMS, the fraudster receives it and completes the authorisation of the transaction.  It goes on to say that police across Europe has been gearing up against this threat, with 2 operations targeting SIM highjackers coming recently to fruition – in Spain and in Romania/Austria.  Finally, the news release provides some tips on how to avoid being a victim of this type of fraud.

https://www.europol.europa.eu/newsroom/news/sim-highjackers-how-criminals-are-stealing-millions-highjacking-phone-numbers

SIM

If you’d like to help me buy that (badly needed) new laptop or, even better, a new desktop to replace the one now 5,000 miles away – https://www.buymeacoffee.com/KoIvM842y

Author: raytodd2017

Chartered Legal Executive and former senior manager with Isle of Man Customs and Excise, where I was (amongst other things) Sanctions Officer (for UN/EU sanctions), Export Licensing Officer and Manager of the Legal-Library & Collectorate Support Section

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: