Daily Nation Newspaper

MOBILE SIM SWAP SCAM

...scammers basically take over control of your mobile phone’s number

- By BUUMBA CHIMBULU

ASUBSCRIBE­R Identifica­tion Module (SIM) swap scam happens when criminals take over control of your phone by tricking your carrier to connect your phone number to a SIM card in their possession.

These scammers basically take over control of your mobile phone’s number.

A SIM swap scam is a type of identity theft that exploits the SIM system’s biggest vulnerabil­ity.

To steal your number, scammers start by gathering as much personal informatio­n on you as they can find and then engaging in social engineerin­g.

Mobile SIM swap scam has risen in recent years. The fraudster can take over your mobile phone number in a SIM swap scam.

Once they have access to your phone number, they have all your phone calls, text messages, and potentiall­y access to any two-factor authentica­tion linked to your number.

They will pose as you and convince your wireless provider to transfer your number to a new SIM card they control.

Scammers then can then use this informatio­n to commit fraud, such as accessing bank accounts or credit cards.

First, the scammers call your mobile carrier, impersonat­ing you and claiming to have lost or damaged their SIM card which in reality is yours.

They then ask the customer service representa­tive to activate a new SIM card in the fraudster’s possession. This ports your telephone number to the criminal’s device, which contains the scammer’s own SIM card.

Once your carrier completes this request, all phone calls and texts that are supposed to go to you will instead go to the scammer’s device.

A high proportion of banking customers now have mobile phone numbers linked with their accounts, and so this attack is becoming common in countries where this attack was not previously so common.

Unlike mobile malware, SIM scam attacks are usually aimed at profitable victims that have been specifical­ly targeted through successful social engineerin­g.

Usually, someone first becomes aware that they have fallen victim to a sim-swap scam when their phone stops working or they discover they are unable to access bank and credit card accounts.

Sometimes people may get a text message or an email prior to the swap taking place.

SIM swap scam occurs when scammers take advantage of a weakness in two-factor authentica­tion and verificati­on and use your phone number to access your accounts.

This is known as SIM swap fraud, and it means scammers could potentiall­y enter your username and password when logging onto your bank’s website.

The bank will then send a code by text, two-factor authentica­tion, to your smartphone number, a code that you will then have to enter to access your online account.

After a SIM swap, that number now goes to the smartphone or other device possessed by scammers. They can then use that code to enter your bank account.

SIM swapping scam has become one of the emerging threats to mobile banking. Scammers leverage the thumbnail-sized card that activates a cell phone to take over the user’s identity and clean out mobile banking accounts.

Because a user’s device is a central component to enforcing security controls in online banking applicatio­ns, such as sending one-time SMS passcodes as a strong authentica­tion mechanism, most financial institutio­ns place strict measures on how a user can register a new device.

It typically requires that the user be able to receive an SMS to the phone number of record when the account is created.

Some basic practices can help prevent SIM swapping scam, such as asking users to set their PIN on their mobile account to something less obvious than their birthday or the last four digits of their Social Security number.

Financial institutio­ns can also switch to a two-factor authentica­tion method that does not depend on text messaging but uses some other token for identity proofing instead.

That is where a more sophistica­ted approach to identity authentica­tion can stop SIM swapping scams in its tracks. An identity authentica­tor that uses SIM binding, an approach that verifies both the user and the device being used can help.

SIM binding uses a combinatio­n of SIM detection and SMS verificati­on that validates the user’s cell phone number against the one that is registered with the financial institutio­n or employer.

That way, only a customer using the phone number registered to that account can pair their device to an identity authentica­tor to conduct any transactio­ns.

When registerin­g with an authentica­tion app that has SIM binding features, the user must verify their cell phone number; after that, the authentica­tion will deny any attempt to register an unauthoris­ed device or phone number on that account.

It is very important that financial institutio­ns get ahead of SIM abuse because it undermines one of the most reliable sources of trust and authentica­tion they have with digital customers.

Fortunatel­y, you as an individual can protect yourself against SIM swapping.

It is all about preventing scammers from finding out what logins and passwords you use to access your online bank or credit card accounts. And it helps, too, to look out for the most common warning signs of a SIM swap scam.

As with many frauds around bank security, there are simple ways for consumers to avoid being scammed such as not responding to unsolicite­d emails, texts or phone calls.

These may allow attackers to access personal data which can then be used to convince the bank that they are you.

Avoid oversharin­g personal details on social networks as well as putting your birth date, that of children or relatives, the name of your first pet or school, as these are all frequently used as the answers to questions that banks ask.

If your phone stops working normally, inform both your bank and your mobile phone provider.

 ?? ??
 ?? ??
 ?? ??
 ?? ?? Avoid oversharin­g personal details on social networks as well as putting your birth date, that of children or relatives, the name of your first pet or school, as these are all frequently used as the answers to questions that banks ask.
Avoid oversharin­g personal details on social networks as well as putting your birth date, that of children or relatives, the name of your first pet or school, as these are all frequently used as the answers to questions that banks ask.
 ?? ?? These scammers basically take over control of your mobile phone’s number. After a SIM swap, that number now goes to the smartphone or other device possessed by scammers. They can then use that code to enter your bank account.
These scammers basically take over control of your mobile phone’s number. After a SIM swap, that number now goes to the smartphone or other device possessed by scammers. They can then use that code to enter your bank account.

Newspapers in English

Newspapers from Zambia