Open in App
  • Local
  • U.S.
  • Election
  • Politics
  • Sports
  • Lifestyle
  • Education
  • Real Estate
  • Newsletter
  • The US Sun

    Criminals can break into your phone in ‘SIM swapping’ attack without device leaving your hands – three ways to stop it

    By Mackenzie Tatananni,

    2024-08-07

    ANDROID and iPhone users must be wary of ‘SIM swapping’ attacks, in which a hacker infiltrates a device without ever touching it.

    Cybercriminals can take control of your smartphone and crack into your online accounts in one fell swoop.

    https://img.particlenews.com/image.php?url=39UIus_0uqW0pxX00
    Android and iPhone users should know the signs of damaging ‘SIM swapping’ attacks, where a criminal convinces a mobile carrier to reassign a phone number
    Getty

    SIM is an acronym for “Subscriber Identity Module.” A SIM card is a memory chip that contains unique identifiers like your number, cellular plan, and the contents of your smartphone.

    What makes ‘swapping’ attacks so dangerous is that they happen remotely.

    After gleaning your phone number and private information from a data leak, a hacker can convince your mobile carrier to reassign your number to a new SIM card.

    The criminal can then access your phone’s data and change your credentials to lock you out of your online accounts.

    Despite the covert nature of these attacks, there are warning signs that you may have fallen victim.

    Your carrier may send a notification text alerting you that your SIM card has been deactivated, which is the clearest warning sign.

    Additionally, if your phone no longer connects to the cellular network and can’t make calls, text, or access the internet, TKTK

    To avoid being a victim of these devastating attacks, start by ensuring your personal information is as secure as possible.

    One helpful step is setting up multi-factor authentication, or MFA, on applications and accounts that allow it.

    MFA requires you to prove your identity in two or more ways before accessing your accounts.

    This may entail sending a passcode to your phone or email address or using a biometric identifier like a fingerprint.

    It is also important to watch out for any attempts to steal your data or breach your accounts

    Criminals commonly purloin information like social security and credit card numbers through phishing attacks.

    You’ve likely heard of phishing, where scammers dupe unsuspecting victims into doling out personal information.

    These criminals often exert psychological pressure on their targets, ramping up the pressure to make them act quickly and irrationally.

    https://img.particlenews.com/image.php?url=3MRKtv_0uqW0pxX00
    Red flags include being unable to access your cellular network and receiving a text from your carrier warning that your SIM card is no longer active
    Getty

    Be wary of messages from people and organizations you don’t know. Double-check the sender’s address for typos and other clues like numbers in place of letters.

    You should also scan the message itself – are there grammatical mistakes? Does it make sense, or is it meant to trigger an immediate reaction?

    As a general rule, delete messages from unknown senders and avoid clicking unfamiliar links, as these can download malware onto your device.

    How are scammers finding my number?

    https://img.particlenews.com/image.php?url=3et7bm_0uqW0pxX00

    Here Mackenzie Tatananni , science and technology reporter at The U.S. Sun, breaks down ways a scammer may get your information.

    Scammers commonly get phone numbers from data breaches, which occur when a hacker accesses a private database – often those maintained by companies like service providers and employers.

    This information may be shared and circulated online, including on the dark web, where there are forums dedicated to sharing leaked information.

    Another common technique called wardialing employs an automated system that targets specific area codes.

    A recorded message will instruct the listener to enter sensitive information, like a card number and PIN.

    There is also a far more harrowing possibility: your phone number could be listed online without your knowledge.

    Data brokers are hungry to buy and sell your information. These companies gather information from various public sources online, including social media and public records

    Their primary goal is to build databases of people and use this information for tailored advertising and marketing.

    Much of this information ends up on public record sites, which display information like your phone number, email, home address, and date of birth for anyone to see.

    In the United States, these sites are legally required to remove your information if you request it.

    Locate your profile and follow the opt-out instructions, but be warned – these sites do not make it easy and intend to frustrate you out of completing the deregistration process.

    For simplicity’s sake, you can also use a tool to purge your information from the Internet.

    Norton offers one such service. Called the Privacy Monitor Assistant, the tool finds info online and requests removal on your behalf.

    It is also possible that your phone number may be linked to a social media account and publicly displayed on your profile – this happens quite frequently with Facebook.

    Be sure to review your privacy settings and confirm this information is hidden away from prying eyes.

    Lastly, it is worth using a password manager instead of saving passwords directly to your browser.

    Google Chrome, for instance, will ask if you want it to “remember” your credentials when you sign in.

    While the convenience may seem tempting, the risk greatly outweighs the benefits . If a cybercriminals manages to breach your account, this information will be readily available.

    Entrust your passwords to a password manager instead. This service encrypts your credentials to keep them safe from prying eyes.

    Expand All
    Comments / 13
    Add a Comment
    erica von schimpf
    18d ago
    If you have a E-Sim they can’t swap it out.
    David Morgan
    08-08
    go ahead. I have nothing worth on my phone so I ain't worry about it
    View all comments
    YOU MAY ALSO LIKE
    Local News newsLocal News
    tweaklibrary.com12 days ago

    Comments / 0