MUST KNOW

Hackers Are Now Targeting eSIM Profiles To Steal Your Data And Money: Here’s What We Know

https://www.officenewz.com/2020/07/27/इस-कंपनी-ने-शुरू-की-esim-सर्विस/‎(opens in a new tab)

SIM card frauds are common, a major concern and used extensively by hackers but now they are also evolving with the changes in tech.

Read More: Want To Change Your Name, DOB On Aadhaar Card? These Mistakes May Prove Costly

New reports claim these hackers are now relying on eSIM profiles to transfer your primary number to steal data and money. eSIM is the digital version of a SIM card that can be programmed remotely and the bad actors are using this ability to bypass the physical card and gain access to it using an eSIM.

As we all know that mobile numbers can be used to get data of any kind, and these hackers are now using this trick to get easier control over other phones.

The report also quoted, F.A.C.C.T., a Russian cybersecurity firm that has talked about the latest security issue related to eSIMs and the fact that an eSIM can be activated using a QR code, makes them an easy prey.

Read More: BH Series Number Plates Demystified: Who Qualifies, Cost Analysis & Advantages

You might feel that telcos will have a robust mechanism to avoid getting trapped in this fraud but these hackers are aware that having basic information of the owner allows them to clear the authentication steps and make the telcos do tweaks to the account as per their needs.

So, what happens when these bad actors are able to access the phone number? The firm says they will try to steal money from bank accounts and even retrieve personal information through messaging apps. eSIM has predominantly been a secondary option for most people, however, Apple has a eSIM-only iPhone model available in select countries, who should be aware of this fraud and have been advised to safeguard their details.

Read More: Which Documents are Required to Apply for a Credit Card Online?

People must activate two-factor authentication for their accounts, or even consider having these accounts secured with the help of authenticator apps.

Source :
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Most Popular

To Top