Search This Blog

Powered by Blogger.

Blog Archive

Labels

About Me

Showing posts with label SIM. Show all posts

Tamil Nadu Police, DoT Target SIM Card Fraud in SE Asia with AI Tools

 

The Cyber Crime Wing of Tamil Nadu Police, in collaboration with the Department of Telecommunications (DoT), is intensifying efforts to combat online fraud by targeting thousands of pre-activated SIM cards used in South-East Asian countries, particularly Laos, Cambodia, and Thailand. These SIM cards have been linked to numerous cybercrimes involving fraudulent calls and scams targeting individuals in Tamil Nadu. 

According to police sources, investigators employed Artificial Intelligence (AI) tools to identify pre-activated SIM cards registered with fake documents in Tamil Nadu but active in international locations. These cards were commonly used by scammers to commit fraud by making calls to unsuspecting victims in the State. The scams ranged from fake online trading opportunities to fraudulent credit or debit card upgrades. A senior official in the Cyber Crime Wing explained that a significant discrepancy was observed between the number of subscribers who officially activated international roaming services and the actual number of SIM cards being used abroad. 

The department is now working closely with central agencies to detect and block suspicious SIM cards.  The use of AI has proven instrumental in identifying mobile numbers involved in a disproportionately high volume of calls into Tamil Nadu. Numbers flagged by AI analysis undergo further investigation, and if credible evidence links them to cybercrimes, the SIM cards are promptly deactivated. The crackdown follows a series of high-profile scams that have defrauded individuals of significant amounts of money. 

For example, in Madurai, an advocate lost ₹96.57 lakh in June after responding to a WhatsApp advertisement promoting international share market trading with high returns. In another case, a government doctor was defrauded of ₹76.5 lakh through a similar investment scam. Special investigation teams formed by the Cyber Crime Wing have been successful in arresting several individuals linked to these fraudulent activities. Recently, a team probing ₹38.28 lakh frozen in various bank accounts apprehended six suspects. 

Following their interrogation, two additional suspects, Abdul Rahman from Melur and Sulthan Abdul Kadar from Madurai, were arrested. Authorities are also collaborating with police in North Indian states to apprehend more suspects tied to accounts through which the defrauded money was transacted. Investigations are ongoing in multiple cases, and the police aim to dismantle the network of fraudsters operating both within India and abroad. 

These efforts underscore the importance of using advanced technology like AI to counter increasingly sophisticated cybercrime tactics. By addressing vulnerabilities such as fraudulent SIM cards, Tamil Nadu’s Cyber Crime Wing is taking significant steps to protect citizens and mitigate financial losses.

India Disconnects 1.77 Crore Mobile Connections Using AI Tools, Blocks 45 Lakh Spoofed Calls

 

The Indian government has disconnected over 1.77 crore mobile connections registered with fake or forged documents using AI-powered tools, according to a recent announcement by the Department of Telecommunications (DoT). The AI-based system has identified and blocked 45 lakh spoofed international calls, preventing them from entering the Indian telecom network. This initiative is part of a larger effort to curb telecom fraud and cybercrime, with four telecom service providers collaborating with DoT to implement a more advanced two-phase system. 

In the first phase, the system blocks spoofed calls at the telecom service provider (TSP) level, targeting those that attempt to use numbers from the provider’s own subscribers. In the second phase, a centralized system will be introduced to tackle spoofed calls using numbers from other TSPs, thereby ensuring more comprehensive protection. The Ministry of Communications announced that this centralized system is expected to be operational soon, enhancing the safety of Indian telecom subscribers. Alongside these efforts, the government has disconnected 33.48 lakh mobile connections and blocked 49,930 mobile handsets, particularly in districts considered to be cybercrime hotspots. About 77.61 lakh mobile connections exceeding the prescribed limits for individuals were also deactivated. 

The AI tools have further enabled the identification and blocking of 2.29 lakh mobile phones involved in fraudulent activities or cybercrime. Additionally, the DoT traced 12.02 lakh out of 21.03 lakh reported stolen or lost mobile phones. It also blocked 32,000 SMS headers, 2 lakh SMS templates, and 20,000 entities engaged in malicious messaging activities, preventing cybercriminals from sending fraudulent SMSs. Approximately 11 lakh accounts linked to fraudulent mobile connections have been frozen by banks and payment wallets, while WhatsApp has deactivated 11 lakh profiles associated with these numbers. 

In an effort to curb the sale of SIM cards issued with fake documents, 71,000 Point of Sale (SIM agents) have been blacklisted, and 365 FIRs have been filed. These measures represent a significant crackdown on telecom-related cybercrime, demonstrating the government’s commitment to making India’s telecom sector more secure through the use of advanced technology. The upcoming centralized system will further bolster this security, as it will address spoofed calls from all telecom providers.

Sandton Police Raid Uncovers Massive Counterfeit SIM Card Operation

 


In response to a tip-off about suspicious activities occurring at a Sandton home, the South African Police Service (SAPS) took action. Upon receiving this information, members of the Gauteng Organised Crime Investigation Unit operationalised the intelligence as soon as possible and raided the residence. It was discovered by the police officers upon their arrival that over 40 people, ranging in age from 17 to 36, were occupying the property. They are suspected illegal immigrants who are suspected to be living there illegally. There was a garage and a backroom at the house that were bursting with SIM cards from all of South Africa's mobile networks after a thorough search of the house. 

It is believed that the SIM cards were produced using a substantial number of computers that were found along with them. Various mobile network technicians were summoned at the scene of the discovery to verify the authenticity of the SIM cards that were discovered. As a result of their evaluation, the police were able to identify that the SIM cards were in fact counterfeit, highlighting the seriousness of the incident. Police arrested 43 suspected illegal immigrants, along with two South African nationals. Their alleged crimes are serious in nature and are backed by serious charges. 

There are some of them that are alleged to have violated the Cyber Crime Act, committed fraud, and violated immigration laws in violation of these laws. The SAPS have stated that it is likely that even more suspects will be apprehended as the investigation continues. The raid has resulted in a significant number of arrests, but the investigation is far from over. It is the goal of the investigation to dismantle the entire network behind this operation and identify any additional actors involved, and the aim is to dismantle the entire network. There was a garage and backroom in the premises that was filled with thousands of counterfeit Sim cards from all major South African mobile networks, according to the search. Among the other things that were found by investigators were a variety of computers, printers, and other equipment that was used to fabricate the fake cards. 

A preliminary investigation indicates that all of the cards were produced on-site, using advanced technology to replicate the cards of legitimate networks. According to the reports, counterfeiters are selling fake SIM cards to unsuspecting customers who then use the Sim cards to make calls, send texts, and access mobile data without any suspicion being discovered. It is alleged that two South Africans have contravened the Cyber Crime Act 19 of 2020, conspired to commit fraud, and migrated illegally to the United States. There are reportedly 41 more suspects in the investigation, all of whom are the result of illegal immigrants who are reportedly in South Africa without a visa. 

Deportation proceedings are currently underway against them. The seized items were examined by technicians from several mobile network providers in order to get an idea of what they were worth. It has now been confirmed that they were indeed imitation SIM cards, which were likely to be used for fraudulent purposes and cybercrime. At the scene of the incident, a total of 43 suspected illegal immigrants, two South Africans, and one South American were arrested. There are multiple charges against them, including contraventions of the Cyber Crime Act, fraud and illegal immigration, all of which are currently being investigated.

It appears that the arrests might not come to an end as a spokesperson for Gauteng Organised Crime Investigation Unit suggested. There are many ways in which criminals exploit digital vulnerabilities to take advantage of the vulnerabilities of organizations, and this operation highlights the growing issue of cybercrime. Furthermore, the article points out that vigilant law enforcement is vital to combating these types of crimes, as is the role that community intelligence plays in assisting law enforcement. In light of this significant operation, the SAPS has reaffirmed its commitment to combatting cybercrime and illegal immigration. This raid underscores the critical importance of community involvement in identifying and reporting suspicious activities, enabling law enforcement agencies to act swiftly and decisively. 

The ongoing investigation aims to unearth the full extent of the counterfeit SIM card network and bring all involved parties to justice. As the investigation continues, the SAPS has called on the public to remain vigilant and report any information that may aid in dismantling similar operations. This case serves as a stark reminder of the evolving nature of cybercrime and the relentless efforts required to safeguard the nation's digital infrastructure. The SAPS assures the community that it will continue to prioritize such cases and uphold the rule of law to protect the integrity of South Africa's telecommunications networks. 

The successful raid and subsequent arrests highlight the effectiveness of coordinated efforts between law enforcement and mobile network providers. Together, they strive to mitigate the risks posed by cybercriminals and ensure the safety and security of all citizens.

eSIM Connections: Redefining Mobile Service and Flexibility

 


This eSIM management technology will have a significant impact on the IoT, as it represents an evolution from physical SIM cards to virtual SIM cards, which will have the greatest impact on its acceptance. Mobile network operators (MNOs), who are well-positioned to play a key role in facilitating the growth of the exploding IoT market, have established a solid and reliable management solution for embedded subscriber identity modules. 

Furthermore, MNOs can create new and convenient journeys for consumers using mobile devices. The mobile industry is facing a transformative period in the coming years, especially concerning eSIMs, which have been the subject of new research which sheds some light on how eSIMs will be transformed. An eSIM ecosystem offers the same security and protection that a removable SIM card provides. A public key infrastructure (PKI) governed by the GSMA provides secure authentication of entities of the ecosystem. 

The protocols are based on state-of-the-art cryptographic mechanisms and are guaranteed to protect the end user's privacy. There is a GSMA certification process required for manufacturers and providers of eSIM solutions to be admitted into the ecosystem. As a result of the switch from physical SIM cards to eSIM cards, CCS Insight believes that the consumer will have more powerful control over their subscriptions by interacting differently with their network providers. 

There are currently only 150 million people worldwide who use eSIMs, compared to 8.9 billion people who subscribe to mobile phones. This study says, however, that all of this is expected to change by the year 2023, despite a very small share of the global mobile market. The CCS Insight study predicts that, as digital-only network connections become increasingly popular, the number of phones with eSIMs will nearly double, from 27% in 2023 to 56% by 2028, as a result of this growing trend. There are more than 150 million eSIM customers in North America, which accounted for more than half of the adoption curve. 

According to the report, this is the result of Apple's decision to only provide eSIM-enabled devices since the iPhone 14 was introduced in September 2022. Around the world, approximately 800 operators are supporting eSIM devices. Kester Mann, CCS Insight Director of Consumer and Connectivity, made the point that removing that small piece of plastic from your phone will improve your digital customer journey, attract new customers, and have environmental benefits as a result of eliminating that little piece of plastic. In addition to praising the roaming benefits of eSIM cards, the report highlights the ability of customers to sign up for cheaper plans before travelling or while travelling using these devices. 

While this revolution has many advantages, it also has a lot of limitations, which can lead to a lack of education in this field. CCS Insights conducted a survey in which more than 5,000 people across the UK, the US, Germany, Spain and Australia were asked whether they had heard of the eSIM or not. Only four out of ten had heard of it. There is nothing better than being able to offer a convenient and fully digital user experience to consumers. As a result of this, extra target groups can now be acquired by completely new customer acquisition journeys. 

Furthermore, in addition to fostering the development of innovative devices and services, eSIM technology has also played a significant role in the development of more attractive contracts that cover multiple devices. IoT (Internet of Things) is considered one of the fastest-growing sectors of the IoT economy today, and it includes sensors, processors, systems, and platforms used by industries to improve their operational efficiency to compete more effectively. 

IoT devices, including sensor modules, logistics tracking systems, and manufacturing equipment, greatly benefit from mobile connectivity and predominantly utilize eSIMs. Embedded Subscriber Identity Modules (eSIMs) significantly simplify the deployment and lifecycle management of these sensors, enhancing efficiency and effectiveness. The management of eSIMs facilitates new, fully digital user journeys, allowing eSIM profiles to be seamlessly installed on devices with minimal user interaction. This convenience is particularly beneficial for activating consumer IoT devices that lack displays, but it also extends to any eSIM-enabled devices, such as smartphones or tablets. 

The GSMA eSIM Discovery Service enhances this frictionless customer experience both in-store and out-of-store, providing a streamlined and user-friendly process for eSIM activation and management. The integration of eSIM technology in IoT devices not only optimizes the rollout process but also ensures efficient lifecycle management. This advancement underscores the transformative impact of eSIMs in the mobile market, promoting a more connected and streamlined experience for users across various devices and applications. In conclusion, the adoption of eSIM technology is set to revolutionize the mobile industry and the IoT sector. 

With its streamlined deployment, enhanced lifecycle management, and fully digital user journeys, eSIMs are paving the way for a more flexible and efficient mobile experience. As consumer awareness and adoption grow, supported by the robust infrastructure and security provided by MNOs and the GSMA, eSIMs will play a crucial role in shaping the future of mobile connectivity. This evolution promises not only to enhance user convenience but also to drive the development of innovative devices and services, ultimately transforming the digital landscape.

Revolutionizing Connectivity: The Rise of iSIMs in the Mobile Industry

 

The mobile industry is on the verge of a groundbreaking transformation, spearheaded by the advent of integrated SIMs, or iSIMs. According to a new report from Juniper Research, the number of iSIMs in connected devices is expected to soar from 800,000 in 2024 to more than 10 million by 2026. This staggering 1,200% increase is anticipated to be driven by the release of the GSMA's SGP.41/42 specifications by the end of 2025. These specifications aim to standardize and streamline the rollout of iSIM-enabled devices, thereby enhancing their accessibility and adoption. 

An iSIM, also known as an Integrated Universal Integrated Circuit Card (iUICC), represents an evolution of the eSIM (embedded SIM) technology by integrating directly into the device’s processor. This innovation eliminates the need for a separate SIM module, heralding a future where traditional SIM cards are rendered obsolete and networks can preload plans onto devices during the manufacturing process. The GSMA's SGP.41/42 specifications will facilitate In-factory Profile Provisioning (IFPP), allowing iSIM profiles to be uploaded onto devices during production. This capability simplifies the process for both manufacturers and consumers by enabling devices to be shipped with pre-configured cellular connectivity.  

Despite the optimistic forecast, Juniper's report points out that the absence of an industry-wide standard for iSIM technology could pose challenges. Without an official standard, manufacturers might be reluctant to launch iSIM solutions. Elisha Sudlow-Poole, the author of Juniper Research’s report, emphasizes the need for eSIM vendors to develop standard-agnostic platforms that can adapt to various form factors, standards, and use-case requirements. Furthermore, eSIM vendors must cultivate trusted partnerships with manufacturers to ensure the widespread adoption of iSIM connectivity services once they become sought after in the market. 

Juniper's study projects that the number of iSIM connections will surge to 210 million globally by 2028. This growth will be fueled by the adoption of iSIM technology in sectors such as smart energy meters and remote logistics, where there is a demand for power-efficient and compact devices. As these and other industries recognize the advantages of iSIM technology, the mobile industry's landscape will continue to evolve, ushering in a new era of connectivity and convenience. 

The shift to iSIMs represents a significant milestone in the evolution of the mobile industry, promising improved efficiency, security, and user experience. With the expected release of standardized guidelines and the increasing adoption of iSIM technology, the coming years are likely to witness profound changes in how devices connect to networks, ultimately benefiting both consumers and businesses. This transition underscores the mobile industry’s commitment to innovation and its dedication to enhancing connectivity solutions for a rapidly advancing digital world.

Inside Job Exposed: T-Mobile US, Verizon Staff Solicited for SIM Swap Scam

 


T-Mobile and Verizon employees are being texted by criminals who are attempting to entice them into swapping SIM cards with cash. In their screenshots, the targeted employees are offering $300 as an incentive for those willing to assist the senders in their criminal endeavours, and they have shared them with us. 

The report indicates that this was part of a campaign that targets current and former mobile carrier workers who could be able to access the systems that would be necessary for the swapping of SIM cards. The message was also received by Reddit users claiming to be Verizon employees, which indicates that the scam isn't limited to T-Mobile US alone. 

It is known that SIM swapping is essentially a social engineering scam in which the perpetrator convinces the carrier that their number will be transferred to a SIM card that they own, which is then used to transfer the number to a new SIM card owned by the perpetrator. 

The scammer can use this information to gain access to a victim's cell phone number, allowing them to receive multi-factor authentication text messages to break into other accounts. If the scammer has complete access to the private information of the victim, then it is extremely lucrative. 

SIM swapping is a method cybercriminals utilize to breach multi-factor authentication (MFA) protected accounts. It is also known as simjacking. Wireless carriers will be able to send messages intended for a victim if they port the victim’s SIM card information from their legitimate SIM card to one controlled by a threat actor, which allows the threat actor to take control of their account if a message is sent to the victim. 

Cyber gangs are often able to trick carrier support staff into performing swaps by presenting fake information to them, but it can be far more efficient if they hire an insider to take care of it. In the past, both T-Mobile and Verizon have been impacted by breaches of employee information, including T-Mobile in 2020 and Verizon last year, despite it being unclear how the hackers obtained the mobile numbers of the workers who received the texts. 

The company stated at the time that there was no evidence that some of the information had been misused or shared outside the organization as a result of unauthorized access to the file, as well as in 2010 a Verizon employee had accessed a file containing details for about half of Verizon s 117,00-strong workforce without the employee's authorization.

It appears that the hackers behind the SIM swap campaign were working with outdated information, as opposed to recent data stolen from T-Mobile, according to the number of former T-Mobile employees who commented on Reddit that they received the SIM swap message. As the company confirmed the fact that there had not been any system breaches at T-Mobile in a statement, this was reinforced by the company. 

Using SIM swap attacks, criminals attempt to reroute a victim's wireless service to a device controlled by the fraudster by tricking their wireless carrier into rerouting their service to it. A successful attack can result in unauthorized access to personal information, identity theft, financial losses, emotional distress for the victim, and financial loss. Criminals started hijacking victims' phone numbers in February 2022 to steal millions of dollars by performing SIM swap attacks. 

The FBI warned about this in February 2022. Additionally, the IC3 reported that Americans reported 1,075 SIM-swapping complaints during the year 2023, with an adjusted loss of $48,798,103 for each SIM-swapping complaint. In addition to 2,026 complaints about SIM-swapping attacks in the past year, the FBI also received $72,652,571 worth of complaints about SIM-swapping attacks from January 2018 to December 2020. 

Between January 2018 and December 2020, however, only 320 complaints were filed regarding SIM-swapping incidents resulting in losses of around $12 million. Following this huge wave of consumer complaints, the Federal Communications Commission (FCC) announced new regulations that will protect Americans from SIM-swapping attacks to protect Americans from this sort of attack in the future.

It is required by the new regulations that carriers have a secure authentication procedure in place before they transfer the customer's phone numbers to a different device or service provider. Additionally, they need to warn them if their accounts are changed or they receive a SIM port out request.

TRAI Updates Regulations to Prevent SIM Swap Fraud in Telecom Porting

 

The Telecom Regulatory Authority of India (TRAI) recently announced updated regulations aimed at combating SIM swap fraud in the telecom sector. According to the new regulations, telecom subscribers will be prohibited from porting out of their current network provider if they have recently "swapped" their SIM card due to loss or damage within the past seven days. 

This amendment is intended to prevent fraudulent activities by disallowing the issuance of a "unique porting code" (UPC), which is the initial step in changing providers using mobile number portability. 

The TRAI highlighted that this measure is part of its broader efforts to address concerns related to fraudulent and spam calls, which have been on the rise in recent years. In addition to SIM swap fraud, spam calls and messages have become a significant nuisance for telecom subscribers, leading to increased efforts by regulatory authorities to combat such activities. 

Previous anti-spam measures undertaken by TRAI include the establishment of a do-not-disturb registry, the release of an app for filing complaints against telemarketers, and the enforcement of regulations on transactional SMS messages by businesses. 

However, despite these efforts, fraudulent activities continue to pose challenges for both regulators and consumers. In addition to the prohibition on porting after SIM card swapping, TRAI has recommended to the Department of Telecommunications (DoT) the implementation of a feature that would display the legally registered name of every caller on recipients' handsets. This proposal aims to enhance transparency and enable recipients to identify the origin of incoming calls more accurately. 

However, the proposal has faced criticism on privacy grounds, with concerns raised about the potential misuse of caller identification information. To further address concerns related to fraudulent communication, the DoT has introduced its own portal called Chakshu for reporting suspected fraud communication. This platform allows users to report instances of suspected fraud, helping regulatory authorities to track and investigate fraudulent activities more effectively. 

Furthermore, the TRAI is considering a suggestion from the DoT regarding the verification of subscriber identity during the porting process. Currently, porting requires only the possession of an unblocked SIM, with know-your-customer (KYC) processes conducted anew. This policy has implications for minors and other dependents whose SIMs may not be registered in their names. 

The suggestion to double-check KYC during porting will be examined separately by TRAI. Overall, TRAI's efforts to strengthen regulations in the telecom sector aim to enhance security and protect consumers from fraudulent activities such as SIM swap fraud. By implementing measures to prevent unauthorized porting and enhancing transparency in caller identification, TRAI seeks to safeguard the interests of telecom subscribers in India. However, as fraudsters continue to evolve their tactics, regulatory authorities will need to remain vigilant and adapt their strategies accordingly to stay ahead of emerging threats.

Canadian Telecom Provider Telus is Reportedly Breached

 

One of Canada's biggest telecommunications companies, Telus, is allegedly investigating a system breach believed to be fairly severe when malicious actors exposed samples of what they claimed to be private corporate information online.

As per sources, the malicious actors posted on BreachForums with the intention of selling an email database that claimed to include the email addresses of every Telus employee. The database has a $7000 price tag. For $6,000, one could access another database purported to provide payroll details for the telecom companies' top executives, including the president.

A data bundle with more than 1,000 private GitHub repositories allegedly belonging to Telus was also offered for sale by the threat actor for $50,000. A SIM-swapping API was reportedly included in the source code that was for sale. SIM-swapping is the practice of hijacking another person's phone by switching the number to one's own SIM card.

Although the malicious actors have described this as a Complete breach and have threatened to sell everything connected to Telus, it is still too early to say whether an event actually happened at TELUS or whether a breach at a third-party vendor actually occurred.

A TELUS representative told BleepingComputer that the company is looking into accusations that some information about selected TELUS team members and internal source code has leaked on the dark web.

The Telus breach would be the most current in recent attacks on telecom companies if it occurred as the malicious actors claimed. Three of the biggest telecommunications companies in Australia, Optus, Telestra, and Dialog, have all been infiltrated by attackers since the beginning of the year.

Customer data was used in a cyberattack that affected the Medisys Health Group business of Telus in 2020. The company claimed at the time that it paid for the data and then securely retrieved it. Although TELUS is still keeping an eye on the potential incident, it has not yet discovered any proof that corporate or retail customer data has been stolen.