mangalore today
name
name
name
Tuesday, November 26
namenamename

 

Hackers are now targeting eSIM profiles to steal your data and money


Mangalore Today News Network

New Delhi, March 16, 2024: SIM card frauds are common, a major concern and used extensively by hackers but now they are also evolving with the changes in tech. New reports claim these hackers are now relying on eSIM profiles to transfer your primary number to steal data and money. eSIM is the digital version of a SIM card that can be programmed remotely and the bad actors are using this ability to bypass the physical card and gain access to it using an eSIM.


eSIM hack


As we all know that mobile numbers can be used to get data of any kind, and these hackers are now using this trick to get easier control over other phones.

The report also quoted, F.A.C.C.T., a Russian cybersecurity firm that has talked about the latest security issue related to eSIMs and the fact that an eSIM can be activated using a QR code, makes them an easy prey.

You might feel that telcos will have a robust mechanism to avoid getting trapped in this fraud but these hackers are aware that having basic information of the owner allows them to clear the authentication steps and make the telcos do tweaks to the account as per their needs.

So, what happens when these bad actors are able to access the phone number? The firm says they will try to steal money from bank accounts and even retrieve personal information through messaging apps. eSIM has predominantly been a secondary option for most people, however, Apple has a eSIM-only iPhone model available in select countries, who should be aware of this fraud and have been advised to safeguard their details.

People must activate two-factor authentication for their accounts, or even consider having these accounts secured with the help of authenticator apps.


Write Comment | E-Mail To a Friend | Facebook | Twitter | Print
Error:NULL
Write your Comments on this Article
Your Name
Native Place / Place of Residence
Your E-mail
Your Comment
You have characters left.
Security Validation
Enter the characters in the image above