Posts

Showing posts from June, 2023

SIM Clone

Image
SIM  cloning  which is a serious security threat for SIM security is the process in which a legitimate  SIM card  is duplicated. When the cloning is completed, the cloned SIM card's identity information is for gaining access to Mobile Network Operator (MNO) network and services transferred onto a cloned SIM card. The cloned SIM card can then be used in a different phone while having all calls and associated charges attributed to the original SIM card. The phrase SIM clone is often used to refer to the SIM card that has been successfully duplicated. A successful cloning depends on the a user's ability to extract the SIM card's information such as IMSI (International Mobile Subscriber Identifier) and Authentication key (Ki). IMSI is like a subscriber identity to the network. MNO identify their customers and related services with IMSI. While a IMSI is relatively easy to identify, finding the Ki can be more difficult for the native user. Ki is encrypted with strong enc...
Image
  2023.06.03   How secure is your SIM   SIM card enables you to use services from a Mobile Network Operator (MNO). From MNO perspective it will enable MNO to identify you as subscriber/ customer. With that in mind, SIM card in thief or hacker hand can cause financial and personal problem. SIM card is the key to the social media and bank accounts. With the advent of end-to-end encryption technology, two-way authentication is the new norm. When you log in to your account, an OTP (One-Time Password) is sent to your SIM card number. When you enter the OTP, you can log into your account, using social media, banks, payment portals, streaming services, and so forth. Now just imagine your SIM card in the wrong hands even for a few minutes. SIM card security has become default capability since it’s produced. SIM card is physically protected and when using services on MNO network. The PIN and PUK code. PIN code consisting of 4 digits, is the access code to your SIM ca...