SIM Clone

SIM cloning which is a serious security threat for SIM security is the process in which a legitimate SIM card is duplicated. When the cloning is completed, the cloned SIM card's identity information is for gaining access to Mobile Network Operator (MNO) network and services transferred onto a cloned SIM card. The cloned SIM card can then be used in a different phone while having all calls and associated charges attributed to the original SIM card. The phrase SIM clone is often used to refer to the SIM card that has been successfully duplicated.

A successful cloning depends on the a user's ability to extract the SIM card's information such as IMSI (International Mobile Subscriber Identifier) and Authentication key (Ki). IMSI is like a subscriber identity to the network. MNO identify their customers and related services with IMSI. While a IMSI is relatively easy to identify, finding the Ki can be more difficult for the native user. Ki is encrypted with strong encryption algorithm and less visible compared to IMSI. Separate devices and software programs may have to be used to decrypt the Ki. A combination calculation of IMSI and Ki can result access credentials to the network.

Strong security awareness is crussial against SIM cloning. Do not let your mobile phone and SIM card unprotected. At least protect your mobile phone with stong security credentials. For SIM card at least protect it with PIN and don’t leave it unattended.

 



Comments

Popular posts from this blog

Proactive SIM

EUICC Architecture

How SIM “talks” to external