Page 398

The University of SydneyPage 6Recap of Week 62. SIM-swap:–The attacker knowing some basic details of the target (e.g. ID number, address etc.) calls the mobile operator, answers some security questions and requests the transfer of the mobile subscription to a fresh SIM card.–https://www.theguardian.com/money/2020/sep/13/sim-swap-is-on-the-rise-how-can-you-stop-it-happening-to-you–https://www.europol.europa.eu/newsroom/news/ten-hackers-arrested-for-string-of-sim-swapping-attacks-against-celebrities3. Mobile number port-out:–The attacker creates an account with a different mobile service provider and request to port the target’s number from the original network by providing some static authentication credentials such as ID number. –https://medium.com/coinmonks/the-most-expensive-lesson-of-my-life-details-of-sim-port-hack-35de115171244. Interception by malware and trojans:–An attacker can install malware on a user’s phonethatcan intercept OTCs sent by SMS and send them back to the attacker in the background.–https://www.eset.com/int/about/newsroom/press-releases/research/android-trojan-targets-customers-of-20-major-banks/