Thursday, November 26, 07:03
Home rapidshare Sim Swap scams threaten Greek citizens! (Coming soon)

Sim Swap scams threaten Greek citizens! (Coming soon)

Sim Swap scams have always been one of the biggest threats to internet users. Thieves / swindlers no longer act in the traditional way. They have been transferred - and they in turn - to his world internet.

According to reports, Sim Swap scams have been on the rise in recent months, given the situation pandemic. Both the lockdown, as much as the majority of Greek citizens choose to pay bills, do their shopping and transfer money through internet banking have caught the attention of scammers, who find ways to extract passwords bank accounts.

SecNews conducted a survey to determine the magnitude of the problem, the percentage of Greek citizens who have fallen victim (and let them not understand it), the perpetrators of fraud and fraud Protection measures should be taken by mobile phone providers, banks and you as well users.

Sim Swap scams threaten Greek citizens! (Coming soon)

What are Sim Swap Scams?

Hackers level the access confirmation through two-factor authentication and occupy bank accounts!

The scam exploits the ability of a mobile phone service provider to seamlessly transfer a phone number to a device containing a different subscriber ID (SIM). This feature is usually used when a customer has lost or stolen their phone or wants to transfer a service to a new phone.

The scam starts with a hacker collecting personal information about the victim, or using it phishing email or with the immediate "fishing" of the user.

Once the scammer has received these details, he or she will contact the victim's mobile phone provider. The swindler uses social engineering techniques to persuade the phone company to transfer the victim's phone number to the scammer's SIM card. This is done, for example, falsifying the victim using personal information to make the claim that he has lost his phone appear true.

Once this happens, the victim's phone will lose connection to it network and the scammer will receive all the SMS and voice calls intended for the victim. This allows the scammer to steal them one-time passwords sent via text or phone calls to the victim, and therefore bypass any security features of the accounts (whether they are bank accounts, social media accounts etc.) based on text messages or phone calls.

  • Which "organizations" act as "mules" to transfer money knowingly or unknowingly?
  • Where is the money for the innocent victims transferred? 
  • Who is behind it this huge scam;
  • What countermeasures must be taken mobile phone providers and banks?

SecNews research provides answers to all questions created and will help you pay more attention to your online life and money.

The research is ongoing and we will present the results to you soon.



Please enter your comment!
Please enter your name here


Mac: How to disable Favicons in Safari

Apple has decided that in Safari 14.0 and later versions it will display the favicons on the tabs. You do not like this ...

Android: How to enable dark mode

Dark Mode is a function in mobile and desktop operating systems that changes the user interface to a dark background. Many...

How to turn off the "Meet Now" feature in Windows 10

Earlier this year, Microsoft added Skype "Meet Now" to Windows 10 previews and ...

NCSC: Fix CVE-2020-15505 RCE Critical Error on MobileIron Platform

The National Cyber ​​Security Center of the United Kingdom (NCSC) issued a warning yesterday, urging all organizations to correct the critical ...

For the first time since the Middle Ages, on December 1 Jupiter-Saturn coupling

Jupiter and Saturn are going to align in a way that has not been done since the Middle Ages, astronomers say. When the...

Ransomware attacks have boosted Coalition revenue

Ransomware attacks, which encrypt a computer files and demand ransom for their decryption, have seen a dramatic increase in ...

The new version of Stantinko malware appears as an Apache web server

Stantinko, one of the oldest malware botnets, has updated its Linux malware, upgrading its trojan to appear as ...

Peatix user data has been leaked

One of the most popular events organizing applications, Peatix, was attacked, with a hacker leaking this month the ...

The M1 Macs can run six external monitors with DisplayLink

YouTuber Ruslan Tulupov states that it is possible to run up to six external screens from the M1 Mac mini and five ...

New WAPDropper malware infects Android devices for WAP scams

Check Point security researchers have discovered a new Android malware, which is used in attacks against users in Southeast Asia (mainly). New...