Cybercriminals are impersonating victims in order to obtain replacement SIM cards from their mobile carriers, security vendor Trusteer says. The likely explanation for the Trojan’s collection of phone-specific data is that it’s used to obtain a fraudulent SIM card for the victim’s phone number by reporting their phone as stolen. This would allow fraudsters to bypass bank anti-fraud defenses that are based on one-time passwords. Users should run security software that protects their browsing sessions from being tampered with.”]

