Blog | G5 Cyber Security

Cybercriminals bypass e-banking protections with fraudulent SIM cards, says Trusteer

Cybercriminals are impersonating victims in order to obtain replacement SIM cards from their mobile carriers, security vendor Trusteer says. The likely explanation for the Trojan’s collection of phone-specific data is that it’s used to obtain a fraudulent SIM card for the victim’s phone number by reporting their phone as stolen. This would allow fraudsters to bypass bank anti-fraud defenses that are based on one-time passwords. Users should run security software that protects their browsing sessions from being tampered with.”]

Source: https://www.csoonline.com/article/2131213/cybercriminals-bypass-e-banking-protections-with-fraudulent-sim-cards–says-trustee.html

Exit mobile version