Experiencing More Than 2 Signs? Someone may have cloned the SIM card

 


A cloned SIM card or mobile phone is a threat in the digital age and there are signs. If you experience some of these things, more than two, try to be careful who knows your sim card has been cloned.
There are three main methods of cloning AMPS, CDMA and GSM, but the latter method is the most popular as reported by Techlicious.



GSM cloning is done by copying the IMEI number of a person's mobile phone. IMEI is a unique number that identifies a smartphone and this can be obtained by someone by hacking.





Well, in the GSM cloning scheme, there is also SIM card cloning. However, this method requires direct access to the SIM card to be copied using a card reader connected to the computer. So, those who do must contact you.



So what are the signs that someone else’s SIM card has been cloned? See below.



1. Message asking to restart HP

If you suddenly receive a message asking for your mobile phone to be restarted, this is a sign of simcard cloning. If restarted, the person can use the time to steal SIM details while the mobile phone is not turned on.



2. Do not receive SMS or calls

Phone numbers can only be used on one SIM. So, if the simcard has been cloned, the next sign is not receiving SMS or calls at all. Try asking a friend for help to send an SMS or a call, if not in then it is suspected.



3. Receive SMS from unknown number

Or instead you get an SMS or there is an international call trace. Worse, all call, internet, or SMS costs will be borne by you.



4. HP is in a different location

You are in Jakarta, but suddenly when you track your phone with the Find My Device or Find My iPhone application, the device is available in Surabaya or even abroad.



Moreover, if you find there is more than one device registered in the app but you only have one mobile phone. Wow, most likely the foreign device is the result of a clone of your cell phone.



5. Unable to use the application

There is already a lot of two -factor authentication (TFA) to protect user accounts. This is good because it strengthens our protection. The TFA code is usually sent via SMS to ensure that the person trying to log in to the account is actually the owner of the account.



But if your cell phone or SIM card has been cloned, hackers or irresponsible people can get a verification code. That person can use it to access your account.
Previous Post Next Post

Contact Form