Intelligent CIO LATAM Issue 04 | Page 24

TRENDING
criminal behavior . Users are also encouraged to use end-to-end encryption in their voice applications and are advised to disable the GSM network on their phones , if possible .
SMS interception
A core telecommunications network can be considered ‘ protected ’ depending on how a telecommunications company perceives the term ‘ security domain ’. However , in reality , since a core telecommunications network is usually just a domain , the data it contains is only protected from the outside and not from the inside . Therefore , an insider cybercriminal can
Instead of SMS , users should consider other means of authentication , such as mobile app authenticators or an automated mobile phone prompt . and phone number to the attacker , after which all text messages are sent to the malicious actor rather than the unwitting legitimate subscriber .
Recommendation : Instead of SMS , users should consider other means of authentication , such as mobile app authenticators or an automated mobile phone prompt .
Calling line spoofing
Call Line Impersonation ( CLID ) is a standards-based activity used for legitimate purposes , including masquerading call centers behind 1-800 hotline numbers . Criminals can also abuse it to attack people : One scenario may involve a customer receiving a call or text message from their bank including a request for action in which the customer is lured into unintentionally sharing their credentials or other confidential information with an attacker via a phishing site .
Recommendation : Users and organizations should verify the origin of incoming calls and text messages as part of a multi-layered defense strategy . It is also intercept the SMS or downgrade a 4G / 5G service area to a less secure network , such as GSM .
Through social engineering , SIM swapping has also been used by malicious actors posing as compromised users . Typically , a malicious actor calls a telecommunications service center posing as a user who has lost their device or SIM . In response , the service center transfers the subscriber ’ s account recommended to leverage existing processes by using data such as telecommunications records that are related to the origin of the text messages or calls .
TDoS extortion
Compared to the quantitative denial of service ( DoS ) model in which a system is overloaded with traffic volumes , the telephony denial of service ( TDoS ) is
24 INTELLIGENTCIO LATAM www . intelligentcio . com