Intelligent CIO North America Issue 16 | Page 76

t cht lk encryption in their voice applications and are advised to disable the GSM network on their phones , if possible .

t cht lk encryption in their voice applications and are advised to disable the GSM network on their phones , if possible .

SMS interception
A core telecommunications network can be considered ‘ protected ’ depending on how a telecommunications company perceives the term ‘ security domain ’. However , in reality , since a core telecommunications network is usually just a domain , the data it contains is only protected from the outside and not from the inside . Therefore , an insider cybercriminal can intercept the SMS or downgrade a 4G / 5G service area to a less secure network , such as GSM .
Through social engineering , SIM swapping has also been used by malicious actors posing as compromised users . Typically , a malicious actor calls a telecommunications service center posing as a user who has lost their device or SIM . In response , the service center transfers the subscriber ' s account and phone number to the attacker , after which all text messages are sent to the malicious actor rather than the unwitting legitimate subscriber .
Recommendation : Instead of SMS , users should consider other means of authentication , such as mobile app authenticators or an automated mobile phone prompt .
76 INTELLIGENTCIO NORTH AMERICA www . intelligentcio . com