DURBAN – During Kaspersky Lab’s annual Cyber Security Weekend that took place in Cape Town, South Africa, Kaspersky Lab experts discussed the wide spread growth of mobile payments across the globe and the many cyber risks that surround such technology.
Especially the recent SIM swap fraud wave, which have become very common in Africa and the wider region. In South Africa this type of fraud more than double in the last year, according a report of South African Banking Risk Information Centre (SABRIC).
A SIM swap fraud happens when someone convinces your carrier to switch your phone number over to a SIM card that a criminal possesses. In some cases, there are carrier’s employees working together with criminals. By diverting your incoming SMS messages, scammers can easily complete the text-based two-factor authentication checks that protect your most sensitive accounts in financial services, social networks, webmail services and instant messengers.
Many African countries are suited to mobile payment methods. In fact, research notes that at the end of 2017, there were 135 live mobile money services across the Sub-Saharan African region, with 122 million active accounts. While payment methods through mobiles offer a convenience that is hard to debate, Kaspersky Lab research shows that mobile payments and the banking system are suffering a wave of attack – mostly powered by SIM swap fraud – and people are losing their money as a result. This type of attack is used to not only steal credentials and capture one-time passwords (OTPs) sent via an SMS, but also to cause financial damage to victims, resetting the accounts on financial services, allowing to the fraudsters access to currency accounts not only in banks but also in fintechs and credit unions.
Fraudsters are also using it as way to steal money using WhatsApp, loading the messages in a new phone, contacting the victim’s contacts asking for money, simulating an emergency situation.
“Despite financial inclusion services prospering, the flip side to this is that it opens up a world of opportunities to cybercriminals and fraudsters who are using the convenience a mobile phone offers to exploit and poke holes in a two-factor authentication processes. Frauds using SIM swap are becoming common in Africa and Middle East, affecting countries like South Africa, Turkey and UAE. Countries like Mozambique have experienced this firsthand. The implemented solution, by banks and mobile operators in Mozambique, as a result, is something I believe we must learn from and encourage other regions to investigate and apply, among other aspects, to mobile payment methods of the future – as a way to ensure that mobile phones do not become an enemy in our pockets,” said Fabio Assolini, Senior Security Researcher of Kaspersky Lab.
The total money lost in the attacks varies by country: there are extreme cases, such as one in the United Arab Emirates, where one victim lost $1 million (R14.37 million), while in South Africa one victim reported losing $20000 (R287400).
“In average fraudsters can steal $2500 (R35925) to $3000 (R43110) per victim, while the cost to perform the SIM swap starts with $10 to $40,” concluded Assolini.
In order to protect the growing mobile digital life and payment methods, Kaspersky Lab recommends the following key considerations:
1. Voice and SMS methods avoided as authentication methods for payments – OTPs in mobile apps like Google Authenticator or the use of physical tokens should be used.
2. Biometrics – there is no better authentication than that of a physical characteristic. Voice authentication is an option that can be investigated further.
3. An automated ‘Your number will be deactivated’ message – to be shared upon SIM swap request. This will support the user to report the activity, if it is not legitimate, faster.
4. Activate 2FA on WhatsApp – in an attempt to minimise WhatsApp hijacking, activating Two-factor authentication using a six-digit PIN on your device is critical. This supports the user in having an additional layer of security on the device.
To read the original article: