Survey Analysis of Cloned SIM Card
11 Pages Posted: 5 Aug 2019
Date Written: August 3, 2019
Cyber-attacks increase in many ways such as Smart Card Cloning, Social Engineering, and Malware attacks, that eventually left millions of users prone to seizures. Currently, smart card cloning attacks are drastically increasing, especially cloned SIM Cards. Smartphones have become a whole part for our daily communications, Which consists "Subscriber identity module (SIM)" contains the quintessential information about the user to build the connection across different telecom operators. Due to the desideratum of telecom technology, threats are also started to grow in the form of Cloned SIM Cards. To interpret and distinguish the following attack, forensic investigators have provided with detection approaches in the form of tools to study the respective attacks patterns. The motive of this study is to address the rising issue of the cloned SIM card; At first, we analyzed the extracted artefacts in a cloned SIM card using imaging techniques and secondly, Comparing with benchmark tools to check the efficiency of artefact recovery and lastly it limitations.
Keywords: Cyber-attacks, Smart phone, SIM Card, Forensics, Tool
Suggested Citation: Suggested Citation