• About
  • Subscribe
  • Contact
Thursday, May 8, 2025
    Login
FutureIOT
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
No Result
View All Result
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
No Result
View All Result
FutureIOT
No Result
View All Result
Home Application Commercial

Wuthering Heights in telecom crime against IoT

Nilesh Jain by Nilesh Jain
July 1, 2019
Image by Gratisography / Pexels.com

Image by Gratisography / Pexels.com

Did you know that the annual cost of telecommunications subscription fraud was estimated to be more than US$12 billion? In fact, some think the situation is much worse – pegging the financial damages to be between 3% to 10% of an operator’s annual profits.

Such fraud is conducted when – simply put - cybercriminals gain access to the SIM cards of legitimate subscribers, or other billing portions of a telecom network, effectively taking over control of charges incurred by voice or data usage, subsequent payment channel, and the data being transmitted via the SIM card, such as one-time password to online banking accounts. Needless to say there are many ways fraudsters can cash in on the pilfered SIM cards.

If US$12 billion doesn’t sound bad enough, we are expecting it to get much worse - when IoT projects start to become commonplace globally.

Compromising IoT devices via SIM cards

A common and well-known link that communication devices and internet devices have is the use of a SIM card. For IoT devices to have a unique presence and connection to the internet, they should have a SIM in the same way a phone does.

SIM cards can serve like credit or debit cards in that they are used to initiate billing or connections that have corresponding fees. That’s why SIM cards, unfortunately, can be subject to many of the same frauds and risks credit cards are.

SIMs of all types – eSIMs, USIMs, multi-eSIMs and the like – can be remotely updated with arbitrary information for the purpose of “efficient content delivery’, a standards-based means of changing large numbers of SIM cards all at once, remotely. This can also constitute an attack if used maliciously.

In the case of smart city devices like traffic lights and smart garbage bins, cybercriminals have various ways to abuse SIM cards. They could choose to extract the SIM cards embedded in the IoT devices to launder money or conduct other illicit activities. In some cases, even when the SIM cards might be difficult to extract, vulnerabilities still lie in how the devices have the capability to change carriers remotely. Moving from one carrier to another creates risks as some carriers could be cooperating with or created by criminals.

Similar to a smart city, a smart factory is a collection of centrally managed robots that compose part of an IT network. While many factories consider themselves isolated from the internet, the means by which they meet disaster recovery requirements includes having a cellular data connection for performing backups to an offsite location. While the robots may not necessarily have SIM cards or phone numbers like typical phones and IoT devices, their cellular device will have an internet connection that will allow backups or factory control. What this means is the factory can then be used for outbound fraud, and cyber-telecom vulnerabilities can be used to attack the factory.

Even smart and autonomous vehicles can be subject to the same attacks as mobile phones. Telephony denial of service (TDoS), for example, could cause a smart car to become lost due to a broken internet connection.

What are our options?

Keeping in mind the connection between IoT and telecom should help in creating defences against threats that shift from one to the other. For IoT devices, simple measures like changing the default settings and credentials of the device can already prevent some of the telecom attacks from happening.

Geopolitically, most telecom crimes tend to be addressed by the telecom companies themselves. The costs are absorbed as the cost of doing business – creating an isolation almost. Without thorough cross-border intelligence sharing with law enforcement, the source, investigative method, and evidence cannot be connected in a way that results in a meaningful number of arrests or a decrease in the acceleration of international cyber-telecom fraud.

It is important to acknowledge that there is only so much a single organisation or industry can do against an interconnected web of threats. When multi-billion-dollar classes of fraud proliferate among criminal groups and become scalable on the back of sprawling IoT projects, the need to work together for the benefit of all has never been greater.

Related:  73% of warehouses in APAC will deploy smart wearables
Tags: e-SimeSimfraud detectionmulti-eSIMTelephony denial of serviceTrend MicroUSIM
Nilesh Jain

Nilesh Jain

Nilesh Jain, Vice President of Southeast Asia and India at Trend Micro

No Result
View All Result

Recent Posts

  • AI to fuel the rise of zero touch networks
  • Surge in ambient IoT to pave the way for sustainable tech
  • Imbibing AI skills into Singapore’s future workforce today
  • Asia Pacific's AI ambitions hinge on next-generation networks
  • Gartner urges supply chain leaders to adopt cost-to-serve model

Categories

  • Agriculture
  • AI and Machine Learning
  • Application
  • Application and Middleware
  • Automotive
  • Banking and Financial Services
  • Big Data and Analytics
  • Blockchain
  • Case Studies
  • Change Healthcare
  • CHRO
  • Cloud and Platforms
  • Commercial
  • Construction
  • Consumer
  • Customer Engagement
  • Devices
  • ESG
  • Future Workplace
  • FutureCOO
  • Governance, Standards and Regulations
  • Government, Healthcare and Education
  • Hospitality and Tourism
  • Industrial
  • Industry
  • IT-OT integration
  • Manufacturing
  • Networking
  • Operations
  • Research and Development
  • Retail and E-commerce
  • Security
  • Sensors and Instrumentation
  • Smart Cities
  • smart contracts
  • Smart Home
  • Start-ups
  • Supply chain
  • Technology
  • Telecommunications
  • TIBCO
  • Transportation and Logistics
  • Videos
  • Whitepapers

About FutureIoT

Asia’s ONLY dedicated IoT publication

The race to harness the power of Internet of Things (IoT) is here. FutureIoT is dedicated to individuals, as well as public and private organizations looking to tap the potential of IoT to transform the way we live, work and do business. FutureIoT is the dedicated media that provides the single source of truth about IoT, the technology, its application and regulation, originating from Asia. << Read more >>

Quick Links

  • Subscribe
  • Contact
  • Privacy Policy
  • Cookie Policy
  • Terms of Use

Categories

Recent News

Photo by Polina Tankilevitch: https://www.pexels.com/photo/hand-of-a-woman-showing-palm-with-a-word-no-4830656/

AI to fuel the rise of zero touch networks

May 8, 2025
Photo by John Tekeridis: https://www.pexels.com/photo/round-grey-speaker-on-brown-board-1072851/

Surge in ambient IoT to pave the way for sustainable tech

May 7, 2025
  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe