Someone you know has forwarded a Scam Message, but it is not him/her!

 

I was part of a chat group created by a friend in September last year. Eventually, she apologised for accidentally creating the chat group and began removing a long list of contacts before exiting the group. After that, an older lady was left as the sole administrator.

        This morning, we received a message from an unknown number. The contact wasn’t saved under any name—just labeled as "ADMIN." Interestingly, the sender wasn’t actually the group administrator, but appeared to be impersonating one.


        This was a red flag for me. Usually a government initiative like this would be published on the official website, and would usually have gov.my. 

        A quick check by forwarding this message to SEBENARNYA.my (save this on your mobile phone +60 3-8688 7997). 

        Here is the reply: 


        Now, as I look at it again, it is interesting to note that the compromised phone number has changed its security code on December 25, 2024. Usually we won't notice or be bothered by this: 


        That could probably explain what happened to this person's Whatsapp. After I exposed the fake news (possibly another scam link posted in the chat group), the security code changed this morning. 


        The label on the number changed from "ADMIN" to a name of a lady who is verified to be a real person, by the name, NXXRXS. He/she then sent the following message: 



        Even though the name has gone back to the original number, FOR NOW, it is still not safe for the person's whatsapp to be left unattended. 


        I consulted a few people, and also ChatGPT which gave me the following answers on how to secure your Whatsapp: 

๐Ÿ” 1. Use Strong Authentication

Enable Two-Factor Authentication (2FA) on all accounts.

Use a strong screen lock (PIN, password, or biometric).

Avoid using easily guessed PINs (like 1234 or birthdays).


๐Ÿ“ถ 2. Be Cautious with Public Wi-Fi

Avoid accessing sensitive information on public Wi-Fi.

Use a VPN if you need to connect to unsecured networks.

๐Ÿ“ฑ 3. Don’t Share Your IMEI Number

The IMEI (International Mobile Equipment Identity) is what cloners use to duplicate your device.

Don’t share it publicly or post screenshots that show it.

You can find it by dialing *#06#.


๐Ÿงฉ 4. Watch Out for SIM Swap Scams

Use a SIM lock if available through your carrier (telco). 

Never share OTPs or SIM card info via phone, email, or SMS.

If you suddenly lose mobile signal for no reason, contact your carrier immediately—your number may have been cloned or ported.

๐Ÿงผ 5. Keep Your Phone Software Updated

Always install security updates promptly.

Use official app stores (Google Play or Apple App Store) only.

Avoid sideloading apps unless you’re 100% sure they’re safe.

๐Ÿ” 6. Monitor for Suspicious Activity

Unexpected messages, calls, or app notifications could be signs of cloning.

If your phone battery drains quickly or your data usage spikes, investigate.

Contact your telco if you suspect another device is using your number.


๐Ÿ“ž 7. Talk to Your Mobile Carrier

Ask about security features like:

Port freeze (to prevent SIM swap attacks)

Call/SMS forwarding alerts

Account PIN verification for changes


        Another person also asked ChatGPT with a different question and it gives a good answer:


Yes, a SIM card can be cloned, but it's difficult, illegal in most cases, and not easy with modern SIM cards due to strong encryption and security measures.

### Here's how it breaks down:


#### 1. Technically Possible?

- Old SIM cards (pre-2000s) using the COMP128v1 algorithm could be cloned with special hardware and software.

- Modern SIM cards use more secure algorithms (like COMP128v2/v3 or even newer), which make cloning extremely difficult or practically impossible.


#### 2. How Cloning Works (in theory):

- You’d extract the Ki (authentication key) and IMSI (subscriber ID) from the original SIM.

- Write that data to a programmable SIM (like a SuperSIM).

- Both SIMs would appear to the network as the same device (though most carriers detect this).


#### 3. Legal and Ethical Issues:

- SIM cloning is illegal in most countries and considered a form of fraud.

- Carriers have systems to detect duplicate IMSI use and may disable the number.


#### 4. What’s More Common Today?

- Instead of cloning, attackers might SIM swap, where they trick the carrier into porting your number to their SIM. This is a major concern for account takeovers.

ChatGPT asked my friend if he needed more  information:

If you're worried about someone cloning or hijacking your SIM, I can give tips on how to protect it. Want that?


I copied and pasted the above answer from ChatGPT and asked for more information. Here is ChatGPT's answer:

How to Protect Your SIM from Cloning or Hijacking

๐Ÿ” 1. Set a SIM Lock (PIN)

Most phones allow you to set a PIN code on your SIM card.

This prevents someone from removing your SIM and using it elsewhere without the code.

How to do it:

iPhone: Settings → Cellular → SIM PIN.

Android: Settings → Security → Set up SIM card lock.


๐Ÿงพ 2. Add a Security PIN/Password with Your Carrier

Call your telco and request to set up a security question or account PIN.

This adds a barrier if someone tries to SIM swap or access your account.

Without it, anyone with your IC and basic info might succeed in impersonating you.


⚠️ 3. Watch for Sudden Signal Loss

If your phone suddenly loses mobile signal, but others nearby have signal, it could be a red flag that your SIM was hijacked.

Act immediately: call your telco from another phone and ask them to block your line.


๐Ÿ“ฑ 4. Avoid Oversharing Your Phone Number

Use your phone number only where necessary (e.g., avoid putting it on social media or forms that don’t need it).

Many attacks start with social engineering, and the less data out there, the better.


๐Ÿ›ก️ 5. Use 2FA with an Authenticator App, Not SMS

Use authenticator apps (e.g., Google Authenticator, Authy) instead of SMS-based 2FA.

If someone hijacks your SIM, they’ll get your SMS 2FA codes—this bypasses that risk.


๐Ÿ•ต️‍♂️ 6. Monitor Your Mobile Account

Log in to your telco’s portal or app regularly.

Watch for suspicious activity—like changes to your plan, address, or linked devices.


๐Ÿง  7. Be Wary of Phishing & Social Engineering

Don’t give personal info or OTPs over the phone, even if the caller claims to be from your telco.

Real telcos won’t ask for sensitive info like full IC or OTPs on calls.


๐Ÿšจ If You're Ever Targeted

Contact your carrier immediately to freeze the line.

Report to Bank Negara or MCMC (if in Malaysia) or the appropriate regulatory body in your country.

Let your banks and platforms know so they can secure your accounts.



Now, I also asked ChatGPT how to protect my phone from being cloned. Here is its response:


๐Ÿ” 1. Use Strong Authentication

Enable Two-Factor Authentication (2FA) on all accounts.


Use a strong screen lock (PIN, password, or biometric).


Avoid using easily guessed PINs (like 1234 or birthdays).


๐Ÿ“ถ 2. Be Cautious with Public Wi-Fi

Avoid accessing sensitive information on public Wi-Fi.


Use a VPN if you need to connect to unsecured networks.


๐Ÿ“ฑ 3. Don’t Share Your IMEI Number

The IMEI (International Mobile Equipment Identity) is what cloners use to duplicate your device.


Don’t share it publicly or post screenshots that show it.


You can find it by dialing *#06#.


๐Ÿงฉ 4. Watch Out for SIM Swap Scams

Use a SIM lock if available through your carrier.


Never share OTPs or SIM card info via phone, email, or SMS.


If you suddenly lose mobile signal for no reason, contact your carrier immediately—your number may have been cloned or ported.


๐Ÿงผ 5. Keep Your Phone Software Updated

Always install security updates promptly.


Use official app stores (Google Play or Apple App Store) only.


Avoid sideloading apps unless you’re 100% sure they’re safe.


๐Ÿ” 6. Monitor for Suspicious Activity

Unexpected messages, calls, or app notifications could be signs of cloning.


If your phone battery drains quickly or your data usage spikes, investigate.


Contact your telco if you suspect another device is using your number.


๐Ÿ“ž 7. Talk to Your Mobile Carrier

Ask about security features like:


Port freeze (to prevent SIM swap attacks)


Call/SMS forwarding alerts


Account PIN verification for changes


MORE UPDATES: 

1. Please secure your Whatsapp to avoid any inconveniences caused. This is a message I received from a friend whose Whatsapp Account was also compromised:



2. Also, remember to download from Apple Store or Play Store the following apps that can help secure your phone: 

a) Whoscall (I think this is a PDRM initiative)
b) Truecaller
c) Scamshield (from Singapore Police) 



If you find this useful, please read this as well to make sure your banking apps are secure on another phone. Keep only one bank app on your phone as your petty cash:

https://come-to-senses.blogspot.com/2025/04/this-is-not-foolproof-but-simple-way-to.html




Comments