SIM cloning enables the fraudster to stealthily operate the victim's mobile by monitoring mobile phones and

  • Listening to their calls
  • Tracking their location
  • Gaining access to their personal and financial accounts etc.,
  • Impersonate the user by making calls or sending text messages from the victim's number
  • Two-factor authentication mechanism will enable the fraudster to change the passwords of victim's account as he has access to incoming messages
  • Hack the victims' personal and financial accounts
  • Have access to their passwords, PIN, OTP, etc., and resort to a financial scam, blackmail, etc.,