The following is the usual process usually followed by fraudsters to clone a SIM card.

Step 1: copying the original SIM using software tool

The attacker gets an access to the physical SIM card and places it into a card reader, which is attached to a computer with duplication software installed in it. This software will then copy the number onto a new/blank SIM available with the fraudster.

Step 2: Contact the victim with a request to restart the mobile

The fraudster will then send an SMS to the victim with a request to restart the mobile on some pretext. Once the victim switches off his mobile, the fraudster starts the phone with a duplicate SIM in his control, before the victim restarts his mobile. This act will successfully initiate/activate the mobile with cloned SIM card.

Step 3: Take over the control

Once the cloned SIM is successfully initiated the attacker will take over the victim’s mobile number, SIM, and his account.