Abstract

Cyber-attacks increase in many ways such as Smart Card Cloning, Social Engineering, and Malware attacks, that eventually left millions of users prone to seizures. Currently, smart card cloning attacks are drastically increasing, especially cloned SIM Cards. Smartphones have become a whole part for our daily communications, Which consists Subscriber identity module (SIM) contains the quintessential information about the user to build the connection across different telecom operators. Due to the desideratum of telecom technology, threats are also started to grow in the form of Cloned SIM Cards. To interpret and distinguish the following attack, forensic investigators have provided with detection approaches in the form of tools to study the respective attacks patterns. The motive of this study is to address the rising issue of the cloned SIM card; At first, we analyzed the extracted artefacts in a cloned SIM card using imaging techniques and secondly, Comparing with benchmark tools to check the efficiency of artefact recovery and lastly it limitations.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call