Tuesday, October 15, 2019

Ultrasonic Fingerprint Reader has a security loophole


In theory, An ultrasonic fingerprint sensor works by bouncing a sonic pulse wave off of your fingertip to create a three-dimensional image. It's much more secure than optical in-display sensors and will work even if your fingers are greasy, dirty, or wet.
A Galaxy S10 user recently got a Rs.100/-  ‘gel screen protector’ off eCommerce site. However, he realized that after using the protector, any fingerprint could unlock the phone. According to Samsung, the case is under investigation. Nevertheless, the company considers this issue to be related to the cost of the screen protector  Rs. 100/- 
Samsung earlier had warned Galaxy S10 owners against unofficial screen protectors.
Galaxy S10 series which comes with an ultrasonic fingerprint sensor. While this fingerprint reader is top-notch, it does not work well with a tempered glass screen protectors. Many users can not use a smartphone without a screen protector, so what’s the solution? Accessory makers use a liquid adhesive to create a stronger seal between the protector and display. While this seem to work perfectly for some users, try not to buy a Rs.100/- screen protector.



Samsung’s ultrasonic fingerprint reader works by sending sound waves at the user’s finger and reflected waves are read.  However, standard glass protectors create a small gap between the finger and the display. This reduces the effect of the fingerprint sensor. In the era of full-screen devices, ultrasonic on-screen fingerprint sensors are actually a good solution. However, they are by no means perfect. Nevertheless, users will have to come to terms with the fact that only plastic protectors seem to allow ultrasonic fingerprint readers to work without issues.



So even if in theory Ultrasonic fingerprint readers are more accurate than their optical counterparts and more secure because of the 3D impression that the reader creates of your fingerBeware untested technologies can bring in simple security loop holes. Security cannot be measured in price and security is a long standing myth.

Sunday, October 13, 2019

SIM Swap Fraud Remedy via Consumer Courts

SIM Swap Fraud Remedy via Consumer Courts
By Prashant Mali

Case No. 1 : Positive order
BSNL Bengaluru and the Union Bank of India have been ordered to pay Rs 9.6 lakh to a businessman after fraudsters siphoned off money from his bank account in what was described as a sim swap fraud. The national telecom provider was pulled up for issuing a duplicate sim to fraudsters without adhering to Know Your Customer (KYC) norms and the bank for not alerting the customer on time. Nagarathpet resident Ramesh Kumar has been using a mobile phone with a BSNL sim card for many years and had linked it to his account at Union Bank of India’s BVK Iyengar Road branch. On September 22, 2015, Kumar checked his email to find that an unknown beneficiary had been added to his online bank account. By the time he could alert bank authorities about the breach, the fraudsters managed to transfer Rs 9,62,700 from his account. The sim card on his cellphone that was supposed to receive a one-time password (OTP) mysteriously remained de-activated all the while. The 52-year-old businessman lodged a complaint with his bank branch and the cybercrime wing of Bengaluru police only to realise he had fallen prey to a sim swap fraud.
With neither the Union Bank of India nor BSNL acting towards compensating his loss for months, Kumar approached the Bangalore urban 2nd additional district consumer disputes redressal forum on May 5, 2016 to reclaim his money. The consumer forum heard the case in which BSNL and Union Bank of India blamed each other for facilitating the fraud. BSNL claimed it is only a service provider and wasn’t aware that Kumar had linked his cellphone number to his bank account, and that it was the bank’s responsibility to notify him immediately when there was a fraudulent attempt. The bank argued that a BSNL customer centre executive in KG Road was at fault for issuing a duplicate sim card to a fraudster who pretended to be Kumar, deactivated his existing sim card and obtained a replacement. 

After 31 months of hearing, the court blasted BSNL and Union Bank of India for the loss their customer suffered. The judges pointed to the BSNL staffer’s carelessness in issuing a duplicate sim and deactivating Kumar’s original sim. They criticised Union Bank of India authorities for not immediately alerting the customer on the illegal addition of a beneficiary, which he came to know through an official email. In a verdict pronounced last month, 
the forum ordered BSNL Bengaluru telecom district and Union Bank of India, BVK Iyengar Road branch, to jointly refund Rs 9,62,700 to Kumar with interest and an additional Rs 10,000 towards his court expenses within 45 days. What is it Fraudsters, armed with confidential bank details of customers, deactivate sim cards linked to bank accounts by impersonating the victims and submitting fake documents with cellphone service providers and obtaining duplicate sims. The original sims on the victims’ phones get deactivated in the process. The active duplicate sims with the fraudsters receive OTPs and other bank communications, enabling illegal online transfers of large sums of money, while the victims remain clueless.

Prashant Mali
Lawyer, Bombay High Court
+919821763157 | cyberlawconsulting@gmail.com

Friday, October 4, 2019

SIM Swap Fraud Solution which India should Adapt By Prashant Mali

SIM Swap or SIM Exchange Fraud Solution which India should Adapt
By Prashant Mali
Being a long-time crusader of SIM swap fraud victims in India and winning many cases in favour of victims, I thought of penning this advice.  Sim Exchange fraud or Sim Hijacking fraud (also known as Port-Out scam or SIM splitting) is a type of account takeover fraud that generally targets a weakness in two-factor authentication & two-step verification, where the second factor or step is an SMS or a call placed to a mobile telephone. In 2018, over 80% of adults were expected to have a bank account, over 1.18 billion people own a mobile phone in India


How SIM Swap Fraud works?

Fraudsters obtain banking account details and your registered mobile number through phishing or through Trojans/Malware or through a leaked database.

Under the pretext of losing the mobile handset, new handset or damaged SIM card, fraudster approaches mobile service provider using a forged authority letter and forged KYC document there by creating a fake identity of genuine customer

Post customer verification, mobile service provider will deactivate or block the old SIM card in the mobile phone which is in customer’s possession and issue a new SIM card to the fraudster. There will be no network on customer’s handset. This done generally on weekends to fraudsters get time before the customer complains Now, customer will not receive any SMS, information such as alerts, OTP, URN etc. on the phone

With the banking details stolen through phishing or Trojan/Malware or via leaked database in darknet fraudster will access and operate customers account and initiate financial transactions which customer will not be aware of and all the SMS for alerts, payment confirmation etc. will go to the fraudster

Solution
SIM swap hackers rely on intercepting a one-time password sent by text after stealing a victim's banking credentials, or by using the phone number as a password reset fallback. So the phone company has to offer a straightforward fix: The telecom carrier would set up a system to let the bank query phone records for any recent SIM swaps associated with a bank account before they carried out a money transfer. If a SIM swap had occurred in, say, the last two or three days, the transfer would be blocked. Because SIM swap victims can typically see within minutes that their phone has been disabled, that window of time let them report the crime before fraudsters could take advantage.
After UK and Australia, by August of 2018, Mozambique's largest bank was performing SIM swap checks with all the major carriers. which reduced their SIM swap fraud to nearly zero overnight. Mozambique isn't alone in implementing that fix for the growing epidemic of SIM swap fraud, which is increasingly used for everything from hijacking Instagram accounts to stealing cryptocurrency. Companies in other countries across Africa, including Nigeria, South Africa, and Kenya—where the prevalence of mobile payments have made SIM swaps a particularly serious threat—have put similar carrier-checking remedies in place. 

How the solution can work
All mobile operators in Indian can make an Anti-SIM swap platform available to the banks on a private API that flags up if there was a SIM swap involving a specific mobile number associated with a bank account over a predefined period. The bank then decides what to do next.

Most banks can block any transaction from a mobile number that has undergone a SIM card change within the last 48 hours, while others opt for a longer period of 72 hours. This period of 48-72 hours is considered a safe period during which the subscriber will contact their operator if they have fallen victim to an unauthorized SIM card change.

There’s also the possibility that the mobile owner has legitimately changed their SIM card, and therefore unable to perform an online transaction for the next 48 hours. In such cases, some of the banks can have a process that requires face-to-face verification in a branch office – a reasonable compromise in the circumstances.

Anti-SIM swap Platform workflow
The banks are connected to different mobile operators through a VPN connection so that all traffic is secure.
The online banking system conducts a REST API query to the respective mobile operator giving the mobile number (MSISDN) and the period (24-72 hours) as arguments.
The mobile operator simply returns in real-time: True or False.
If the query is False, the bank allows the transaction as normal. If True, the bank blocks the transaction and may request additional steps to verify the transaction. It is important to reiterate that the mobile operator should not share personal identifiable information (PII) with a third party, in this case, banks. 

Once the platform is implemented, the level of online banking fraud stemming from SIM swap attacks should fell dramatically, there can be almost no cases involving banks that implement the anti-SIM swap platform. 

Other Solution
Australian banks such as Commonwealth Bank, NAB, Macquarie Bank and Westpac have tackled SIM hijacking from another angle. The banks get a data feed from a company, Paradigm.one, that collects real-time porting data, such as when a number moves from carrier A to carrier B.


A recent SIM change may be viewed as an increased risk if an account has also attempted to suddenly initiate a high-value transaction. Using other metrics, such as device fingerprinting and geolocation, banks can decide whether to reject transactions and suspend accounts. Paradigm.one's system has its limitations, though, as it doesn't collect data for certain types of SIM changes.

Alternative measures to be explored include the use of additional in-device authentication software, such as Google Authenticator or a two-factor authentication device such as a YubiKey.

Extra Links
1. SIM SWAP FRAUD explained in HINDI Language on ABP News, Youtube Video
2. SIM SWAP Fraud Explained in MARATHI Language on ABP Majha News, Youtube Video
3. How to Protect yourself from SIM Swap Fraud Express Computer News


Prashant Mali
Cyber Lawyer, Bombay High  Court
Author, Speaker & Thought Leader.
+919821763157 | cyberlawconsulting@gmail.com

FIR : All you want to know about in a criminal case

FIR - What is?  The first information report is a report giving information of the commission of a cognizable crime,  which may be made by t...