Recommended: Post New or used items, service or Job Advertisements to millions of real buyers on the new OLX KENYA Platform!!. Its Free
To hack safaricom Mpesa account transaction, a good knowledge on social engineering, termux, javascript and linux programming is needed. Any Safaricom SIM card can be a source of security vulnerabilities. Here Jey Technicians hackers will show you some ways hackers use SIM cards to gain access to devices and hack m-pesa money from your account, we will also advice on how you can keep your SIM card safe.
M-pesa hacking apps
?Advertise, post your services either new or used items and
make money on this newly launched FREE PLATFORM!!
To Hack safaricom Mpesa transaction we need M-pesa hacker app SimJacker. We will do this by sending a piece of spyware-like code to a target device using an SMS message.
If the target opens the message, we can use the code to surveil them by spying on their calls and messages and even tracking their location.
The vulnerability works by using a piece of software called S@T Browser, which is part of the SIM Application Toolkit (STK) that many phone operators use on their SIM cards. The SIMalliance Toolbox Browser is a way of accessing the internet—essentially, it’s a basic web browser—which lets service providers interact with web applications like email.
Security experts believe that the public disclosure of the SimJacker attack could allow threat actors to use it in operations and there is the concrete risk that that can also evolve this technique.
The experts reported their discovery to the GSM Association and the SIM alliance, the latter published a list recommendations for SIM card manufacturers. The SIMalliance recommends implementing security for S@T push messages.
Mobile operators can also mitigate the attack by analyzing and blocking suspicious messages that contain S@T Browser commands.
Hack safaricom Mpesa account transaction by Sim-swap.
In order to perform a SIM card swap, a hacker will first call up your phone provider. He’ll pretend to be you and ask for a replacement SIM card. He’ll say he want to upgrade to a new device/lost their phone and therefore need a new SIM. If he’s successful, the phone provider will send him the SIM. He steals your personal info, like your name, phone number, and id information by pretending to give free simcards or free credit cards and ask for your info.
As soon as he get that SIM card, all of your calls, texts, and everything else is now delivered right to the hacker. Your actual phone, of course, is now deactivated.
While annoying, this might not seem like it could be overly dangerous. But it’s here where things get much worse.
As soon as the hacker get access to the data on your SIM card, he try to hack into your M-Pesa, Mshwari, KCB bank account by using two-factor authentication codes. Remember when you sign into your mobile banking account ie KCB M-pesa or Mswari and it asks for your password (which you can reset via your mobile phone) and, most importantly, for you to enter the code it just text you? Well, now the hacker gets that code sent directly to them.
SIM fraudsters will make money withdrawals using what’s called a parallel system (will ellaborate on next article). They create a second Mpesa or bank account under your name (given you’re already a customer, the security checks are minimal). When the criminals execute a transfer between the two accounts, it appears to Safaricom’s computer system as though you are simply transferring funds between your two parallel accounts.
Once you actually realize what’s happening, all of your cash might be gone.
How to protect your phone from Mpesa hacking Attacks
If you want to protect your SIM card against Mpesa hacking attacks like these, there are some steps you can take.
Protect Against Socially Engineered Attacks
Make it hard for M-pesa hackers to find information about you. Hackers will use data they find about you online, such as names of friends and family or your address. This information will make it easier to convince a customer support agent that they are you.
Try to lock down this information by setting your Facebook profile to friends-only and limiting the public information you share on other sites. Also, remember to delete old accounts you no longer use to prevent them being the target of a hack.
Another way to protect against SIM card swaps is to beware of phishing. Hackers may try to phish you to get more information they can use to copy your SIM. Be on the lookout for suspicious emails or login pages. Be careful where you enter your login details for any account you use.
Finally, consider what methods of two-factor authentication you use. Some two-factor authentication services will send an SMS message to your device with an authentication code. This means that if your SIM is compromised, hackers can access your accounts even if you have two-factor authentication on.
Set a SIM Card Lock
To protect against SIM attacks you should also set up some protections on your SIM card. The most important security measure you can implement is to add a PIN code to your SIM card. This way, if anyone wants to make changes to your SIM card, they need the PIN code.
Before you set up a SIM card lock, you should ensure you know the PIN number given to you by your network provider. To set it up, on an Android device go to Settings > Lock screen and security > Other security settings > Set up SIM card lock. Then you can enable the slider for Lock SIM card.
Other Security Tips
As always, you should use strong individually-generated passwords. Don’t reuse old passwords or use the same password on multiple accounts.
Also, make sure your answers to password recovery questions aren’t publicly available, such as your mother’s maiden name.
Protect Your Device From SIM Attacks
Attacks on mobile devices are becoming increasingly sophisticated. Simjacker and SIM swap attacks both target SIM cards, but they do so in different ways. Simjacker is a technical attack which exploits vulnerabilities in software used by phone carrier companies. SIM swap attacks use social engineering to get a copy of your SIM card.
There are protections against these types of attack, such as keeping your personal information under wraps and setting up a SIM card lock.
Read Disclaimer
⚡Recommended: Post your new or used items on new olx platform with
unlimited storage and access to premium features. >>Get started<<
Correct
True
Yes
Thanks For the information.
Hello Everyone, If you required the service of a professional hacker to help you track your cheating partners and spouse cell phone activities remotely, i will advice you to contact this great, honest and ethical hacker who has worked for me in this past few weeks and his job is 100% incredible save and secure cos he was excellent in helping me hack my partner cell phone activities without physical access. You can reach out to him on his email and whatsapp.. EMAIL: jamesethicalhacker@gmail com or WHATSAPP: +1(775)374-4344
Trust me he will deliver a perfect and untraceable job for you.
Yes
Thanks