Malaysian supplying identity catchers in text scams nabbed

- Advertisement -

A Malaysian suspected of supplying an International Mobile Subscriber Identity (IMSI) catcher used in text scams in the country was arrested yesterday by joint operatives of the PNP-Anti cybercrime Group, Cybercrime Investigation and Coordinating Center (CICC), Bureau of Immigration (BI), and the National Telecommunications Commission (NTC).

The suspect, identified as Thiang Choon Wee, is believed to be the head of a syndicate supplying IMSI catchers in text scams.

“This government, especially the Filipino people, will not allow us to be played with by foreign scammers. We will fight it,” CICC executive director Alexander Ramos said in a statement.

- Advertisement -

The CICC, an attached agency of the Department of Information and Communication Technology (DICT), started monitoring the IMSI supplier last October.

“We patiently waited for the big fish to surface before we conducted the operation,” Ramos said.

The PNP Anti-Cybercrime Group said the suspect is facing multiple charges, including violation of the Philippine Radio Stations and Radio Communications Regulation Act, the SIM Registration Act, the Data Privacy Act in relation to Republic Act 10175 or the Cybercrime Prevention Act; and Misuse of Devices under RA 10175.

The ACG said the Malaysian, nabbed in an entrapment operation on E. Rodriguez Ave., was arrested “for selling prohibited text blast machine capable of mass SMS broadcasting without the need for a database, SIM card, or WiFi.”

ACG acting director Brig. Gen. Bernard Yang said: “This successful operation reflects our commitment to protecting the public from technological misuse and ensuring that those who violate the law are brought to justice.”

“Let this serve as a reminder that the PNP ACG remains steadfast in its mission to safeguard the cyber environment and uphold public trust,” added Yang.

An IMSI catcher is an electronic device that tracks and intercepts mobile phone communications. It is also referred to as “Stingray,” a rogue cell tower, fake cell tower, cell site simulator, or drop boxes.

IMSI catchers work by mimicking an official cell tower and convincing nearby phones that the IMSI catcher should connect them. Once connected, this allows it to collect the IMSI number which enables it to track location and activity as well as intercept text messages, calls, and data traffic of target phones.

CICC has discovered that IMSI catchers have been used in text scams

Last year, local telcos Smart Communication Inc. and Globe Telecom Inc. started working with the government to address the rampant text scam using “fake cell towers” to bypass network defenses.

Smart said scammers are using “fake cell towers” that mimic legitimate cell towers to push messages directly to customers in an area.

These messages often induce alarm to trick victims into clicking the attached link. They also can mask sender names or numbers to deceive victims into thinking they are receiving official messages from trusted sources.

Recently, fraudsters launched phishing attacks and tried to prompt victims to re-register their SIM or risk losing mobile service.

Globe warned its subscribers and raised the alarm on spoofing via IMSI catchers – devices that capture mobile users within a limited radius to send malicious SMS.

IMSI catchers, often carried by individuals or mounted on vehicles, force mobile phones in the vicinity to downgrade to the older 2G network. This allows fraudsters to send SMS from fake or impersonated numbers to devices connected to rogue cell towers. – With Victor Reyes

Author

- Advertisement -

Share post: