Sunday, April 28, 2024

Over 13,000 Mobile Phones Found Running on Same IMEI Number in India

Meerut police uncovered a security breach, where over 13,500 phones manufactured by Vivo found running with the same IMEI number.

IMEI number known as International Mobile Equipment Identity, a 15-digit number used to identify the device. The IMEI number is a unique one assigned to every phone all over the world.

13,000 Mobile Phones on Same IMEI

The Meerut police have filed a case against the company and its service center, the issue came into light after the police personnel submitted his mobile phone at cybercrime cell for examination.

The police personal submitted the new phone to the cybercrime cell as it was not working properly despite being repaired.

The investigation found that IMEI written on police person mobile box is different from the IMEI present in the mobile.

Cyber ​​cell asked the service center manager about the issue and they replied: “that the IMEI had not changed.”

Further, they contacted Jio company who’s sim card was used in the mobile, according to the company report more than 13557 mobiles in different states of the country.

“It appears to be negligence on part of the mobile phone company and criminals can use it to their advantage,” the police official said.

The police official said that cases have been registered under relevant sections and a team of experts has been called to look into the matter.

The same IMEI on multiple phones may pose serious security issues, criminals can use it to their advantage to perform various malicious activities.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

NETGEAR buffer Overflow Vulnerability Let Attackers Bypass Authentication

Some router models have identified a security vulnerability that allows attackers to bypass authentication.To...

5000+ CrushFTP Servers Hacked Using Zero-Day Exploit

Hackers often target CrushFTP servers as they contain sensitive data and are used for...

13,142,840 DDoS Attacks Targeted Organization Around The Globe

DDoS attacks are a significant and growing risk that can overpower websites, crash servers,...

Hackers Exploit Old Microsoft Office 0-day to Deliver Cobalt Strike

Hackers have leveraged an old Microsoft Office vulnerability, CVE-2017-8570, to deploy the notorious Cobalt...

Microsoft Publicly Releases MS-DOS 4.0 Source Code

In a historic move, Microsoft has made the source code for MS-DOS 4.0, one...

New SSLoad Malware Combined With Tools Hijacking Entire Network Domain

A new attack campaign has been discovered to be employed by the FROZEN#SHADOW, which...

Palo Alto Networks Shares Remediation Advice for Hacked Firewalls

Palo Alto Networks has issued urgent remediation advice after discovering a critical vulnerability, designated...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

WAAP/WAF ROI Analysis

Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles