Cloned cell phone: what happened to Moro and how to protect yourself from it i3m18

bruno sena avatar
After Sérgio Moro has his cell phone cloned by hackers and leaked confidential conversations, the act opens an alert on information security; know how to protect yourself from it

Last Wednesday (05), the information went public that the current minister of justice, Sérgio Moro, It would have been Telegram, with prosecutors in the 2017 conviction of former president Luiz Inácio Lula da Silva, published by the website The Intercept. The case is being investigated by the Federal Public Ministry in conjunction with the Federal Police. 3pn6r

“We inform you that yesterday (5th) there was an attempt to break into the cell phone of the Minister of Justice and Public Security, line (41) 9 9944-4140. Faced with the possibility of cloning the number, that line was abandoned. Investigation into the facts is already underway.

Federal Public Ministry and Federal Police in a note officially released on the 6th

Sérgio Moro case and information security 5zp1w

In the case of the minister Sérgio Moro, which had its cloned cell, the situation is even more complex, since it is the information of a federal minister that is possibly in the hands of hackers, and puts in check how much Information Security must be taken seriously.

Moro reported that he suspected the invasion when he received a call, around 18 pm, from his own number, and there was no one talking on the other end of the line. Soon after, he was informed by some people that there was someone exchanging messages on his . Telegram.

Minister Sergio Moro in one of his speeches after having his cell phone cloned.
Moro says Hackers won't interfere with his work.

In the same week that the note from the Federal Public Ministry, The Intercept posted more conversations de Sérgio Moro with prosecutors and prosecutors from the More lava Jato, generating a debate about the political bias of the judge's actions, and about his interference in the actions of the lava Jato uncharacteristically for a magistrate.

"Hackers from judges, prosecutors, journalists and perhaps parliamentarians, as well as their auxiliary lines or fake scandals will not interfere with the mission."

Sergio Moro, Minister of Justice, in a statement on Twitter

Regardless of the political issue, it is worrying that hackers find it so easy to steal data from a member of the federal agency, and, as reported last Wednesday (12) in the news, at least 8 people linked to Operation Lava Jato were also attacked of the same type.

In 2018, there was the same case of telephone cloning, involving 3 ministers of the current Government. the s of Elisha Padilha, Carlos Marun e Osmar Terra received requests for money through messages on the WhatsApp Messenger, ing through the aforementioned. At the time, the 3 ministers made complaints to the Federal Police Superintendence, claiming to have the cell phone cloned.

Phone number cloning 3z693n

A cloning of phone numbers can happen in several ways. Some more sophisticated ones need a device to capture radio signals, capture via analog antenna and the like. Another way is by capturing data from your own Phone, through malicious applications and websites, or through Wi-Fi not safe.

The most common, and simplest, is called Yes Swap. It uses the fragility of telephone operators, who request simple data such as F and full name, to activate the number on a new chip. In possession of this data, the attacker makes with a telephone operator, activates an empty chip with his line and that's it, he has a cloned cell.

In some more specialized cases, how it happened in 2017, attackers have s within the telephone company, and they only need to know the victim's phone number or name to be able to exchange data.

Empty sim cards can be used to have a cloned cell phone
Sim Swap is the main phone line cloning technique

From this, the attacker can access your messenger apps as WhatsApp Messenger e Telegram, to have access to your s and messages exchanged, and you can access other applications that depend solely on the phone number to be accessed.

How to avoid having a cloned cell phone 5b5gy

Well, this is a complex issue as it involves several factors. Starting with the lack of security that telephone operators work today, anyone who knows simple data such as F and full name can transfer and even cancel telephone lines.

The ideal thing to not have your cell phone cloned is to always check where we fill in our data on the Internet, not to open suspicious links that come from messenger applications and always check that the sites you are going to put your data on have a security certificate. Using antivirus programs, periodically scanning your computer for threats, and avoiding piracy or pornography sites, which are the sites that hackers often use to steal data, are other ways to avoid cloning.

In the case of Telegram, there is still the possibility of data being stolen through a computer, as the messenger does not require a link with the 's phone to be used on the Web. So it is important to be careful with your data, so as not to become a victim of Phishing.

To prevent your s and App data from being easily accessed by hackers, the ideal is to use a 2 factor authentication, which is already offered by management apps and services, but which can also be purchased externally, using specific Apps for that service.

  • No WhatsApp, go to Settings > > 2-Step Verification > Activate;
  • No Telegram, go to Settings > Privacy & Security > 2-Step Verification;

A 2 factor authentication, as the name suggests, uses 2 identity checkpoints. The first, which is done with data, which can be emails, names, and, in the case of messengers, your phone number. The second verification is done through a code that is sent to your email or phone, so you can enter it in the App and your identity.

Apps like Authy and Google Authenticator can increase security 3amo

There are applications that do this security management and let you save your important s in a safe way, managing with 2 factor authentication so that there are no risks. O authy for example, lets you manage s WhatsApp, Telegram, Google , Twitter, Facebook, Count Microsoft, iTunes, Dropbox and even from Fortnite.

Authy in operation
The Authy App in operation, saving verification codes.

O authy is available in both google store on android how much in Apple's App Store and can be ed and configured quickly.

Another App that works very well is the Google Authenticator. His proposal is to generate codes for two-step verification on your smartphone. Athenticator also works with multiple providers and s, reads QR Codes without internet access, has automatic configuration via QR code and already has the dark theme as a design option. You can Google Authenticator for Android version ou iOS.

Did you like any of the apps or did you already know them? Leave your comment in the fields below.

Leave a comment Cancel reply 26673o
Related Posts 593ri

How to use Adobe Firefly to create AI-powered images and videos 5v3021

Learn how to generate images, text effects and videos with Adobe Firefly, directly from the browser and with results ready for commercial use.
Alexandre Marques Avatar
Learn more

Check out the winning apps from the 2025 Apple Design Awards 632m1j

Just days before the Worldwide Developers Conference 2025 (WWDC), Apple announced the winners of its Design Awards, aimed at apps for Apple devices. See
Alexandre Marques Avatar
Learn more

How to Facebook videos (and stories too) nj2u

Discover websites and apps to videos from Facebook in less than 5 minutes on PC, Android or iOS
victor pacheco avatar
Learn more