Table of Contents 64q43
Last Wednesday (05), the information went public that the current minister of justice, Sérgio Moro, It would have been Telegram, with prosecutors in the 2017 conviction of former president Luiz Inácio Lula da Silva, published by the website The Intercept. The case is being investigated by the Federal Public Ministry in conjunction with the Federal Police. 3pn6r
“We inform you that yesterday (5th) there was an attempt to break into the cell phone of the Minister of Justice and Public Security, line (41) 9 9944-4140. Faced with the possibility of cloning the number, that line was abandoned. Investigation into the facts is already underway.
Federal Public Ministry and Federal Police in a note officially released on the 6th
Sérgio Moro case and information security 5zp1w
In the case of the minister Sérgio Moro, which had its cloned cell, the situation is even more complex, since it is the information of a federal minister that is possibly in the hands of hackers, and puts in check how much Information Security must be taken seriously.
Moro reported that he suspected the invasion when he received a call, around 18 pm, from his own number, and there was no one talking on the other end of the line. Soon after, he was informed by some people that there was someone exchanging messages on his . Telegram.

In the same week that the note from the Federal Public Ministry, The Intercept posted more conversations de Sérgio Moro with prosecutors and prosecutors from the More lava Jato, generating a debate about the political bias of the judge's actions, and about his interference in the actions of the lava Jato uncharacteristically for a magistrate.
"Hackers from judges, prosecutors, journalists and perhaps parliamentarians, as well as their auxiliary lines or fake scandals will not interfere with the mission."
Sergio Moro, Minister of Justice, in a statement on Twitter
Regardless of the political issue, it is worrying that hackers find it so easy to steal data from a member of the federal agency, and, as reported last Wednesday (12) in the news, at least 8 people linked to Operation Lava Jato were also attacked of the same type.
In 2018, there was the same case of telephone cloning, involving 3 ministers of the current Government. the s of Elisha Padilha, Carlos Marun e Osmar Terra received requests for money through messages on the WhatsApp Messenger, ing through the aforementioned. At the time, the 3 ministers made complaints to the Federal Police Superintendence, claiming to have the cell phone cloned.
Phone number cloning 3z693n
A cloning of phone numbers can happen in several ways. Some more sophisticated ones need a device to capture radio signals, capture via analog antenna and the like. Another way is by capturing data from your own Phone, through malicious applications and websites, or through Wi-Fi not safe.
The most common, and simplest, is called Yes Swap. It uses the fragility of telephone operators, who request simple data such as F and full name, to activate the number on a new chip. In possession of this data, the attacker makes with a telephone operator, activates an empty chip with his line and that's it, he has a cloned cell.
In some more specialized cases, how it happened in 2017, attackers have s within the telephone company, and they only need to know the victim's phone number or name to be able to exchange data.

From this, the attacker can access your messenger apps as WhatsApp Messenger e Telegram, to have access to your s and messages exchanged, and you can access other applications that depend solely on the phone number to be accessed.
How to avoid having a cloned cell phone 5b5gy
Well, this is a complex issue as it involves several factors. Starting with the lack of security that telephone operators work today, anyone who knows simple data such as F and full name can transfer and even cancel telephone lines.
The ideal thing to not have your cell phone cloned is to always check where we fill in our data on the Internet, not to open suspicious links that come from messenger applications and always check that the sites you are going to put your data on have a security certificate. Using antivirus programs, periodically scanning your computer for threats, and avoiding piracy or pornography sites, which are the sites that hackers often use to steal data, are other ways to avoid cloning.
In the case of Telegram, there is still the possibility of data being stolen through a computer, as the messenger does not require a link with the 's phone to be used on the Web. So it is important to be careful with your data, so as not to become a victim of Phishing.
To prevent your s and App data from being easily accessed by hackers, the ideal is to use a 2 factor authentication, which is already offered by management apps and services, but which can also be purchased externally, using specific Apps for that service.
- No WhatsApp, go to Settings > > 2-Step Verification > Activate;
- No Telegram, go to Settings > Privacy & Security > 2-Step Verification;
A 2 factor authentication, as the name suggests, uses 2 identity checkpoints. The first, which is done with data, which can be emails, names, and, in the case of messengers, your phone number. The second verification is done through a code that is sent to your email or phone, so you can enter it in the App and your identity.
Apps like Authy and Google Authenticator can increase security 3amo
There are applications that do this security management and let you save your important s in a safe way, managing with 2 factor authentication so that there are no risks. O authy for example, lets you manage s WhatsApp, Telegram, Google , Twitter, Facebook, Count Microsoft, iTunes, Dropbox and even from Fortnite.

O authy is available in both google store on android how much in Apple's App Store and can be ed and configured quickly.
Another App that works very well is the Google Authenticator. His proposal is to generate codes for two-step verification on your smartphone. Athenticator also works with multiple providers and s, reads QR Codes without internet access, has automatic configuration via QR code and already has the dark theme as a design option. You can Google Authenticator for Android version ou iOS.
Did you like any of the apps or did you already know them? Leave your comment in the fields below.