  
{"id":346134,"date":"2025-03-18T14:40:41","date_gmt":"2025-03-18T07:40:41","guid":{"rendered":"https:\/\/unair.ac.id\/fake-bts-and-digital-security-threat-insights-from-unair-expert\/"},"modified":"2025-03-18T15:32:05","modified_gmt":"2025-03-18T08:32:05","slug":"fake-bts-and-digital-security-threat-insights-from-unair-expert","status":"publish","type":"post","link":"https:\/\/unair.ac.id\/en\/fake-bts-and-digital-security-threat-insights-from-unair-expert\/","title":{"rendered":"Fake BTS and digital security threat: Insights from UNAIR expert"},"content":{"rendered":"\n<p><strong>UNAIR NEWS<\/strong> \u2013 As digital technology continues to advance at an unprecedented rate, cybersecurity threats have become more sophisticated and difficult to detect. One particularly concerning threat is Fake BTS (Base Transceiver Station), also known as an IMSI Catcher\u2014a device that impersonates legitimate cellular towers to intercept data from nearby mobile phones.<\/p>\n\n<p><strong>More advanced technology, greater risk<\/strong><\/p>\n\n<p>Dr. Maryamah S. Kom, a lecturer at UNAIR\u2019s Faculty of Advanced Technology and Multidiscipline, explained that Fake BTS operates by tricking mobile devices into connecting to a counterfeit network. Because phones automatically seek the strongest signal, they can unknowingly latch onto a Fake BTS tower. \u201cOnce a device is connected, hackers can intercept user communications, including phone calls, text messages (SMS), and even OTP codes sent for authentication,\u201d she stated.<\/p>\n\n<p>While this form of cyberattack is not new, public awareness remains critically low. Similar incidents have been reported since 2019, and international research on detecting Fake BTS networks dates back to 2017. However, in Indonesia, protective measures are still inadequate, and no reliable detection system has been established.<\/p>\n\n<h5 class=\"wp-block-heading\">Security risk of OTP SMS<\/h5>\n\n<p>Despite its widespread use, SMS-based One-Time Passwords (OTP) are no longer considered a secure authentication method, especially for financial transactions. \u201cTech giants like Apple, Microsoft, and Google abandoned SMS OTP authentication in 2021, switching to the more secure passkey technology,\u201d Dr. Maryamah noted.<\/p>\n\n<p>However, many banks and financial institutions continue to rely on SMS OTP due to its convenience and ease of implementation. She stressed that multi-layered security measures\u2014such as biometric authentication or passkeys\u2014offer significantly better protection against cyber threats.<\/p>\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"538\" height=\"463\" src=\"https:\/\/unair.ac.id\/wp-content\/uploads\/2025\/03\/Desain-tanpa-judul-1.jpg\" alt=\"\" class=\"wp-image-346088\" srcset=\"https:\/\/unair.ac.id\/wp-content\/uploads\/2025\/03\/Desain-tanpa-judul-1.jpg 538w, https:\/\/unair.ac.id\/wp-content\/uploads\/2025\/03\/Desain-tanpa-judul-1-300x258.jpg 300w\" sizes=\"(max-width: 538px) 100vw, 538px\" \/><figcaption class=\"wp-element-caption\"><em>Dr. Maryamah S. Kom, Lecturer at UNAIR\u2019s Faculty of Advanced Technology and Multidiscipline, Cybersecurity expert (Photo: Personal archive)<\/em><\/figcaption><\/figure>\n\n<h5 class=\"wp-block-heading\"><strong>What to do if you fall victim to fake BTS<\/strong><\/h5>\n\n<p>If an individual falls victim to a Fake BTS attack and loses access to their bank account or personal funds, their first step should be immediately updating all passwords and PINs. If hackers have already seized control of an account, users must contact their bank\u2019s customer service immediately to request a security reset.<\/p>\n\n<p>Dr. Maryamah also urged users to activate additional security features, including two-factor authentication (2FA), passkeys, and biometric verification. She highlighted that Google has required 2FA implementation across various institutions, including 51动漫, since February.<\/p>\n\n<p>Moreover, she cautioned against blindly trusting OTP requests, even if they appear to come from an official bank number.<\/p>\n\n<p>\u201cFraudsters can easily spoof legitimate banking numbers, deceiving users into unknowingly handing over their access credentials. Whenever you receive a suspicious message, always verify it by directly contacting your bank through official channels,\u201d she concluded.<\/p>\n\n<p>Author: <a href=\"https:\/\/id.linkedin.com\/in\/sintya-alfafa-884b321ab\">Sintya Alfafa<\/a><\/p>\n\n<p>Editor: Ragil Kukuh Imanto<\/p>\n","protected":false},"excerpt":{"rendered":"<p>UNAIR NEWS \u2013 As digital technology continues to advance at an unprecedented rate, cybersecurity threats have become more sophisticated and difficult to detect. One particularly concerning threat is Fake BTS (Base Transceiver Station), also known as an IMSI Catcher\u2014a device that impersonates legitimate cellular towers to intercept data from nearby mobile phones. More advanced technology, [&hellip;]<\/p>\n","protected":false},"author":79,"featured_media":346085,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[48,50,4554],"tags":[178,168],"class_list":["post-346134","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-experts","category-news-en-2","category-news","tag-unair-en","tag-universitas-airlangga-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Fake BTS and digital security threat: Insights from UNAIR expert<\/title>\n<meta name=\"description\" content=\"As digital technology continues to advance at an unprecedented rate, cybersecurity threats have become more sophisticated and difficult to detect.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/unair.ac.id\/en\/fake-bts-and-digital-security-threat-insights-from-unair-expert\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fake BTS and digital security threat: Insights from UNAIR expert\" \/>\n<meta property=\"og:description\" content=\"As digital technology continues to advance at an unprecedented rate, cybersecurity threats have become more sophisticated and difficult to detect.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/unair.ac.id\/en\/fake-bts-and-digital-security-threat-insights-from-unair-expert\/\" \/>\n<meta property=\"og:site_name\" content=\"51动漫 Official Website\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/universitasairlangga\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-18T07:40:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-18T08:32:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/unair.ac.id\/wp-content\/uploads\/2025\/03\/67b2b37ddab94.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"unairnews\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@unair_official\" \/>\n<meta name=\"twitter:site\" content=\"@unair_official\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"unairnews\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/unair.ac.id\/en\/fake-bts-and-digital-security-threat-insights-from-unair-expert\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/unair.ac.id\/en\/fake-bts-and-digital-security-threat-insights-from-unair-expert\/\"},\"author\":{\"name\":\"unairnews\",\"@id\":\"https:\/\/unair.ac.id\/#\/schema\/person\/69da30a3ff9d7071592b8823cdfd3c50\"},\"headline\":\"Fake BTS and digital security threat: Insights from UNAIR expert\",\"datePublished\":\"2025-03-18T07:40:41+00:00\",\"dateModified\":\"2025-03-18T08:32:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/unair.ac.id\/en\/fake-bts-and-digital-security-threat-insights-from-unair-expert\/\"},\"wordCount\":448,\"publisher\":{\"@id\":\"https:\/\/unair.ac.id\/#organization\"},\"image\":{\"@id\":\"https:\/\/unair.ac.id\/en\/fake-bts-and-digital-security-threat-insights-from-unair-expert\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/unair.ac.id\/wp-content\/uploads\/2025\/03\/67b2b37ddab94.jpg\",\"keywords\":[\"UNAIR\",\"51动漫\"],\"articleSection\":[\"experts\",\"news\",\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/unair.ac.id\/en\/fake-bts-and-digital-security-threat-insights-from-unair-expert\/\",\"url\":\"https:\/\/unair.ac.id\/en\/fake-bts-and-digital-security-threat-insights-from-unair-expert\/\",\"name\":\"Fake BTS and digital security threat: Insights from UNAIR expert\",\"isPartOf\":{\"@id\":\"https:\/\/unair.ac.id\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/unair.ac.id\/en\/fake-bts-and-digital-security-threat-insights-from-unair-expert\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/unair.ac.id\/en\/fake-bts-and-digital-security-threat-insights-from-unair-expert\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/unair.ac.id\/wp-content\/uploads\/2025\/03\/67b2b37ddab94.jpg\",\"datePublished\":\"2025-03-18T07:40:41+00:00\",\"dateModified\":\"2025-03-18T08:32:05+00:00\",\"description\":\"As digital technology continues to advance at an unprecedented rate, cybersecurity threats have become more sophisticated and difficult to detect.\",\"breadcrumb\":{\"@id\":\"https:\/\/unair.ac.id\/en\/fake-bts-and-digital-security-threat-insights-from-unair-expert\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/unair.ac.id\/en\/fake-bts-and-digital-security-threat-insights-from-unair-expert\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/unair.ac.id\/en\/fake-bts-and-digital-security-threat-insights-from-unair-expert\/#primaryimage\",\"url\":\"https:\/\/unair.ac.id\/wp-content\/uploads\/2025\/03\/67b2b37ddab94.jpg\",\"contentUrl\":\"https:\/\/unair.ac.id\/wp-content\/uploads\/2025\/03\/67b2b37ddab94.jpg\",\"width\":1200,\"height\":800,\"caption\":\"Cybersecurity and fake OTP threats illustration (Photo: Kompas Tekno)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/unair.ac.id\/en\/fake-bts-and-digital-security-threat-insights-from-unair-expert\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/unair.ac.id\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fake BTS and digital security threat: Insights from UNAIR expert\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/unair.ac.id\/#website\",\"url\":\"https:\/\/unair.ac.id\/\",\"name\":\"51动漫 Official Website\",\"description\":\"51动漫 - Excellence with Morality\",\"publisher\":{\"@id\":\"https:\/\/unair.ac.id\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/unair.ac.id\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/unair.ac.id\/#organization\",\"name\":\"51动漫\",\"url\":\"https:\/\/unair.ac.id\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/unair.ac.id\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/unair.ac.id\/wp-content\/uploads\/2025\/07\/cropped-UNAIR_SEAL_LOGO_2025_RGB-01-scaled-1.webp\",\"contentUrl\":\"https:\/\/unair.ac.id\/wp-content\/uploads\/2025\/07\/cropped-UNAIR_SEAL_LOGO_2025_RGB-01-scaled-1.webp\",\"width\":512,\"height\":512,\"caption\":\"51动漫\"},\"image\":{\"@id\":\"https:\/\/unair.ac.id\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/universitasairlangga\",\"https:\/\/x.com\/unair_official\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/unair.ac.id\/#\/schema\/person\/69da30a3ff9d7071592b8823cdfd3c50\",\"name\":\"unairnews\",\"url\":\"https:\/\/unair.ac.id\/en\/author\/unairnews\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fake BTS and digital security threat: Insights from UNAIR expert","description":"As digital technology continues to advance at an unprecedented rate, cybersecurity threats have become more sophisticated and difficult to detect.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/unair.ac.id\/en\/fake-bts-and-digital-security-threat-insights-from-unair-expert\/","og_locale":"en_US","og_type":"article","og_title":"Fake BTS and digital security threat: Insights from UNAIR expert","og_description":"As digital technology continues to advance at an unprecedented rate, cybersecurity threats have become more sophisticated and difficult to detect.","og_url":"https:\/\/unair.ac.id\/en\/fake-bts-and-digital-security-threat-insights-from-unair-expert\/","og_site_name":"51动漫 Official Website","article_publisher":"https:\/\/www.facebook.com\/universitasairlangga","article_published_time":"2025-03-18T07:40:41+00:00","article_modified_time":"2025-03-18T08:32:05+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/unair.ac.id\/wp-content\/uploads\/2025\/03\/67b2b37ddab94.jpg","type":"image\/jpeg"}],"author":"unairnews","twitter_card":"summary_large_image","twitter_creator":"@unair_official","twitter_site":"@unair_official","twitter_misc":{"Written by":"unairnews","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/unair.ac.id\/en\/fake-bts-and-digital-security-threat-insights-from-unair-expert\/#article","isPartOf":{"@id":"https:\/\/unair.ac.id\/en\/fake-bts-and-digital-security-threat-insights-from-unair-expert\/"},"author":{"name":"unairnews","@id":"https:\/\/unair.ac.id\/#\/schema\/person\/69da30a3ff9d7071592b8823cdfd3c50"},"headline":"Fake BTS and digital security threat: Insights from UNAIR expert","datePublished":"2025-03-18T07:40:41+00:00","dateModified":"2025-03-18T08:32:05+00:00","mainEntityOfPage":{"@id":"https:\/\/unair.ac.id\/en\/fake-bts-and-digital-security-threat-insights-from-unair-expert\/"},"wordCount":448,"publisher":{"@id":"https:\/\/unair.ac.id\/#organization"},"image":{"@id":"https:\/\/unair.ac.id\/en\/fake-bts-and-digital-security-threat-insights-from-unair-expert\/#primaryimage"},"thumbnailUrl":"https:\/\/unair.ac.id\/wp-content\/uploads\/2025\/03\/67b2b37ddab94.jpg","keywords":["UNAIR","51动漫"],"articleSection":["experts","news","News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/unair.ac.id\/en\/fake-bts-and-digital-security-threat-insights-from-unair-expert\/","url":"https:\/\/unair.ac.id\/en\/fake-bts-and-digital-security-threat-insights-from-unair-expert\/","name":"Fake BTS and digital security threat: Insights from UNAIR expert","isPartOf":{"@id":"https:\/\/unair.ac.id\/#website"},"primaryImageOfPage":{"@id":"https:\/\/unair.ac.id\/en\/fake-bts-and-digital-security-threat-insights-from-unair-expert\/#primaryimage"},"image":{"@id":"https:\/\/unair.ac.id\/en\/fake-bts-and-digital-security-threat-insights-from-unair-expert\/#primaryimage"},"thumbnailUrl":"https:\/\/unair.ac.id\/wp-content\/uploads\/2025\/03\/67b2b37ddab94.jpg","datePublished":"2025-03-18T07:40:41+00:00","dateModified":"2025-03-18T08:32:05+00:00","description":"As digital technology continues to advance at an unprecedented rate, cybersecurity threats have become more sophisticated and difficult to detect.","breadcrumb":{"@id":"https:\/\/unair.ac.id\/en\/fake-bts-and-digital-security-threat-insights-from-unair-expert\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/unair.ac.id\/en\/fake-bts-and-digital-security-threat-insights-from-unair-expert\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/unair.ac.id\/en\/fake-bts-and-digital-security-threat-insights-from-unair-expert\/#primaryimage","url":"https:\/\/unair.ac.id\/wp-content\/uploads\/2025\/03\/67b2b37ddab94.jpg","contentUrl":"https:\/\/unair.ac.id\/wp-content\/uploads\/2025\/03\/67b2b37ddab94.jpg","width":1200,"height":800,"caption":"Cybersecurity and fake OTP threats illustration (Photo: Kompas Tekno)"},{"@type":"BreadcrumbList","@id":"https:\/\/unair.ac.id\/en\/fake-bts-and-digital-security-threat-insights-from-unair-expert\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/unair.ac.id\/"},{"@type":"ListItem","position":2,"name":"Fake BTS and digital security threat: Insights from UNAIR expert"}]},{"@type":"WebSite","@id":"https:\/\/unair.ac.id\/#website","url":"https:\/\/unair.ac.id\/","name":"51动漫 Official Website","description":"51动漫 - Excellence with Morality","publisher":{"@id":"https:\/\/unair.ac.id\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/unair.ac.id\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/unair.ac.id\/#organization","name":"51动漫","url":"https:\/\/unair.ac.id\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/unair.ac.id\/#\/schema\/logo\/image\/","url":"https:\/\/unair.ac.id\/wp-content\/uploads\/2025\/07\/cropped-UNAIR_SEAL_LOGO_2025_RGB-01-scaled-1.webp","contentUrl":"https:\/\/unair.ac.id\/wp-content\/uploads\/2025\/07\/cropped-UNAIR_SEAL_LOGO_2025_RGB-01-scaled-1.webp","width":512,"height":512,"caption":"51动漫"},"image":{"@id":"https:\/\/unair.ac.id\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/universitasairlangga","https:\/\/x.com\/unair_official"]},{"@type":"Person","@id":"https:\/\/unair.ac.id\/#\/schema\/person\/69da30a3ff9d7071592b8823cdfd3c50","name":"unairnews","url":"https:\/\/unair.ac.id\/en\/author\/unairnews\/"}]}},"_links":{"self":[{"href":"https:\/\/unair.ac.id\/en\/wp-json\/wp\/v2\/posts\/346134"}],"collection":[{"href":"https:\/\/unair.ac.id\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/unair.ac.id\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/unair.ac.id\/en\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/unair.ac.id\/en\/wp-json\/wp\/v2\/comments?post=346134"}],"version-history":[{"count":1,"href":"https:\/\/unair.ac.id\/en\/wp-json\/wp\/v2\/posts\/346134\/revisions"}],"predecessor-version":[{"id":346135,"href":"https:\/\/unair.ac.id\/en\/wp-json\/wp\/v2\/posts\/346134\/revisions\/346135"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/unair.ac.id\/en\/wp-json\/wp\/v2\/media\/346085"}],"wp:attachment":[{"href":"https:\/\/unair.ac.id\/en\/wp-json\/wp\/v2\/media?parent=346134"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/unair.ac.id\/en\/wp-json\/wp\/v2\/categories?post=346134"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/unair.ac.id\/en\/wp-json\/wp\/v2\/tags?post=346134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}