The moment the mandatory equipment is set up, the perpetrator obtains the concentrate on SIM card, either by surreptitious implies or social engineering strategies. Subsequently, the IMSI variety, which serves as a unique identifier for that SIM card in the mobile network, is extracted in the target SIM card using specialised components and compute