The compromised data gives access to Home Location Register (HLR) details and machine copies for cyber criminal to manipulate network settings to intercept data directly from the network to make ...