Fraudsters can empty your bank account in minutes. This is how they do it

SIM swapping is a sophisticated form of fraud and falls under social engineering. Fraudsters will distribute phishing emails, trying to ascertain as much personal information from victims as possible.

How it works

Your phone network will momentarily go blind without signal or Zero Bars and after a while a call will come through.

The Person on the other side will tell you that he is calling from Airtel, MTN, 9mobile or Glo depending on your network and that there is a problem in your mobile network.  He will instruct you to Please press 1 on your phone to get the network back.

If you press 1, the network will appear suddenly and almost immediately go blind again (Zero Bars) and by that action, your phone is #HACKED. It will appear as though your line is without network; meanwhile your SIM has been SWAPPED.

It is increasing by the day.  Within a second they will empty your bank account and cause you enough damage. The danger here is that, you will not get any alert of any transactions,

Responding to this Oluseyi Akindeinde, chief technical officer, Digital Encode, said that SIM swap is not new. “A lot of the perpetrators have insiders in the telecommunications operator that allow them to do this. Nothing really can be done to check it unless they checkmate the guys inside the telcos,” he said.

William Makatiani, managing director, Serianu, said that SIM swap has become a lucrative enterprise in Africa particularly because of the increased adoption of mobile money services and mobile based authentication.

“Attackers gather enough information on a target such as ID details; Phone numbers etc through social engineering and create a false identity. Using this information, the attackers can contact the service provider and request for SIM card replacement and thereafter start transacting using your phone.

“Since most people transact through their phones, a malicious attacker can easily access your bank account and transfer money to parallel malicious accounts that they’ve created. The attacker can intercept the authentication codes sent to your phone number and also read SMS messages that may be confidential,” he said.

 

Communicationweeks

Rate this item
(0 votes)