• Gloomy Bagel 🥯
    link
    fedilink
    English
    arrow-up
    7
    ·
    1 year ago

    but they call and pretend to be you and get the number ported to the SIM they have

    check out the Hot Swaps episode of Darknet Diaries

    • a1studmuffin
      link
      fedilink
      English
      arrow-up
      3
      ·
      edit-2
      1 year ago

      But shouldn’t part of that process involve verifying the customer on the phone is currently in possession of the number? ie. Sending a text with a code and having you read the code back to them. Perhaps they manage this by fooling the victim into giving them that info through some other method.

      Edit: thanks for the podcast recommendation btw, subscribed and downloading now!

      • T156@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 year ago

        They usually do the latter, by pretending to have lost their phone, and verifying through some other means, whether that be from the code, or questions.

        • a1studmuffin
          link
          fedilink
          English
          arrow-up
          3
          ·
          1 year ago

          Yeah I listened to the podcast recommended a few replies back, great episode if you haven’t listened already - it’s hilarious how easily they can social engineer their way into accounts once they know the process:

          https://darknetdiaries.com/episode/118/