• a1studmuffin
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    1 year ago

    But shouldn’t part of that process involve verifying the customer on the phone is currently in possession of the number? ie. Sending a text with a code and having you read the code back to them. Perhaps they manage this by fooling the victim into giving them that info through some other method.

    Edit: thanks for the podcast recommendation btw, subscribed and downloading now!

    • T156@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 year ago

      They usually do the latter, by pretending to have lost their phone, and verifying through some other means, whether that be from the code, or questions.

      • a1studmuffin
        link
        fedilink
        English
        arrow-up
        3
        ·
        1 year ago

        Yeah I listened to the podcast recommended a few replies back, great episode if you haven’t listened already - it’s hilarious how easily they can social engineer their way into accounts once they know the process:

        https://darknetdiaries.com/episode/118/