• T156@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    ·
    2 years ago

    They usually do the latter, by pretending to have lost their phone, and verifying through some other means, whether that be from the code, or questions.

    • a1studmuffin
      link
      fedilink
      English
      arrow-up
      3
      ·
      2 years ago

      Yeah I listened to the podcast recommended a few replies back, great episode if you haven’t listened already - it’s hilarious how easily they can social engineer their way into accounts once they know the process:

      https://darknetdiaries.com/episode/118/