![]() Īrmed with these details, the fraudster contacts the victim's mobile telephone provider. ![]() The scam begins with a fraudster gathering personal details about the victim, either by use of phishing emails, by buying them from organised criminals, or by directly socially engineering the victim. This feature is normally used when a customer has lost or had their phone stolen, or is switching service to a new phone. The fraud exploits a mobile phone service provider's ability to seamlessly port a phone number to a device containing a different subscriber identity module (SIM).
0 Comments
Leave a Reply. |