• a1studmuffin
    link
    fedilink
    English
    3
    edit-2
    1 year ago

    But shouldn’t part of that process involve verifying the customer on the phone is currently in possession of the number? ie. Sending a text with a code and having you read the code back to them. Perhaps they manage this by fooling the victim into giving them that info through some other method.

    Edit: thanks for the podcast recommendation btw, subscribed and downloading now!

    • @T156
      link
      English
      21 year ago

      They usually do the latter, by pretending to have lost their phone, and verifying through some other means, whether that be from the code, or questions.

      • a1studmuffin
        link
        fedilink
        English
        31 year ago

        Yeah I listened to the podcast recommended a few replies back, great episode if you haven’t listened already - it’s hilarious how easily they can social engineer their way into accounts once they know the process:

        https://darknetdiaries.com/episode/118/