Scammers Exploit Mobile Payments and Logins

Forwarding a verification code from an SMS can lead to a phone bill that is higher than expected. Scammers have discovered a simple way to exploit mobile payments, which are charges billed directly through your mobile carrier. The same trick can also be used to bypass two-factor authentication. They do not need access to your account or your password. In many cases, your phone number and your trust are enough.

TL;DR: Never Share an SMS Verification Code

One SMS Code and Thousands Gone

The process is surprisingly simple. The attacker first needs your phone number. They may find it in publicly available sources or request it under various pretexts, often through social media. Once the number is used to initiate a mobile payment, a verification SMS is sent to confirm the transaction.

Redamp.io | Messenger message scam

This is where manipulation begins. The scammer asks the victim to share the code. There are several common scenarios, such as a supposed contest win, a promised financial reward, or an urgent request to verify an account. The common goal is to create a sense of legitimacy and urgency that encourages the victim to respond without thinking. As soon as the code is forwarded, the payment is confirmed. The charge then appears on the mobile carrier’s bill or is deducted from prepaid credit.

Redamp.io | Continuing messenger message scam

The success of these attacks is not based on technical complexity but on psychology. Scammers exploit trust, time pressure, and positive emotions, such as the promise of a prize. The message often comes from the account of someone the victim knows. That account may have been compromised earlier, for example after the owner entered their credentials on a phishing website. Once attackers gain access, they use the account to send messages to other contacts. As a result, the victim believes they are communicating with someone familiar rather than with a criminal.

The Same Trick with Two-Factor Authentication

The scam does not stop with mobile payments. The same approach can be used to bypass two-factor authentication, which is designed to add an extra layer of protection during login. In addition to a password, users must enter a one-time code that confirms their identity. However, if the user shares that code, the attacker can gain access to email, social media accounts, or other online services. Combined with additional information provided by the victim, this may even result in access to online banking. Two-factor authentication itself does not fail. The problem occurs when the account holder voluntarily shares the verification code.

If You Have Already Shared the Code, Act Quickly

Scams Are Constantly Evolving. Stay One Step Ahead.