The thugs first gather the personal details of the user with the help of fishing, vishing (voice fishing) and skimming.Then they somehow prepare the user to send a message from their number to the official number of the company. This message contains the number of the new SIM card, which is already with the fraudsters.- After sending the message, the customer's mobile number gets blocked after some time.
Website Link Here
Click Here For Sim Check
After the user's mobile number is blocked, they remove the duplicate sim of that number with the help of the customer's fake ID proof.- Then they change the customer's online banking password with the help of mobile number and OTP and then use it to transfer money or go shopping.
The thugs first gather the personal details of the user with the help of fishing, vishing (voice fishing) and skimming.Then they somehow prepare the user to send a message from their number to the official number of the company. This message contains the number of the new SIM card, which is already with the fraudsters.
- After sending the message, the customer's mobile number gets blocked after some time.After the user's mobile number is blocked, they remove the duplicate sim of that number with the help of the customer's fake ID proof.
- Then they change the customer's online banking password with the help of mobile number and OTP and then use it to transfer money or go shopping.