Liste des Groupes | Revenir à cm android |
On 3/16/2025 9:47 AM, Java Jive wrote:According to the post by Theo, going by the radio program me on BBC, the exact sequence was:
and went on to hack ...". Further, if you reread the original report in its entirety, how would he have persuaded EDF to give up the victim's mobile number without personal identifying information that came from access to his emails?"
EDF explained the fraudster had his name and email address and had asked EDF to give them his mobile number, which the company did.
"I said, 'Why would you do that?' They said the person had gone through security. 'With a name and email address', I asked?," he said.
"EDF said, 'Yes' - and then offered me a £50 goodwill gesture to close the case.
"
You seem determined to not know the facts. So that you
can feel safe using 2FA?
Next, how would he have been able to confirm the request for a replacement SIM without being able to reply to the confirmatory email?As far as I can see, that part is not in the article. O2 never
>
details exactly how the SIM swap happened. The article is not
clear about all the details. Did the scammer have access to
security question answers? Was he just a smooth talker? I
don't see anyplace where that's mentioned. It's possible the email
was hacked first, but that's never stated. The implication is that
based on having some personal data, the scammer was able to
do a SIM swap. Once that's done, getting into the email is easy
because 2FA is a weak link.
Les messages affichés proviennent d'usenet.