Week 5: Sophisticated telephone phishing

07.02.2023 - The number of reports received by the NCSC rose slightly in the fifth week of 2023, with 726 reports. In a phishing case reported last week, the attackers promise to activate a fast 6G network. This phishing attempt is very sophisticated and comprises a number of stages. The attackers even use stolen personal details from the victim's client portal.

Telephone phishing: A drama in four acts

Phishers are thinking up all sorts of new tricks to persuade their victims to hand over access to the payment functions of their phone and their credit card details. A new and very sophisticated method was reported to the NCSC last week.

Act I: Establish trust and obtain information

The fraud begins with a WhatsApp call from someone claiming to be from a telecoms provider. The caller claims that the reason for phoning via WhatsApp is because the phone number is currently blocked owing to the activation of the 6G network, and offers to guide the victim through the unblocking process. The victim is promised compensation of CHF 400 for the blockage. During the phone call, the attacker enters the victim's phone number on the telecoms provider's official portal, which causes a one-time code to be issued. The bogus employee now asks the victim to read aloud the code, which has now arrived by text message. The code allows the attackers to log into the telecom provider's portal without needing any further details, and to look at the client documentation, including the contract.

The attackers exploit the fact that, in addition to the login method involving the user name and password, it is also possible to log in using only a one-time code sent to the person's phone. This means that the user name and password are not necessary.

During login, the user name and password are requested (left-hand image). But it is also possible to perform authentication using just a code sent to the registered phone number (right-hand image). Once the attackers know the one-time password, they can log in without needing any other details.
During login, the user name and password are requested (left-hand image). But it is also possible to perform authentication using just a code sent to the registered phone number (right-hand image). Once the attackers know the one-time password, they can log in without needing any other details.

Act II: Using the payment service

Now that they have access to the client account, the attackers can activate the phone's payment function. This function is used to make purchases from partner companies and pay for them via the phone bill. However, this function also needs to be activated using a one-time code. The limit for such purchases is CHF 400. In order not to exceed this limit, the attackers now make four purchases for EUR 100 each – probably gift vouchers as they are practically untraceable – from one of the registered businesses.

Here too, the attackers manage to persuade the victims to read the codes aloud. They claim that the amounts displayed will be credited to the victim.

The first PIN gives access to the client portal, while the others are probably used to purchase gift vouchers. Each deducted amount is EUR 100. The victims are tricked into thinking that the amounts will be credited to their account.
The first PIN gives access to the client portal, while the others are probably used to purchase gift vouchers. Each deducted amount is EUR 100. The victims are tricked into thinking that the amounts will be credited to their account.

Act III: Credit card phishing

Yet the attackers are not satisfied with only gift vouchers. Now they try and phish for credit card details. So someone else calls via WhatsApp, and also claims to be from customer services. To prove that they are genuine, they send the client contract which they obtained in Act I.

The adviser, called "Setephen", makes contact from a number in Pakistan. The original contract displayed comes from the client portal. Below that is the link to the phishing site.
The adviser, called "Setephen", makes contact from a number in Pakistan. The original contract displayed comes from the client portal. Below that is the link to the phishing site.

The message recipient is now supposed to enter their credit card details on a website that purports to be a page of the telecom provider. However, it is a phishing site.

The website with the apparent release of 6G (a standard which does not yet exist). In the right-hand image the entry fields for the credit card details. The explanation for communicating via WhatsApp is in larger font.
The website with the apparent release of 6G (a standard which does not yet exist). In the right-hand image the entry fields for the credit card details. The explanation for communicating via WhatsApp is in larger font.

Act IV: Happy ending

However, the message recipient thought this was a little too suspicious. They went to one of the telecom provider's shops, where the attack was quickly discovered and stopped. The telecoms provider was generous and did not debit the amount from the payment function. The phishing site was also rapidly blocked after the case was reported.

There is still one fly in the ointment: the private details in the contract fell into the hands of the attackers and could be used for further attacks.

Recommendations: 

  • Never reveal codes or passwords to people over the phone;
  • Set cost limits for payment functions that are as low as possible, or deactivate these functions. The telecoms providers can also permanently block these services;
  • If you are unsure, terminate the call and phone back using the provider's official number. You can find the phone number on the official website of the provider concerned;
  • Never allow yourself to be put under pressure on the phone;
  • Email sender IDs and phone numbers can easily be spoofed.

Last modification 07.02.2023

Top of page

https://www.ncsc.admin.ch/content/ncsc/en/home/aktuell/im-fokus/2023/wochenrueckblick_5.html