Here’s What Hackers Can Do with Just Your Cell Phone Number

Andrezj

Level 6
Thread author
Nov 21, 2022
248

Scammers can use your phone number to impersonate, steal from, and harass you and others. Here's what to do if your info is compromised.

What can someone do with your phone number? I recently met a woman who was scammed when she was newly widowed. Immediately after the death of her husband, many people were in and out of her home, ostensibly to offer help. One of those people helped himself to the new widow’s personal information, including her cell phone number. Among other things, the scammer used her number to gain access to her social security benefits, which he transferred to a different beneficiary.


1674268467729.png
 
Last edited by a moderator:

Stopspying

Level 19
Verified
Top Poster
Well-known
Jan 21, 2018
814
Just go to the telco and change your phone number will do if you suspect your number has been compromised
True, but when you have say +20 years of contacts changing a number is a real pain. Sure, playing that off against the consequences of scammers hijacking your number it makes sense. One of the main problems in all of this is the weak security implemented by those business that get hacked, when it is their customers data that gets stolen and then used.

I go along with your list of suggested apps to install, a useful resource for anyone getting started in this matter.
 

piquiteco

Level 14
Oct 16, 2022
626
This is called a social engineering attack, if you catch an uninformed or unsuspecting person, you can fall for scams like this.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top