Be wary of tricks to steal Telegram OTP codes

Avatar photo

by Editor

According to a report from the Department of Information Security, impersonating agencies and organizations to fraudulently steal OTP codes on Telegram is one of 24 most common forms of fraud as of the first half of 2023. So how to recognize and avoid this scam? Let's Anti-Phishing (CLĐ) learn more through the article below.

I. Identifying characteristics and fraud tactics

Often a scammer will create a fake profile by stealing the image of a reputable person related to the victim to create credibility: often using trustworthy and attractive facts to ensure others' trust. and participate in the process.

The commonly used phishing process is as follows:

  • Impersonate the Telegram account of a government agency, financial institution, or a highly reputable person.
  • Text the victim with suspicious content that there are 2 fake accounts impersonating the victim, requiring the victim to take screenshots for verification.
  • Quickly log in to Telegram with the victim's phone number and select the forgot password function.
  • When taking a screenshot, the victim will accidentally reveal the OTP code just sent from Telegram.
  • Use that OTP code to illegally access the victim's Telegram account.

II. How to avoid having your account taken over by scammers

To avoid being scammed and having your account taken over as well as other consequences, you should pay attention to the following issues:

  • Increase knowledge and awareness:
  • Be wary of scams by learning about common tricks used by scammers.
  • This helps you recognize suspicious signals and avoid falling into traps.
  • Identity verification:
  • When you receive a call, text message, or request for personal information over the phone, verify the caller's identity by asking for address information, a contact phone number, or contacting them again via a news channel. other trust.
  • Protect personal information:
  • Do not share sensitive personal information, such as OTP numbers, passwords or account information, with anyone without a reasonable and trustworthy reason.
  • Verify the source:
  • Always verify the source before trusting and providing sensitive information.
  • Make sure you're communicating with a trustworthy person or organization by checking their contact information and verifying their reputation.
  • Use security software:
  • Install and update security, anti-virus and anti-phishing software to reduce the possibility of being attacked and scammed over the Internet.
  • Report suspicious behavior:
  • If you spot fraudulent activity or suspect someone is trying to scam you, report it immediately to the authorities or a competent organization to help stop the bad behavior.

Leave a Reply

Your email address will not be published. Required fields are marked *