When my wife and I switched to Freedom Mobile, I’ve wondered about the security to stop things like SIM swap scams. I say that because the way that Freedom Mobile has set up their “My Freedom” customer portal doesn’t seem all that secure to me. Which is why a story from Global News caught my attention as it details the story of a couple who are Freedom Mobile customers that lost $140K in a SIM swap scam:
Wayne Stork and his wife Diana had not heard of the SIM swap scam until they became victims.
The GTA couple did nothing wrong but they lost about $140,000 anyway.
“It’s a nightmare,” Wayne told Global News in a television interview, his wife Diana at his side.
“We’re doing this, in part, to get the word out,” Diana said.
The Storks are longtime customers of Freedom Mobile. Last September, when the couple were at home, Wayne’s phone suddenly stopped working.
“My phone went into SOS mode, it was deactivated,” he said.
From that point, Wayne had no use of the phone, but someone else had access to the personal information attached to it.
“He (Wayne) was watching his accounts drain of money, that’s when the panic set in,” Diana said.
Over the next 24 hours, scammers had gained access to Wayne’s stock trading account and other accounts, including a cryptocurrency one that contained the proceeds from an inheritance.
“The Bitcoin was worth $140,000, and we lost that,” Diana said.
When the couple called Freedom Mobile’s customer service line, they say a representative said records showed someone had obtained a new SIM card in a retail location in Toronto, apparently claiming to be Stork.
Stork says the phone representative asked “weren’t you in the store yesterday to get a new SIM card?” to which Stork said no, it wasn’t him.
So you’re likely wondering how a SIM swap scam ends up in someone losing a lot of cash. Well, people often use their cell phones, specifically text messaging, to receive multi factor authentication codes for the financial institutions or online services that they use. So if a threat actor can get their hands on your cell phone number and some other information like passwords and the like, they can drain you of all your cash.
Now while this incident didn’t involve the “My Freedom” customer portal, it does suggest that Freedom Mobile does have weaknesses in terms of preventing this sort of scam from happening. After all, it should not be possible, or at least very difficult to walk into a retail location and execute this scam in 2024. In fact, I pinged my “off the record” contacts at Rogers, TELUS, and Bell. While they don’t rule out the possibility of this happening with them, and they don’t know the specifics of how this incident was executed, all of them say that this would be far more difficult to execute with them because of the security measures that they have in place. Or put another way, they’re throwing shade on whatever security measures that Freedom Mobile does or more importantly doesn’t have because they assume that they can do better. I’m not sure that I would make that assumption. But that’s just me. And what makes this worse is that now that this story is out there, other threat actors will specifically target Freedom Mobile because the perception will be that they are an easier target in terms of executing this scam. That’s bad for Freedom Mobile, and its customers.
Now if you’re worried about being a victim of a SIM swapping, the Global News article as well as the link to what a SIM swap is has some actionable information. But the one thing that you could really do to protect yourself is use app based multi factor authentication rather than text message based multi factor authentication wherever possible. Because the second that you do that, the safer you become as that’s not tied to the SIM card in your phone. That does require financial institutions and online services to move in that direction. So you may be stuck with text message based multi factor for a while. Which means it’s up to carriers like Freedom Mobile to up their game to protect their customers. Let’s see if Freedom Mobile does that now that this incident is out in the public domain.
A New Outbound Calling #Scam Using Rogers Name Is Making The Rounds
Posted in Commentary with tags Rogers, Scam on April 24, 2024 by itnerdI’ve noted an increase in phone calls coming to my cell phone and my home phone lately. Normally I either don’t answer or punt the calls to voice mail as I suspected that these calls are scam calls. Besides, anyone who wanted to talk to me would leave a voice mail for me. But what happens almost 100% of the time is that the caller doesn’t leave a message. That suggests to me that this view of these being scam calls is likely accurate. But recently, I decided to answer the call to see what the deal was.
The call I got was from a “John Wilson” calling on behalf of Rogers. I put the name in quotes because I guarantee that it was not this caller’s real name. I say that because that’s a very Anglo-Saxon name. But the person on the other end had a pretty easy to detect South Asian accent. That’s always a red flag. Now to be fair, Canadian telcos have been known to use offshore call centres for business generation. And a lot of times those offshore call centres are located in South Asia. But I texted a contact within Rogers who was in a position to know if they have currently contracted out any business generation activities like this and they almost immediately texted back saying no.
So what “Mr. Wilson” was presenting to me was a deal that would cut the price of my “services” by $20-$30 a month. What was interesting was that he never said what “services” that I had which he could save me money on. He then asked me if I was interested in this deal. That’s when I had some fun with him and asked him point blank if he knew who I was and what Rogers services that I had. I did this because Rogers and their contractors from my experience already know who you are and what services you have with them. Thus if they can’t answer those question, it’s likely a scam. Now while this isn’t a 100% bulletproof test as evidenced by this example, it’s good enough that I rely on it. “Mr. Wilson” not only was unable to answer those questions, but he clearly got flustered as I knocked him off his script. Thus confirming that this is a scam.
I told him to have a nice day and hung up on him. But this suggests to me that there’s a threat actor or actors out there that are doing an aggressive outbound scam call campaign trying to leverage the fact that Canadians pay too much money for their telco services. And I say aggressive because I get three to five calls a day from numbers that are from the 647 area code. Now those numbers are highly likely to be spoofed. And the reason why they do that is to make you more likely to answer the call. The thing is, Rogers and their contractors show up on caller ID as Rogers. That’s not to say that a threat actor couldn’t spoof that as well. But Rogers wouldn’t use random 647 area code numbers to call from.
What’s the end game? I am not sure as I didn’t play along long enough to find out. Perhaps it’s meant to grab your credit card details or other financial details so that they can steal money from you? Perhaps if they call again, I’ll play along longer to try and find out. Then I’ll post an update to let you know. But I wanted to get this out there so that you’re aware that this scam is going on, and that you need to protect yourself by being vigilant.
Leave a comment »