This post recounts an attempt at fraud via SMS and voice call with a fake voice, targeting an elderly person. Although this type of fraud is not new, the way it was executed deserves further examination. The article aims to be informative and comprehensible, in order to increase awareness among non-professionals.
I especially thank the friend who allowed me to experience and analyze this type of attack.
The mother (hereafter referred to as M) of a friend (son of M, hereafter referred to as F) receives an SMS at 12:32 that appears to be a simple scam:
Hi Mom, I lost my phone. This is my new number. +393791234567 Please send me a message on WhatsApp. I can be reached there! ( Attachment 1 )
We should be trained not to believe in this type of SMS, however, the sender of the message provides the full name of F. This detail makes it more credible.
Anomalies:
Understandably, a few minutes later, M responds to the SMS message with a confirmation. Almost instantly, M receives a call from the attacker (hereafter referred to as A). The sender’s number is still +393791234567 but the phone displays it with F’s name. The voice on the phone is that of F, claiming to have lost the cellphone, dictating the new number, and then hanging up.
Anomalies:
Fortunately, shortly thereafter, F goes to M’s house, understands the situation, and calls me for advice. The attack is stopped, and the involved individuals are made aware and secured.
The attack drew my attention to two extremely relevant facts that make it extremely credible and effective:
By indirectly analyzing the various evidence left by A, I noticed that M’s address book contained two entries for F: the first one correct, saved on the cellphone, the second one fake, saved on Gmail. Since the cellphone is an Android, M’s address book displays a combination of local and Google elements. Without specific investigations, the elements appear identical. Upon closer examination of the fake element, I noticed that it was created moments before the first SMS.
Accessing Gmail allows us to see the latest events ( Attachment 2 ):
We see that:
In the Google account management, it is possible to check which sessions are active, and in particular which devices are connected ( Attachment 3 ):
We see that:
From there onwards, unfortunately, the Google data was not helpful enough. Checking M’s cellphone remotely, I found nothing abnormal; while I find the activity on S’s cellphone on the day of the attack to be a very interesting coincidence.
The analysis tells us that:
Securing requires:
In this specific case, the cellphones were mainly used as phones. I breathed a sigh of relief when I realized that there were no banking applications present.
It is now clear how the attack was structured:
If the attack I witnessed was thwarted, a brief investigation led me to understand that it is currently widespread and that unfortunately some elderly parents have fallen into the trap, losing several thousand Euros.
Current deep learning technologies that allow the creation of audio files with the voices of others are extremely dangerous. Outdated phones and insecure applications provide attackers with tools that allow them to create false identities very easily and effectively.
We should expect even more complex attacks, where phone calls are no longer simple monologues but real conversations.
We must be able to identify anomalies and perform control tests to understand if the person communicating digitally with us is who they claim to be or if they are simply impersonating someone else based on information easily available on the internet.
We must understand that since digital life blends with physical life, it requires the same level of attention: if driving on the road requires a license and attention, “driving” a cellphone that contains access to the bank account requires the same level of awareness and attention. Saving and using outdated cellphones, not updated or installing anything that appears on the screen out of curiosity, is NOT a good idea and can have serious consequences.
In this case, it turned out well, but in others that I have experienced, the attack was successful, and the bank account was emptied.