Port-Out Fraud Targets Your Private Accounts (2024)

Latest FCC Action

FCC Adopts Rules to Protect Consumers' Cell Phone Accounts(11/15/23)

More Consumer Information

  • Cell Phone Fraud
  • Porting: Keeping Your Phone Number When You Change Providers
  • eSIM Cards FAQ

What’s your most important financial number? Is it your Social Security number? The number on your bank account?

How about your mobile phone number?

Text messages are often used by banks, businesses and payment services to verify your identity when you request updates to your account. Savvy scammers know that by hijacking your mobile phone number they can assume your identity, intercept security protocols sent to your phone, and gain access to your financial and social media accounts.

The Porting-Out Scam: How It’s Done

One way to hijack your phone number is through a porting-out scam. Mobile phone numbers can legally be ported from one provider to the next when you switch your phone service. Phone companies have established safeguards to protect this process, such as having account holders set up a PIN or a password they must provide when calling about their account. But scammers with enough of your personal information can interfere, hijacking your phone number and with it your identity.

Scammers go after their target’s personal information, such as their name, address, birth date, PINs or passwords, and the last four digits of their Social Security number. Scammers may try to get this information by calling their target and impersonating a trusted business or institution, then asking a series of questions to gather as much data as possible. In some cases, the information may already be stolen and available on the dark web.

When scammers initiate a porting request, they con the victim’s phone company into believing the request is from the authorized account holder. If the scam is successful, the phone number will be ported to a different mobile device or service account set up by the scammer. This typically begins a race where the scammer, by receiving the victim’s private texts and calls, tries to reset the access credentials for as many of the victim’s financial and social media accounts as possible before the victim realizes they have lost service on their device. Once the scammer has access, they attempt to drain the victim’s bank accounts. In another variation, they attempt to sell or ransom back to the victim access to their social media accounts.

How to Protect Yourself

  • Be Proactive: If you don’t already have a PIN or a password to verify your identity when calling about your account, contact your phone company and ask about adding one.
  • Stay Vigilant: Enable both email and text notifications for financial and other important accounts. If you receive notice that changes to your account have been made without your knowledge, contact the business holding that account immediately to let them know that you didn’t authorize a change.
  • Don’t Respond: If someone calls or texts you and asks for personal information, do not provide it. If the caller claims to be from a business you are familiar with, hang up and call that business using a number you trust,such as the number on your bill, in a phone book or on the company’s website.
  • Don’t overshare: Guard personal details that can be used to verify your identity – such as the last four digits of your Social Security number, your phone number, your date of birth, the make and model of your car, your pet’s name, or your mother’s maiden name. And keep that information off social media.

Act Quickly

Typically, loss of service on your device – your phone going dark or only allowing 911 calls – is the first sign this has happened. If you suspect you have been a victim of a porting-out scam, take immediate action:

  • Contact your phone company
  • Contact your bank and other financial institutions
  • File a police report
  • Place a fraud alert on your credit reports and get copies of your report

File a complaint

If you feel you’re the victim of a porting-out scam, file a complaintwith the FCC for free. TheFCC Complaint Center FAQhas more information about the agency’s informal complaint process. You can also file complaints about identity theft and consumer fraud with the FTC.

Port-Out Fraud Targets Your Private Accounts (2024)

FAQs

What do fraudsters target? ›

Here are some to watch out for. Catch up on the developing stories making headlines. NEW YORK -- It's never fun to be scammed, but if you're a small business owner then falling for a scam can have long-lasting effects on a business, damaging client relationships and profit.

Can I block my number from being ported? ›

Tips to prevent phone porting

Contact your mobile service provider and request a PIN be placed on your account. Remove or hide personal information such as your date of birth, address and mobile number from social media accounts. Create strong and unique passwords for all your accounts.

Why would someone try to port my number? ›

Savvy scammers know that by hijacking your mobile phone number they can assume your identity, intercept security protocols sent to your phone, and gain access to your financial and social media accounts. One way to hijack your phone number is through a porting-out scam.

Can a scammer access my bank account with my phone number? ›

Having just your phone number doesn't give scammers direct access to your bank account. However, they can use it as a starting point for phishing attacks or SIM swap scams. If they succeed in these methods, they could potentially access your bank's 2FA codes sent via SMS.

Which is the most common way frauds are identified? ›

One of the most successful ways to identify fraud in businesses is to use an anonymous tip line (or website or hotline). According to the Association of Certified Fraud Examiners (ACF), tips are by far the most prevalent technique of first fraud detection (40 percent of instances).

What tools do fraudsters use? ›

Here are a dozen of the most common tactics used by scammers to fool victims and perpetuate fraud.
  • Spoofing.
  • Phishing.
  • Fake profiles.
  • Fake photos.
  • Fake entities.
Feb 3, 2020

What numbers Cannot be ported? ›

If the company you're switching to doesn't offer service in your area, your number won't be able to be ported. The number you're trying to port is no longer in service. Only numbers that are currently active are eligible to be ported. Your new provider does not have an interconnection agreement with your old provider.

What is a porting block? ›

CEJN's porting blocks make it possible to utilize/connect several hydraulic lines from a single pump to numerous tools as well as the possibility of connecting a pressure gauge. The blocks are available in five different sizes and designs with a varying number of ports.

What happens while your number is being ported? ›

Your Number is Still Your Phone Number

By porting your number over, you can avoid the unnecessary costs associated with making these changes also. Your number is your number. The thing that is being transferred during a port is merely the phone service from one carrier to another; ownership is not being transferred.

What information does a scammer need to access my bank account? ›

The easiest way to become a victim of a bank scam is to share your banking info — e.g., account numbers, PIN codes, social security number — with someone you don't know well and trust. If someone asks for sensitive banking details, proceed with caution.

Why is porting rejected? ›

Missing / Incorrect Account Number

Some carriers use the account number as another data point to verify a port order request. If the account number does not match up with what they have on file, your port will be rejected. The account number is often found on the customer's bill, and sometimes on the CSR.

Can a scammer do anything with your phone number? ›

Scammers can use your phone number to gather and release sensitive information to public sites and social media. They could also dump your information on the Dark Web for others to purchase and use.

Can someone steal your identity through your bank account? ›

Identity theft: Criminals can use your banking information and any other personal data they collect to steal your identity. These schemes are often employed to open new credit cards, receive your tax returns and commit other unpleasant forms of fraud.

Do banks refund scammed money? ›

If you paid by bank transfer or Direct Debit

Contact your bank immediately to let them know what's happened and ask if you can get a refund. Most banks should reimburse you if you've transferred money to someone because of a scam.

What to do if a scammer has your bank account number? ›

Contact your bank or card provider to alert them. Reporting is an important first step to getting your money back, and you could be liable for all money lost before you report it. If you've been targeted, even if you don't fall victim, you can report it to Action Fraud.

What do fraudsters usually steal? ›

Fraudsters steal personally identifiable information , like your name and address, credit card or bank account numbers, or Social Security numbers. They can then buy things with your credit card, access your bank account, steal your tax refund, and more, while you pick up the tab.

What kind of information do fraudsters try to gather? ›

Scammers use email or text messages to try to steal your passwords, account numbers, or Social Security numbers. If they get that information, they could get access to your email, bank, or other accounts. Or they could sell your information to other scammers.

What do fraudsters search to find information? ›

Scammers are disturbingly persistent. If they know your name, address, and phone number, they can use this as a launching point to find out more about you online and on public databases. For example, they could research your social media profiles or see if you're included in popular data broker lists.

What do fraudsters behaviors often include? ›

Fraudsters' common behavioral red flags

Management and co-workers may see warning signs of “fraudsters.” According to the ACFE reports, the two most common red flags continue to include living beyond one's means and financial difficulties. Other warning signs include: Getting too close to vendors or customers.

Top Articles
Latest Posts
Article information

Author: Jonah Leffler

Last Updated:

Views: 6260

Rating: 4.4 / 5 (45 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Jonah Leffler

Birthday: 1997-10-27

Address: 8987 Kieth Ports, Luettgenland, CT 54657-9808

Phone: +2611128251586

Job: Mining Supervisor

Hobby: Worldbuilding, Electronics, Amateur radio, Skiing, Cycling, Jogging, Taxidermy

Introduction: My name is Jonah Leffler, I am a determined, faithful, outstanding, inexpensive, cheerful, determined, smiling person who loves writing and wants to share my knowledge and understanding with you.