Banking scam exposes SMS danger

September 2009 Information Security

SMS one-time passwords are not secure. This has come to light following the arrest of two members of an SMS banking fraud syndicate – a Vodacom technician and his co-accused – who have been charged with fraud involving more than R7 million and contravening the Electronic Communications Act. Their alleged victims held accounts at Nedbank, Absa, Capitec, FNB, Standard Bank, and KwaZulu-Natal’s Ithala Bank.

All were reportedly Vodacom subscribers.

“This is believed to be South Africa’s biggest online banking scam to date and raises some important questions about the security chain between banks and their online customers,” says Jenny Dugmore, CEO of FireID, a Cape-based company providing strong authentication for online applications.

Most banking customers are familiar with the process of receiving a confirmation SMS once they have done an online transaction. In this case, the syndicate was able to intercept this SMS notification with a dual SIM and use it to access a subscriber’s bank account.

Dugmore says the scam highlights the insecurity of SMS one-time passwords (OTPs). “One-time passwords are an excellent solution for strong authentication. However, these should not be sent over the air due to the ease of interception and potential for attack by hackers. It is clear from this incident that the SMSs were either in clear text, or were easy to decrypt in order for the criminals to be in a position to read them.

“Together with recent cases of SIM card swaping, whereby fraudsters were able to obtain new SIM cards for targeted bank customers and thereby divert the SMS to their own phones, this case definitively shows online bankers are at risk,” Dugmore says. “But this type of crime can easily be prevented by using out-of-band one-time password generators which do not require network connectivity. The one-time password is generated on the device, or on the end-user’s mobile phone and once used, it expires immediately.”

FireID has developed a highly secure, universal personal authentication system that makes this type of Internet transaction significantly safer. “The application enables a mobile phone to randomly generate a one-time password which is sent to the user out-of-band. This means they cannot be intercepted as they do not travel over any of the mobile phone networks.”

The application uses an OATH-compliant incremental one-way-hash mathematical algorithm to generate the passwords. “FireID’s token application turns mobile phones into self-contained password generators,” says Dugmore. “By downloading the token onto their mobile phones, users are able to generate their own passwords for online applications like banking, e-commerce, or securely accessing the company VPN.

“This latest scam proves that the time has come for financial institutions to look at new ways of securing customer information and assets,” Dugmore stresses.

For more information contact Jenny Dugmore, FireID, +27 (0)880 2647, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Survey highlights cost of cyberdamage to industrial companies
Kaspersky Information Security News & Events
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million.

Read more...
Digital economy needs an agile approach to cybersecurity
Information Security News & Events
South Africa is the most targeted country in Africa when it comes to infostealer and ransomware attacks. Being at the forefront of the continent’s digital transformation puts South Africa in the crosshairs for sophisticated cyberattacks

Read more...
SIEM rule threat coverage validation
Information Security News & Events
New AI-detection engineering assistant from Cymulate automates SIEM rule validation for SecOps and blue teams by streamlining threat detection engineering with automated testing, control integrations and enhanced detections.

Read more...
Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...
Cybersecurity in South Africa
Information Security
According to the Allianz Risk Barometer 2025, cyber incidents, including ransomware attacks, data breaches and IT outages, are now the top global business risk, marking their fourth year at the top.

Read more...
Are AI agents a game-changer?
Information Security
While AI-powered chatbots have been around for a while, AI agents go beyond simple assistants, functioning as self-learning digital operatives that plan, execute, and adapt in real time. These advancements do not just enhance cybercriminal tactics, they may fundamentally change the battlefield.

Read more...
Disaster recovery vs cyber recovery
Information Security
Disaster recovery centres on restoring IT operations following events like natural disasters, hardware failures or accidents, while cyber recovery is specifically tailored to address intentional cyberthreats such as ransomware and data breaches.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...