Someone Wired 7 million Naira from my account because I downloaded a message on my phone.

Abdulkareem olawale
2 min readJan 2, 2023

How did it happen?

source: pexels.com

Have you received a message described as “Unknown” with a download sign before? Perhaps, you have. But, this is my first experience, and I was scammed

Some of you will think I am stupid. Yes! I was. The most painful part was that it was a thrift contribution.

I cried, I cried more and I cried a bit more then I stopped crying I did my research about such messages

This is what I found… Guess what? there are other types of this kind of attack.

This type of attack is called SOCIAL ENGINEERING ATTACK.

They are a form of cybercrime and are very common among us. Relatives or acquaintances often perpetrate them. They are as follows;

1. Phone phishing or Vishing: Phishing can be done via Email or SMS.

Target is prompted via a call to confirm bank login details, Account Number, BVN, PIN, etc. Typical Vishing ( ‘V’ stands for Video) i.e a video message. This type of attack rejects your login continually, ensuring that you re-enter your PIN/Password multiple times.

Advanced format of Vishing may redirect you to a human posing as a customer care representative requesting your sensitive bank details.

2. Pretexting: This is similar to phishing. it’s someone impersonating an authority figure e.g account officer or bank, a betting company Manager, or a Trusted individual in an attempt to gain access to your sensitive information.

3. Quid pro quo: This is the most common form of attack and it is easy to fall, victim. it is a request for your password or login credentials in exchange for some compensation, such as a free gift, a monetary payment, or access to an online game. For example; “Federal government is giving 20 million grant to 100000 Nigerian youths. Click this link below to register.”

The form will contain your bank details and BVN request. Millions of Nigerians have been scammed via this type of attack.

4. Tailgating: This is the practice of following an authorized user into a restricted area or system. For example, someone may ask you to borrow your phone or laptop to perform an action whereas he or she is actually installing malicious software or trying to steal your phone number and your BVN or NIN ( since these numbers are linked to your account number) to perform fraud.

You’ve to be careful of whom you grant access to your devices, the links you click online, and the information you provided to public sites.

let me know in the comment section, Type of social engineering attack you have encountered.

kindly share, like, and follow me for more content like this.

--

--

Abdulkareem olawale

Data Analyst|| Business Intelligence|| Marketing Content Writer