Scammers Take Control of Cell Phones and Steal Thousands of Dollars – NBC Los Angeles

Can you imagine that a stranger took control of your cell phone, and had access to everything you have there, including bank accounts?

To avoid being a victim of this crime, it is important to know how to detect the warning signs that someone could have infiltrated the phone, in order to take action quickly.

Smartphones contain a lot of personal and financial information, so it is important to know if someone has taken control of your cell phone remotely.

“If you start noticing messages coming in with misspellings or alerts you’ve never seen before, it could be an indication that a malicious app or program is installed on your phone,” said Max Eddy, security analyst at PCMAG.

That happened to Luis Martínez, who was the victim of a scam known as “Sim Swapping”. It’s a trick that basically allows a scammer to take control of your phone. How do they do that? They illegally obtain personal data, and with it, impersonate you, to ask your cell service provider for a new SIM card.

“I received an alert on my phone, I did make changes to my phone and the phone went dead, I had no service,” Martinez said.

The criminals blocked his access to his phone and were able to steal thousands of dollars from his bank accounts, using the cell phone.


If the phone is very slow, or hot, or the battery doesn’t last long, this could indicate that a malicious program is installed, explains Eddy.

In that case, contact your carrier and find out if you need a system update. Check your phone and delete apps you don’t recognize, and see if you have unknown charges on your account.

It is important to remember that you should not download applications that arrive through a text message. The only safe way to do this is through your phone’s app store.

Do not press unknown links, use only your cable and plug to charge your phone in public places, and do not make purchases or financial transactions with your cell phone using public Wi-Fi, which can be intercepted and manipulated by cyber hackers.


Leave a Comment

Your email address will not be published.