Utilizing VOIP for Fraud

Utilizing VOIP for Fraud
Photo by Van Tay Media / Unsplash

My phone rings from an unfamiliar number and per the usual, the caller ID identifies it as spam. Expecting another cold call from a foreign "business service," I pick up anyway.
Part curiosity, part boredom.

Yet surprisingly, I'm greeted with:

"Hi Dear, we are calling from Affirm.

We've detected an unusual login attempt from your account ending in [Last 4 of Phone #]

If this was not you, please 'Press 1'

Okay, now I'm genuinely curious. I press 1.

To cancel this request, your identity needs to be verified.

We have sent a 6-digit verification code to your phone number.

Please enter the code to continue..."

And as expected, I promptly receive a text message with a 6-digit code... from Affirm.
Wait, how did they do that?


How the Attack Works

This scam is deceptively simple. As such, we're going to look at each step in the process of how this was executed and discuss why this method is so effective.

  1. The attacker calls you and impersonates a known brand/company. (In this case, Affirm).
    By using an automated voice, VOIP infrastructure (in this case, Twilio), and providing a touch of personal information, it hooks your curiosity.
  2. By you pressing 1, the attacker sends a login request to Affirm.
    They’ve entered your phone number via an event trigger in the VOIP platform and initiated a login request which triggers a real MFA code from Affirm.
  3. You receive a legitimate text message from Affirm.
    And because the timing lines up with the call, it appears authentic as if it's just another step in the verification process.
  4. You enter the code via your keypad, unknowingly handing it over to the attacker.
    They immediately enter it via another event trigger, completing the login. They now have access to your account and your payment information.

    You've now been compromised.

This doesn't require any malware, phishing pages, or compromised websites. It simply utilizes: Social engineering, real/legitimate infrastructure, and your trust in familiar brands.

It's a brilliant method that's low cost, easy to deploy, and difficult to detect because everything is done more or less legitimately. All that is going to be seen is a user logging in and verifying themselves with their MFA code.


Final Thoughts

This type of scam is prolific and a direct abuse of your trust.

Attackers don’t need to break in when they can trick you into opening the door. But it's on you to recognize these attempts and react accordingly.

Stay sharp. Question urgency. And as always:

Thank you for reading,
~Michaelion