Skip to main content

Command Palette

Search for a command to run...

Beware the New Cyber Scam Involving “Free” or Discounted Phones and SIM Cards

Updated
•5 min read
Beware the New Cyber Scam Involving “Free” or Discounted Phones and SIM Cards
N

I am a persistent and detail-oriented cybersecurity professional, boasting over 19+w years of dedicated experience in the field.

Cybercriminals are always inventing new ways to deceive unsuspecting individuals. A recent wave of fraud involves victims receiving a phone that appears free or heavily discounted—but is actually pre-loaded with malicious software. In many cases, scammers also provide instructions to either move your existing SIM card into this new device or activate a brand-new SIM. Either way, their goal is to intercept your One-Time Passwords (OTPs) and gain unauthorized access to your financial accounts. Below is a detailed overview of how this scam works, why buying used or refurbished devices from unknown sources can be risky, and how you can protect yourself.

How the Scam Works

1. Initial Contact from a Fake “Representative”

The scam often begins when you receive a call or message from someone pretending to represent a well-known financial institution or credit card provider. They claim there’s an issue—such as a blocked transaction or a pending application—that urgently needs resolving. They may even claim you need a “new SIM” or an upgraded device for security reasons.

2. Offer of a “Free” or Discounted Phone

A few days later, you receive a phone, which appears to be a brand-new or high-end device at a very low cost. In reality, it has been tampered with. Malicious software is hidden on the device, programmed to forward or intercept your text messages and banking OTPs.

3. Transferring Your SIM

Here’s the critical step scammers rely on:

• Moving Your Existing SIM: You’re instructed to remove your SIM card from your current phone and insert it into the new (compromised) phone. Since your bank or payment apps are tied to this SIM, all OTPs will now arrive on the compromised device.

• Activating a “New” SIM: Alternatively, you may be asked to port your number to a new SIM card provided with the phone, again under the guise of an “upgrade” or “security measure.” Once the port is complete, the compromised device (and possibly the scammer) can intercept all your verification codes.

4. Unauthorized Access to Your Accounts

With your OTPs and other details, scammers can quickly log into your bank or online payment accounts. They may siphon funds from multiple accounts, sometimes including large deposits or high-value investments.

Red Flags to Watch Out For

1. Unsolicited Calls or Messages

Be cautious of unexpected calls from people claiming to be from a financial institution—especially those that pressure you to act immediately.

2. “Free” or Extremely Cheap Devices

If a phone offer seems too good to be true and you didn’t request it, be wary. Reputable institutions rarely send unsolicited phones without thorough documentation.

3. Requests to Switch SIM Cards

Most financial organizations will not require you to switch SIM cards or devices abruptly. If instructed to do so, verify by calling your bank or service provider’s official customer service line.

4. No Usual Notifications

If you suddenly stop receiving transaction alerts or OTPs on your regular device, it could be a sign that your SIM card has been compromised or redirected.

5. Suspicious or Unknown Courier Deliveries

Always verify unexpected packages. Do not use any device or SIM card sent without clear, verified instructions.

The Risk of Buying Used or Refurbished Electronics

While purchasing used or refurbished devices (including laptops) can save you money, it does come with potential risks if sourced from unknown or unverified sellers. These devices might come with hidden spyware or malware. If you decide to buy second-hand:

• Stick to Reputable Sellers: Buy from established retailers or authorized refurbishers who offer warranties and security checks.

• Perform a Factory Reset: Upon receiving the device, do a complete factory reset and install trusted anti-malware or antivirus software.

• Inspect for Unusual Apps or Settings: Check for hidden apps, strange permissions, or background activities that could compromise your data.

Safety Measures

1. Verify the Source

If someone claims to be from a trusted institution, hang up and call the official customer service number found on the organization’s website or official documents.

2. Keep OTPs Confidential

No legitimate bank or financial service will ever ask you for OTPs, PINs, or passwords via phone, SMS, or email. Treat all such requests as suspicious.

3. Use Trusted Devices

Avoid inserting your primary SIM card into any device received unexpectedly. If a new device or SIM is required, obtain it directly from a certified store or your mobile network’s official outlet.

4. Monitor Your Financial Activity

Regularly check bank statements and transaction alerts. Early detection of unauthorized transactions is crucial for potential recovery of funds.

5. Secure Your Accounts and SIM

If you suspect any compromise—like sudden loss of reception on your usual phone or missing OTPs—contact your mobile carrier and financial institutions immediately. Block your SIM or port it to a new card obtained directly from an authorized source.

6. Keep Software Updated

Use reputable antivirus and anti-malware solutions on all devices. Regularly update your operating systems and apps to fix security vulnerabilities.

Conclusion

Cybercriminals are growing more sophisticated, leveraging everything from convincing phone calls to compromised devices. Stay vigilant when receiving offers of free or discounted gadgets—especially if they come with instructions to transfer your SIM card or activate a new one. Ensure you only buy refurbished phones or laptops from well-reviewed, authorized sources. By following good security practices, independently verifying any unusual requests, and monitoring your accounts closely, you can significantly reduce the risk of falling victim to these evolving scams.

Stay alert, share these warnings with friends and family, and help others stay safe from these innovative and fast-growing cyber threats.

More from this blog

S

Security Insights

19 posts

Hi 👋 I'm Niranjan Ganesan, cybersecurity leader w/20+ yrs: cloud security, compliance (SOC 2, ISO 27001, GDPR, HIPAA, PCI DSS), AI governance (ISO 42001). Automate processes, fast-track certs. 🚀