Your OTP Isn’t Safe

Scammers can bypass two-factor security in the real world
Posted by Munish Mehta on Thursday, June 5, 2025
Think OTPs keep you safe? Think again. This post reveals 12 real-world ways scammers steal or bypass One-Time Passwords in Australia — from SIM swaps and spoofed messages to malware and call forwarding tricks — plus what you can do to truly protect your identity and accounts.

This article is part of a series.

otp scam

Your OTP is Not Safe — 12 Ways Criminals Bypass Your Security

The Illusion of Safety

We’ve been taught to believe that One-Time Passwords (OTPs) are the holy grail of online security. You get a text, enter the number, and feel safe. But here’s the truth no one talks about enough: OTPs can be intercepted — and often are.

Cyber criminals across Australia have developed shockingly simple and disturbingly clever ways to hijack your OTPs, even without touching your phone. In this post, I’ll break down 12 methods that scammers use to get around OTP-based security, with examples, and most importantly — how to defend yourself.


Why OTPs Are Failing Us

OTPs were a good idea — once. But with so many platforms relying solely on SMS or call-based delivery, attackers have adapted. They’ve turned weaknesses in human behaviour, mobile networks, and app ecosystems into powerful tools for theft.

These aren’t just theoretical exploits — they’re real methods used to commit fraud in Australia, costing victims millions.


🔐 12 Ways Criminals Steal or Bypass OTPs

1. Call Forwarding Trick (Star Codes)

Scammers convince you to dial something like:

*21*<their-number>#

or

*62*<number>#

This forwards all your calls, including OTP voice calls, to them.

📌 Real Case: A businessman at Sydney Airport was targeted during peak travel time. His calls were forwarded, and scammers intercepted his OTP to log in to his banking app.


2. Voicemail Hijack

If you’ve ever set up voicemail and left it insecure (like default PIN), attackers can access your voicemail remotely. If your bank sends an OTP via call (not SMS), it can land in voicemail — and be retrieved.


3. SIM Swap Fraud

A scammer convinces your telco (Telstra, Optus, Vodafone) to issue a new SIM card in your name — then receives all your calls and texts, including OTPs.

✅ Tip: Ask your telco to place a “porting lock” or “high-risk flag” on your account.


4. Social Engineering: Fake Customer Support

Scammers pretend to be from your bank or Telstra and ask you to “verify” by reading out the OTP you just received.

It’s not always about tech — it’s about trust.


5. Malware That Reads SMS

If you install a fake app (e.g. a loan app or free PDF viewer), it might have permission to read SMS. It captures OTPs silently.

✅ Tip: Avoid apps from third-party app stores. Always review permissions.


6. Call Merge Manipulation

Scammers initiate a call and ask you to merge it with an “official” line — allowing them to listen to sensitive conversations or OTPs read aloud.


7. Physical Access to Unlocked Phone

Even 10 seconds with your unlocked phone is enough. Notifications often show OTPs on lock screens or in push banners.

📱 Disable lock-screen notification previews for SMS and banking apps.


8. Spoofed Sender Names

Scammers send SMSes using the same sender ID as your bank (e.g., “CommBank” or “MyGov”), mixing fake messages into legitimate threads.

You read them — and trust them — automatically.


9. Phishing Pages Mimicking OTP Prompts

A fake login page captures your credentials. Then it immediately asks for your OTP (mirroring your bank’s process). You enter it. They’re already logged in.


10. Forwarded Email OTPs

Some services send OTPs to email instead of phone. If your email is compromised (especially Gmail), they can intercept everything — including password reset codes.

✅ Tip: Use 2FA on your email first. If email falls, everything else does.


11. Session Hijacking

If you’re on public Wi-Fi, attackers can intercept login cookies or tokens after you enter the OTP — effectively stealing your session.


12. Using You to Bypass OTP

Sometimes, attackers trick you into giving them the OTP, believing it’s for your own login. This happens often during fake “identity checks,” or “support sessions” where users willingly hand it over.


But Isn’t 2FA Better Than Nothing?

Yes — any 2FA is better than none, but not all 2FA is equal.

SMS OTP is better than nothing, but much weaker than:

  • 🔐 TOTP (Time-based OTP apps like Google Authenticator, Authy, or Microsoft Authenticator)
  • 🔐 Push-based 2FA (like with Okta, Duo, or your bank’s own app)
  • 🔐 Hardware keys (like YubiKey or Titan Key — virtually unbreakable)

7 Things You Can Do Right Now

1. Use an Authenticator App — avoid SMS-based 2FA when possible.
2. Turn off lock screen SMS previews — protect visible OTPs.
3. Avoid sharing OTPs on calls — no legitimate service will ask.
4. Use app-based banking over web-based if available.
5. Never install apps from links in SMS or WhatsApp.
6. Monitor for SIM porting alerts from your telco.
7. Protect your primary email account with strong 2FA — it’s your digital master key.


Final Thoughts: OTP ≠ Impenetrable

Too many people believe that as long as they use OTPs, they’re secure. The reality is: OTPs are not a guarantee of safety — especially when attackers are more interested in hacking you than your device.

Security today is not about being perfect. It’s about raising the bar high enough that criminals go after easier targets. And that starts by understanding how they think — and how they operate.

The next post will take you deeper into the murky world of data harvesting and how even free apps are quietly building your profile.

Until then — lock it down.


📚 References

This article is part of a series.


comments powered by Disqus
agent