This article is part of a series.
- The Cyber Crime Awareness Series – What You Don’t Know Can Hurt You
- Part 1: Cyber Crime is Booming in Australia
- Part 2: Don’t Click That Link!
- Part 3: Digital Arrests, Loan App Blackmail & High-Stakes Scams Targeting Australians
- Part 4: Your OTP Isn’t Safe
- Part 5: The Price of Free
- Part 6: Inside the Dark Web
- Part 7: Digital Detectives
- Part 8: Cyber Security Toolkit

Your OTP is Not Safe — 12 Ways Criminals Bypass Your Security
The Illusion of Safety
We’ve been taught to believe that One-Time Passwords (OTPs) are the holy grail of online security. You get a text, enter the number, and feel safe. But here’s the truth no one talks about enough: OTPs can be intercepted — and often are.
Cyber criminals across Australia have developed shockingly simple and disturbingly clever ways to hijack your OTPs, even without touching your phone. In this post, I’ll break down 12 methods that scammers use to get around OTP-based security, with examples, and most importantly — how to defend yourself.
Why OTPs Are Failing Us
OTPs were a good idea — once. But with so many platforms relying solely on SMS or call-based delivery, attackers have adapted. They’ve turned weaknesses in human behaviour, mobile networks, and app ecosystems into powerful tools for theft.
These aren’t just theoretical exploits — they’re real methods used to commit fraud in Australia, costing victims millions.
🔐 12 Ways Criminals Steal or Bypass OTPs
1. Call Forwarding Trick (Star Codes)
Scammers convince you to dial something like:
*21*<their-number>#
or
*62*<number>#
This forwards all your calls, including OTP voice calls, to them.
📌 Real Case: A businessman at Sydney Airport was targeted during peak travel time. His calls were forwarded, and scammers intercepted his OTP to log in to his banking app.
2. Voicemail Hijack
If you’ve ever set up voicemail and left it insecure (like default PIN), attackers can access your voicemail remotely. If your bank sends an OTP via call (not SMS), it can land in voicemail — and be retrieved.
3. SIM Swap Fraud
A scammer convinces your telco (Telstra, Optus, Vodafone) to issue a new SIM card in your name — then receives all your calls and texts, including OTPs.
✅ Tip: Ask your telco to place a “porting lock” or “high-risk flag” on your account.
4. Social Engineering: Fake Customer Support
Scammers pretend to be from your bank or Telstra and ask you to “verify” by reading out the OTP you just received.
It’s not always about tech — it’s about trust.
5. Malware That Reads SMS
If you install a fake app (e.g. a loan app or free PDF viewer), it might have permission to read SMS. It captures OTPs silently.
✅ Tip: Avoid apps from third-party app stores. Always review permissions.
6. Call Merge Manipulation
Scammers initiate a call and ask you to merge it with an “official” line — allowing them to listen to sensitive conversations or OTPs read aloud.
7. Physical Access to Unlocked Phone
Even 10 seconds with your unlocked phone is enough. Notifications often show OTPs on lock screens or in push banners.
📱 Disable lock-screen notification previews for SMS and banking apps.
8. Spoofed Sender Names
Scammers send SMSes using the same sender ID as your bank (e.g., “CommBank” or “MyGov”), mixing fake messages into legitimate threads.
You read them — and trust them — automatically.
9. Phishing Pages Mimicking OTP Prompts
A fake login page captures your credentials. Then it immediately asks for your OTP (mirroring your bank’s process). You enter it. They’re already logged in.
10. Forwarded Email OTPs
Some services send OTPs to email instead of phone. If your email is compromised (especially Gmail), they can intercept everything — including password reset codes.
✅ Tip: Use 2FA on your email first. If email falls, everything else does.
11. Session Hijacking
If you’re on public Wi-Fi, attackers can intercept login cookies or tokens after you enter the OTP — effectively stealing your session.
12. Using You to Bypass OTP
Sometimes, attackers trick you into giving them the OTP, believing it’s for your own login. This happens often during fake “identity checks,” or “support sessions” where users willingly hand it over.
But Isn’t 2FA Better Than Nothing?
Yes — any 2FA is better than none, but not all 2FA is equal.
SMS OTP is better than nothing, but much weaker than:
- 🔐 TOTP (Time-based OTP apps like Google Authenticator, Authy, or Microsoft Authenticator)
- 🔐 Push-based 2FA (like with Okta, Duo, or your bank’s own app)
- 🔐 Hardware keys (like YubiKey or Titan Key — virtually unbreakable)
7 Things You Can Do Right Now
✅ 1. Use an Authenticator App — avoid SMS-based 2FA when possible.
✅ 2. Turn off lock screen SMS previews — protect visible OTPs.
✅ 3. Avoid sharing OTPs on calls — no legitimate service will ask.
✅ 4. Use app-based banking over web-based if available.
✅ 5. Never install apps from links in SMS or WhatsApp.
✅ 6. Monitor for SIM porting alerts from your telco.
✅ 7. Protect your primary email account with strong 2FA — it’s your digital master key.
Final Thoughts: OTP ≠ Impenetrable
Too many people believe that as long as they use OTPs, they’re secure. The reality is: OTPs are not a guarantee of safety — especially when attackers are more interested in hacking you than your device.
Security today is not about being perfect. It’s about raising the bar high enough that criminals go after easier targets. And that starts by understanding how they think — and how they operate.
The next post will take you deeper into the murky world of data harvesting and how even free apps are quietly building your profile.
Until then — lock it down.
📚 References
- Australian Cyber Security Centre. (2023). Multi-Factor Authentication Best Practices. https://www.cyber.gov.au
- Norton Australia. (2023). What is SIM Swap Fraud and How to Stop It. https://au.norton.com
- Scamwatch Australia. (2023). Scams Using OTP and Identity Spoofing. https://www.scamwatch.gov.au
- ABC News. (2023). Scammer Tricks Woman into Forwarding Calls and Steals Thousands. https://www.abc.net.au/news
This article is part of a series.
- The Cyber Crime Awareness Series – What You Don’t Know Can Hurt You
- Part 1: Cyber Crime is Booming in Australia
- Part 2: Don’t Click That Link!
- Part 3: Digital Arrests, Loan App Blackmail & High-Stakes Scams Targeting Australians
- Part 4: Your OTP Isn’t Safe
- Part 5: The Price of Free
- Part 6: Inside the Dark Web
- Part 7: Digital Detectives
- Part 8: Cyber Security Toolkit
comments powered by Disqus