2 min read

Criminals Force Victim to Unlock Phone in Hope of Cryptocurrency Jackpot

Radu CRAHMALIUC

June 27, 2022

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
Criminals Force Victim to Unlock Phone in Hope of Cryptocurrency Jackpot

As if cybercriminals weren’t dangerous enough, it looks like ordinary street muggers have also developed a keen interest in your online financial accounts. Unlike their digital counterparts, they’re not afraid of getting violent.

In an extremely alarming account, James Ball, a tech reporter for the Times, recalls how he was ambushed by four men while walking home in North London. He was physically assaulted, robbed of his mobile phone and credit cards, then forced to give up card PINs, his phone security code, and unlock financial apps on his phone.

Restoring accounts is sometimes more painful than being robbed

Fortunately, Ball managed to escape his attackers, alert the police, and block all his accounts. Still, the criminals got away with his phone, which meant he now had to deal with a different kind of drama: trying to regain access to his multi-factor authentication (MFA) protected accounts without the authenticator app on his phone.

“In the past three weeks I've spent about 30 to 40 hours trying to get back up and running - and I'm still not done. Phones have become instrumental to our lives, not just as communication tools but as the way to access our email accounts, our bank accounts, passports, and more,” Ball said. “The best advice now says to use "two-factor" security for your online shopping, email, and social media. Instead of just using a password, you get sent a text with a security code or use an authenticator app, all of which relies on your phone. It may be more secure against hackers, but it means your phone is a back door to your Amazon, Apple, eBay, and social media accounts at a time when you don't have the two-factor code generator on your phone to hand.”

Thieves are interested in Bitcoin

The most unsettling detail in Ball’s unfortunate story remains the fact that, according to police, he was probably targeted by thieves looking for a crypto wallet and some Bitcoin or Ethereum, a practice that’s becoming much too common among petty criminals in London.

What to do if you can't access your phone?

Mobile phones really have become vital command centers for a lot of important things in our lives, but at the same time they can easily be lost, stolen, or destroyed, which means it’s a good idea to have a plan B in case disaster strikes.

  • Regularly back up your phone on your computer or through a cloud service. If you need to change phones, you can restore your device in a matter of minutes.
  • Always store backup codes for your multi-factor logins so you can quickly regain access to e-mail, social media, and bank accounts.
  • Use a multi-platform password manager to generate strong passwords and store them safely. That way, even if you can’t access your phone, you can still access your passwords on another device. If your phone is stolen, it’s also a good idea to change your passwords.
  • Most phones nowadays have a “Find My Phone” function. If your phone is stolen or lost, you can activate that feature and, even if you can’t recover your device, you can still remotely erase it and block it from further use.

tags


Author



Right now

Top posts

What is medical identity theft and how to protect against it

What is medical identity theft and how to protect against it

July 27, 2022

2 min read
Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

July 07, 2022

5 min read
Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

June 28, 2022

2 min read
Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

June 28, 2022

3 min read
Bitdefender Reveals the Top Cyber Threats Faced by Consumers in 2021

Bitdefender Reveals the Top Cyber Threats Faced by Consumers in 2021

June 22, 2022

1 min read
Scam alert: Cybercrooks use shady investment domain to scam keen investors out of money and data

Scam alert: Cybercrooks use shady investment domain to scam keen investors out of money and data

May 24, 2022

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Sophisticated Smishing Attack on Twilio Leads to Employee Credential Leak and Data Breach Sophisticated Smishing Attack on Twilio Leads to Employee Credential Leak and Data Breach
Silviu STAHIE

August 09, 2022

1 min read
Attackers Hit German Chambers of Industry and Commerce; All Digital Services Down Attackers Hit German Chambers of Industry and Commerce; All Digital Services Down
Silviu STAHIE

August 05, 2022

1 min read
Slope Wallets Blamed for $6 Million Solana Hack Slope Wallets Blamed for $6 Million Solana Hack
Silviu STAHIE

August 04, 2022

1 min read