Landline theft has emerged as a concerning new threat, allowing fraudsters unexpected access to victims’ accounts. Outdated phone numbers, particularly forgotten landlines, can enable these criminals to bypass security measures and potentially empty bank accounts.
Here’s how it typically works and suggestions on how to protect yourself:
How forgotten landline theft can cost you
A case from Richard in Reno, Nevada highlights this issue. His friend lost money when an old landline number, still connected to their bank account, was exploited.
The trouble began with a credit alert that asked whether a new card had been issued. They said no and thought it was resolved. However, soon after, they couldn’t access any banking or investment accounts. Even with transaction alerts set up, the funds were already gone.
Interestingly, the scammers didn’t actually hack into the account. They identified a security loophole: the old landline still in use. Richard explained, “My friend had an old but active landline connected to their bank account. The thief managed to convince the phone company to transfer the landline number to a mobile phone, intercepting the security code and draining the account.”
The scammer initiated a password reset, and verification codes sent to the outdated number were now in their control. This allowed them to change the login credentials and lock the victim out while transferring funds.
Why is this kind of identity theft so easy?
This situation underscores how identity theft tactics have evolved. Often, attackers don’t need advanced technology; they exploit details that victims may have overlooked.
The trick of number porting
Scammers use number porting, which is generally intended to help users keep their numbers when switching phone services. In this case, the scammer impersonated the victim, leading the phone company to transfer the landline number to their mobile device. Once activated, they received messages containing two-factor authentication codes.
Risks from outdated contact information
Many individuals forget to update their recovery options in accounts. Outdated phone numbers or email addresses can still receive security codes, making it incredibly easy for scammers to gain control over these recovery methods.
Significant vulnerabilities that made this attack successful
Even minor gaps in security hardening can result in massive consequences.
Old phone numbers as easy targets
Inactive numbers can be hijacked through number porting. If these numbers are linked to bank accounts or email addresses, they become very vulnerable.
Limitations of credit monitoring
While credit monitoring can alert users to new credit inquiries, it often fails to detect fraudulent transactions within existing accounts.
Weaknesses in two-factor authentication
Two-factor authentication is an excellent tool—if the linked number or email is secure. Scammers can bypass security if they gain control over these methods.
Protecting yourself from landline theft
While you can’t stop scammers from trying, you can make it significantly more challenging for them. Here are several steps you can take:
- Audit your account recovery options: Regularly check your recovery settings. Remove old phone numbers and emails, leaving only the active and secure options.
- Use an Authenticator app: Apps like Google Authenticator or Authy can generate secure login codes on your device, making them safer than SMS messages.
- Freeze number porting with your carrier: Contact your phone company to inquire about port-out protection, which can prevent unauthorized transfers without identity verification.
- Remove personal information from data brokers: Scammers often harvest outdated details from public databases. Use deletion services to clear this information.
- Monitor bank activity directly: Set alerts for transactions and log in regularly to catch potential scams early.
- Employ a Password Manager: Strong, unique passwords are vital for securing accounts. Password managers can simplify this process.
- Consider full identity theft protection: Identity Theft Protection Services can offer comprehensive monitoring for as little as $1 million in dark web surveillance and alerts.
Key takeaways
Landline theft serves as a stark reminder that forgotten account settings can pose real dangers. Reviewing and updating recovery options, utilizing authenticator apps, and implementing port-out protections are essential. Acknowledging that credit monitoring can miss crucial alerts is vital too. These straightforward actions can help safeguard your accounts against ever-evolving scams.
Have you encountered similar scams or discovered new tactics? Let us know your thoughts.





