Part 4/7:
Once the scammer successfully transfers the phone number, they bypass the victim's ability to receive calls or texts. This is particularly dangerous, as it allows them to intercept any two-factor authentication codes necessary for accessing financial accounts, emails, or other privileged information.
Step 4: The Aftermath
With control over the victim’s phone number, the scammer can initiate unauthorized transactions, confirming these actions through text messages that the victim can no longer receive. In Justin's case, multiple wire transfers were authorized without his knowledge, as he was asleep when the fraud took place.