
If this sounds scary it’s because it is! It also happens all the time.

Mint login vanguard 2 factor password#
If this is a social media account they want the handle of, they change the password and resell it to someone else. They liquidate what they can and transfer out the funds ASAP. Transfer: If this is a financial account, the goal will be a heist – stealing your money. This makes it that much harder for you to prove ownership and retake the account – buying the thief time.Ħ. They can log you out of all devices, change settings and passwords, change security questions and addresses. Take Over: With unlimited access, they can now start doing damage. They issue a password reset on these services – and since they have your email address and your phone number for 2-factor authorization, they are immediately granted access.ĥ. With your email, they can find where your money is stored – Vanguard, Fidelity, Coinbase – wherever. The first great target is your email, which often allows for resetting a password using your phone number. Getting Access: Now that the thief has your phone number and some data about you, things get easier (for them that is. If the thief chose a time you were traveling then you might not immediately realize what’s happening.Ĥ. This is a tip that your phone has been SIM-swapped.

At this moment your phone with the original number will begin to show “no service”. They give a sob story about how you lost your phone and need the number ported over to a new phone. SIM-Swap: The thief calls up your cell phone carrier provider pretending to be you. They might even stalk you on social media and find a time to continue on to step 3 while you’re on vacation.ģ. The important things are your primary email address, your phone number, and wherever they want to steal is located. SSN, mothers maiden name – anything they can dig up on the dark web through various data breaches. Research: The thief does their homework on you, learning as much as they can.

Maybe you have a great handle on a social media site, you’ve mentioned somewhere that you have a bunch of money or you’ve decided to share your entire net worth on your blog.Ģ. Identification: Someone identifies you as a target of something the thief wants. This works by having someone effectively steal your phone number long enough to bypass your security methods and get access to your most secure accounts.ġ. The method I’m referring to is called a “SIM-Swap”. This criminal was brought to justice and is serving time, but the method he exploited is still around – and growing in popularity.Įven though these crimes carry up to a 20-year jail sentence, the opportunity to steal millions of dollars from behind a computer will no-doubt spark more criminals to try. In California, a student used a similar trick to steal $7.5 million in Bitcoins from an unsuspecting victim. Minafi, Blog, Financial Independence, Investing, Canonical.Ī few weeks ago, someone shared a story about a man who lost his entire life savings – over $1 million – because his accounts were hacked.
