{"id":13366,"date":"2018-05-22T05:31:32","date_gmt":"2018-05-22T09:31:32","guid":{"rendered":"https:\/\/www.kaspersky.co.in\/blog\/dont-send-codes\/13366\/"},"modified":"2020-04-02T16:07:36","modified_gmt":"2020-04-02T10:37:36","slug":"dont-send-codes","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/dont-send-codes\/13366\/","title":{"rendered":"Never share verification codes"},"content":{"rendered":"<p>\u201cDon\u2019t share this code with anyone!\u201d When it comes to one-time codes and passwords, this advice would seem so axiomatic that it hardly bears repeating. Then again\u2026<\/p>\n<h2>A polite request for help<\/h2>\n<p>We recently came across this <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/phishing\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">phishing<\/a> scam. A person receives an SMS message that goes roughly as follows:<\/p>\n<p>\u201cHello, you don\u2019t know me, but your phone number once belonged to me. I\u2019m trying to log into an old account linked to this number, and it\u2019s telling me that it will send a verification code in an SMS to this number. I\u2019d like to know if it\u2019d be OK with you if I request the code and if you can just send it back to me? If not, that\u2019s totally fine.\u201d<\/p>\n<p>It\u2019s true that if you don\u2019t use a phone number for a long time, your mobile operator may disconnect it and sell it to someone else. So there is a chance that your number might once have had another owner, especially if you only got it recently. And many people know about this.<\/p>\n<p>The request is written in polite language, and it looks extremely convincing. Good-natured people appreciate politeness, and the request seems reasonable, so they are likely to agree. The code arrives and the recipient sends it to the author of the polite request, who responds with profound gratitude. But the good Samaritan has just handed over access to their account.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2018\/05\/22150147\/dont-send-codes-screenshot1.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2018\/05\/22150147\/dont-send-codes-screenshot1-473x1024.jpg\" alt=\"Here's how scammers try to phish for verification codes \u2014 and what may happen if you send them one.\" width=\"473\" height=\"1024\" class=\"aligncenter size-large wp-image-13369\"><\/a><\/p>\n<h3>What really happened<\/h3>\n<p>Sure, there\u2019s a very small chance that it might have been a message from someone who really owned your number once and needs your help. But it\u2019s unlikely. Phishing is a more probable explanation. Here\u2019s how it happens.<\/p>\n<p>In the wilds of cyberspace, the attacker discovers an e-mail address (yours) that is linked to a phone number (also yours). If you have or once had an account with Yahoo, Twitter, or LinkedIn (or one of hundreds of lesser-known services that recently leaked their user data), it\u2019s not hard to find out which phone number is linked to your e-mail.<\/p>\n<p>The attacker begins by stealing access to your e-mail. To do that, they need to reset the password. When they attempt to reset it, the service sends an SMS message with a verification code to the number linked to the account to confirm that it is the owner of the account who is trying to reset the password.<\/p>\n<p>But before taking this step, the fraudster writes you a touchingly polite SMS as above. The code is valid for just a few minutes, so the cybercriminal needs to groom you in such a way that you\u2019ll send it without delay.<\/p>\n<p>With access to your e-mail, the attacker can reset the passwords for all accounts linked to the address\u00a0\u2014 social media, other mail services, online wallets, and so on. The links for password reset are sent to this e-mail, and voil\u00e0! The cybercriminal has access to all your accounts \u2014 and you don\u2019t.<\/p>\n<p>That\u2019s why you should never share any verification codes that arrive in SMS, no matter how nicely anyone pleads with you for assistance. Sharing just one code could lock you out of almost your entire online existence.<\/p>\n<h3>How to keep your accounts on a short leash<\/h3>\n<ul>\n<li>Never share verification codes with anyone, in SMS or over the phone. These codes are the main way a service verifies that you are you.<\/li>\n<li>Enable <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/two-factor-authentication\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">two-factor authentication<\/a> wherever possible. Even if you lose access to your e-mail account, at least that will protect your other accounts from theft.<\/li>\n<li>Use <a href=\"https:\/\/www.kaspersky.co.in\/mobile-security?icid=in_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____ccbe3384bb4e1385\" target=\"_blank\" rel=\"noopener\">security solutions<\/a> on all of your devices, including mobiles. Among other protection features, they will warn you about any Trojans looking to pinch codes from SMS.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kisa-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Here\u2019s how scammers try to phish for verification codes \u2014 and what may happen if you send them one.<\/p>\n","protected":false},"author":675,"featured_media":13367,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2196,9],"tags":[1181,19,80,97,46,527],"class_list":{"0":"post-13366","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"category-tips","9":"tag-2fa","10":"tag-email","11":"tag-fraud","12":"tag-security-2","13":"tag-sms","14":"tag-threats"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/dont-send-codes\/13366\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/dont-send-codes\/11148\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/dont-send-codes\/15423\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/dont-send-codes\/13693\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/dont-send-codes\/12991\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/dont-send-codes\/16206\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/dont-send-codes\/15758\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/dont-send-codes\/20614\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/dont-send-codes\/4962\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/dont-send-codes\/22448\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/dont-send-codes\/10357\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/dont-send-codes\/16802\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/dont-send-codes\/9682\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/dont-send-codes\/20447\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/dont-send-codes\/20311\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/dont-send-codes\/20308\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/threats\/","name":"threats"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/13366","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/675"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=13366"}],"version-history":[{"count":7,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/13366\/revisions"}],"predecessor-version":[{"id":20110,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/13366\/revisions\/20110"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/13367"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=13366"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=13366"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=13366"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}