{"id":15091,"date":"2023-02-22T11:37:08","date_gmt":"2023-02-22T16:37:08","guid":{"rendered":"https:\/\/knowledgeflow.org\/?p=15091"},"modified":"2024-05-23T16:57:01","modified_gmt":"2024-05-23T20:57:01","slug":"the-otp-scam-a-victims-story","status":"publish","type":"post","link":"https:\/\/knowledgeflow.org\/fr\/the-otp-scam-a-victims-story\/","title":{"rendered":"L'escroquerie d'OTP - L'histoire d'une victime"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p>This scam typically involves victims being tricked into believing that the bank, government, or another institution is calling them. Victims are asked to provide the one-time passcode that was sent to them, in order to \u201cverify their identity.\u201d In reality, scammers are logging in posing as the victims, which sends a one-time passcode to the victim\u2019s device. Scammers convince victims to give up their one-time passcode and enter it to either log in to the victim\u2019s account, or to transfer funds out.&nbsp;&nbsp;Check out our tipsheet to find more information about how this scam works.&nbsp;<\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/knowledgeflow.org\/resource\/the-one-time-passcode-scam\/\" target=\"_blank\">KnowledgeFlow &#8211; The One-Time Passcode Scam<\/a>&nbsp;<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\"><style>.kb-image15091_3e8f6e-fa.kb-image-is-ratio-size, .kb-image15091_3e8f6e-fa .kb-image-is-ratio-size{max-width:318px;width:100%;}.wp-block-kadence-column > .kt-inside-inner-col > .kb-image15091_3e8f6e-fa.kb-image-is-ratio-size, .wp-block-kadence-column > .kt-inside-inner-col > .kb-image15091_3e8f6e-fa .kb-image-is-ratio-size{align-self:unset;}.kb-image15091_3e8f6e-fa{max-width:318px;}.image-is-svg.kb-image15091_3e8f6e-fa{-webkit-flex:0 1 100%;flex:0 1 100%;}.image-is-svg.kb-image15091_3e8f6e-fa img{width:100%;}.kb-image15091_3e8f6e-fa .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<figure class=\"wp-block-kadence-image kb-image15091_3e8f6e-fa size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1080\" height=\"1350\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/01\/OTP-Scam-Social-Media-Post-KnowledgeShare-19012023-1.png\" alt=\"\" class=\"kb-img wp-image-14486\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/01\/OTP-Scam-Social-Media-Post-KnowledgeShare-19012023-1.png 1080w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/01\/OTP-Scam-Social-Media-Post-KnowledgeShare-19012023-1-600x750.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/01\/OTP-Scam-Social-Media-Post-KnowledgeShare-19012023-1-768x960.png 768w\" sizes=\"auto, (max-width: 1080px) 100vw, 1080px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p>We were joined by Marilyn Crawford who was recently targeted by this scam to share her experience. On January 16, 2023, she received a call from what looked like her bank. Scammers will often use Caller ID \u201cspoofing,\u201d where they can make their caller ID look like any number. Within minutes, an e-transfer of $2800 and 3 $250 gift cards were charged to her account. Our interview recaps how the scam happened and the financial and psychological consequences.&nbsp;&nbsp;<\/p>\n\n\n<style>.kadence-video-popup15091_0d697f-6f .kadence-video-popup-wrap .kt-video-svg-icon{color:#ffffff;}.kadence-video-popup15091_0d697f-6f .kadence-video-popup-wrap .kt-video-svg-icon > svg{stroke-width:2;}.kadence-video-popup15091_0d697f-6f .kadence-video-popup-wrap .kadence-video-overlay{opacity:0.3;;mix-blend-mode:none;;background:#000000;;}.kadence-video-popup15091_0d697f-6f .kadence-video-popup-wrap:hover .kadence-video-overlay{opacity:0.5;;}.glightbox-kadence-dark.kadence-popup-15091_0d697f-6f .goverlay{background:#000000;opacity:0.8;}.glightbox-container.kadence-popup-15091_0d697f-6f .gclose path, .glightbox-container.kadence-popup-15091_0d697f-6f .gnext path, .glightbox-container.kadence-popup-15091_0d697f-6f .gprev path{fill:#ffffff;}.glightbox-container.kadence-popup-15091_0d697f-6f .gslide-video, .glightbox-container.kadence-popup-15091_0d697f-6f .gvideo-local{max-width:900px !important;}<\/style>\n<div class=\"wp-block-kadence-videopopup kadence-video-popup15091_0d697f-6f\"><div class=\"kadence-video-popup-wrap kadence-video-noshadow\"><div class=\"kadence-video-intrinsic \"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/02\/OTP-Scam-Blog-Title-Page-Blog-22-02-2023.png\" alt=\"\" width=\"1280\" height=\"720\" class=\"kadence-video-poster wp-image-15098\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/02\/OTP-Scam-Blog-Title-Page-Blog-22-02-2023.png 1280w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/02\/OTP-Scam-Blog-Title-Page-Blog-22-02-2023-600x338.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/02\/OTP-Scam-Blog-Title-Page-Blog-22-02-2023-300x169.png 300w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/02\/OTP-Scam-Blog-Title-Page-Blog-22-02-2023-1024x576.png 1024w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/02\/OTP-Scam-Blog-Title-Page-Blog-22-02-2023-150x84.png 150w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/02\/OTP-Scam-Blog-Title-Page-Blog-22-02-2023-768x432.png 768w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><div class=\"kadence-video-overlay\"><\/div><a class=\"kadence-video-popup-link kadence-video-type-external\" href=\"https:\/\/youtu.be\/9QB_087fY-Y\" role=\"button\" data-popup-class=\"kadence-popup-15091_0d697f-6f\" data-effect=\"none\" data-popup-id=\"kadence-local-video-15091_0d697f-6f\" data-popup-auto=\"true\" data-youtube-cookies=\"true\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fas_play kt-video-svg-icon kt-video-svg-icon-style-default kt-video-svg-icon-fas play kt-video-play-animation-none kt-video-svg-icon-size-auto\"><svg viewBox=\"0 0 448 512\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  role=\"img\"><title>Play<\/title><path d=\"M424.4 214.7L72.4 6.6C43.8-10.3 0 6.1 0 47.9V464c0 37.5 40.7 60.1 72.4 41.3l352-208c31.4-18.5 31.5-64.1 0-82.6z\"\/><\/svg><\/span><\/a><\/div><\/div><\/div>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading15091_03717a-2d, .wp-block-kadence-advancedheading.kt-adv-heading15091_03717a-2d[data-kb-block=\"kb-adv-heading15091_03717a-2d\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading15091_03717a-2d mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading15091_03717a-2d[data-kb-block=\"kb-adv-heading15091_03717a-2d\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading15091_03717a-2d img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading15091_03717a-2d[data-kb-block=\"kb-adv-heading15091_03717a-2d\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h2 class=\"kt-adv-heading15091_03717a-2d wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading15091_03717a-2d\">Understanding the OTP Scam: Key Insights<\/h2>\n\n\n\n<p><br>Victims of this scam often have their accounts frozen, must adjust their online banking, and contact their credit bureau. Most banks will do their best to help victims of scams recover lost funds, however, these processes are quite lengthy. The good news is that there are certain security measures that you can take to help avoid being targeted by scammers.\u00a0\u00a0<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Passwords<\/strong>&nbsp;<\/p>\n\n\n\n<p>Never re-use the same password for more than one account, especially for financial information. If your login information for a different, less secure site was breached, or leaked, scammers may use that information to access your financial accounts.&nbsp;&nbsp;<\/p>\n\n\n\n<p>You can use secure password managers to create, store, and save your passwords to keep track.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Visit our resources on Password Managers to help you pick a secure password manager.&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/knowledgeflow.org\/initiative\/safer-password-managers\/\" target=\"_blank\" rel=\"noreferrer noopener\">KnowledgeFlow &#8211; Safer Password Managers<\/a>&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/knowledgeflow.org\/resource\/how-to-pick-a-password-manager\/\" target=\"_blank\" rel=\"noreferrer noopener\">KnowledgeFlow &#8211; How To Pick A Password Manager<\/a>&nbsp;<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>One-Time Passcodes<\/strong>&nbsp;<\/p>\n\n\n\n<p>Never share your one-time passcodes with anyone, over the phone or in-person. This is often the last step needed to access your accounts or take money out.&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Calling Your Bank&nbsp;<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p>If someone calls claiming to be from your financial institution, it\u2019s always best to hang up and call the phone number on the back of your card. Scammers can make any phone number look as if it&#8217;s another. You can never be sure you are talking to your bank unless you call them directly.&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Choosing Your Bank&nbsp;<\/strong><\/p>\n\n\n\n<p>With the increasing number of online scams, it\u2019s important to choose banks that have secure practices. Ensure your financial institution offers multi-factor authentication and that it is enabled for all your accounts. Your bank should also not have character limits when creating your online banking passwords. The more complicated your password is, the more secure it is.&nbsp;&nbsp;<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\"><style>.kb-image15091_3c1baa-6a.kb-image-is-ratio-size, .kb-image15091_3c1baa-6a .kb-image-is-ratio-size{max-width:369px;width:100%;}.wp-block-kadence-column > .kt-inside-inner-col > .kb-image15091_3c1baa-6a.kb-image-is-ratio-size, .wp-block-kadence-column > .kt-inside-inner-col > .kb-image15091_3c1baa-6a .kb-image-is-ratio-size{align-self:unset;}.kb-image15091_3c1baa-6a{max-width:369px;}.image-is-svg.kb-image15091_3c1baa-6a{-webkit-flex:0 1 100%;flex:0 1 100%;}.image-is-svg.kb-image15091_3c1baa-6a img{width:100%;}.kb-image15091_3c1baa-6a .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<figure class=\"wp-block-kadence-image kb-image15091_3c1baa-6a size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1080\" height=\"1350\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2022\/12\/KnowledgeShare-Caller-ID-Spoofing-December-9.png\" alt=\"\" class=\"kb-img wp-image-13517\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2022\/12\/KnowledgeShare-Caller-ID-Spoofing-December-9.png 1080w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2022\/12\/KnowledgeShare-Caller-ID-Spoofing-December-9-600x750.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2022\/12\/KnowledgeShare-Caller-ID-Spoofing-December-9-768x960.png 768w\" sizes=\"auto, (max-width: 1080px) 100vw, 1080px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p>Visit our tip sheet to learn more about the safest online banking practices.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/knowledgeflow.org\/resource\/online-banking\/\" target=\"_blank\" rel=\"noreferrer noopener\">KnowledgeFlow &#8211; Online Banking<\/a>&nbsp;<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Reporting Scams&nbsp;<\/strong><\/p>\n\n\n\n<p>Be sure to report all scams to the Canadian Anti-Fraud Centre. If you think you have been scammed, contact your financial institution immediately. If you are scammed, contact your local police to file a report.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Visit our tip sheet on reporting scams to learn how and where to report fraud.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/knowledgeflow.org\/resource\/what-to-do-after-identity-theft\/\" target=\"_blank\" rel=\"noreferrer noopener\">KnowledgeFlow &#8211; What to do After Identity Theft<\/a>&nbsp;<\/p>\n\n\n\n<p>Remember, don\u2019t be embarrassed if you do become a victim of a scam. Unfortunately, many people are scammed every day. Let\u2019s bring that number down. Ensure you are protecting yourself and your loved ones by sharing this information.&nbsp;&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cette escroquerie consiste g\u00e9n\u00e9ralement \u00e0 faire croire aux victimes que la banque, le gouvernement ou une autre institution...<\/p>","protected":false},"author":8,"featured_media":15107,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[516],"tags":[390,388,382,369],"class_list":["post-15091","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebytes","tag-cyber-crime","tag-online-safety","tag-parents","tag-seniors"],"acf":[],"taxonomy_info":{"category":[{"value":516,"label":"KnowledgeBytes"}],"post_tag":[{"value":390,"label":"cyber crime"},{"value":388,"label":"online safety"},{"value":382,"label":"parents"},{"value":369,"label":"seniors"}]},"featured_image_src_large":["https:\/\/knowledgeflow.org\/wp-content\/uploads\/2023\/02\/OTP-Scam-Blog-Images-Blog-21-02-2023-1-1024x431.png",1024,431,true],"author_info":{"display_name":"KnowledgeFlow Cybersafety Foundation","author_link":"https:\/\/knowledgeflow.org\/fr\/author\/knowledgefloweditor\/"},"comment_info":0,"category_info":[{"term_id":516,"name":"KnowledgeBytes","slug":"knowledgebytes","term_group":0,"term_taxonomy_id":516,"taxonomy":"category","description":"","parent":0,"count":78,"filter":"raw","cat_ID":516,"category_count":78,"category_description":"","cat_name":"KnowledgeBytes","category_nicename":"knowledgebytes","category_parent":0}],"tag_info":[{"term_id":390,"name":"cyber crime","slug":"cyber-crime","term_group":0,"term_taxonomy_id":390,"taxonomy":"post_tag","description":"","parent":0,"count":15,"filter":"raw"},{"term_id":388,"name":"online safety","slug":"online-safety","term_group":0,"term_taxonomy_id":388,"taxonomy":"post_tag","description":"","parent":0,"count":63,"filter":"raw"},{"term_id":382,"name":"parents","slug":"parents","term_group":0,"term_taxonomy_id":382,"taxonomy":"post_tag","description":"","parent":0,"count":20,"filter":"raw"},{"term_id":369,"name":"seniors","slug":"seniors","term_group":0,"term_taxonomy_id":369,"taxonomy":"post_tag","description":"","parent":0,"count":27,"filter":"raw"}],"_links":{"self":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/posts\/15091","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/comments?post=15091"}],"version-history":[{"count":0,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/posts\/15091\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/media\/15107"}],"wp:attachment":[{"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/media?parent=15091"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/categories?post=15091"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/knowledgeflow.org\/fr\/wp-json\/wp\/v2\/tags?post=15091"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}