They called as my bank. I gave them the codes.
A caller said they were my bank’s fraud team, named a few real merchants from my statement, and warned that a bogus transfer was in progress unless I verified immediately.
Caller ID showed a number I thought I recognised.
They stayed on the line while texts arrived with one-time codes and asked me to read each code aloud so they could “block the transaction.”
I complied until my app showed new payees and outgoing wires I had not set up.
Vishing plus spoofed numbers plus OTP codes lets criminals pass strong authentication from the victim’s own device.
Real banks do not ask you to dictate SMS or app codes to a caller.
While the call ran I was afraid every second of delay would empty the account; hanging up felt riskier than cooperating.
I hung up, dialled the number on my card from a second phone, and the agent said no fraud alert had been opened and no colleague had contacted me—that minute the other line went dead.
Recovering savings took affidavits and weeks of stress; I felt foolish for trusting the ID display until I learned how cheap spoofing is.
I never give OTPs to inbound callers.
I hang up and call the bank on a number I look up myself.
- Banks will not ask for your full password or one-time codes over the phone.
- Report vishing to your bank and FTC (US) or local fraud lines.
For more help, see our Report a scam page and Spot and avoid scams guide.
Test your understanding
Flip each card to check your answer
Vishing plus spoofed numbers plus OTP codes lets criminals pass strong authentication from the victim’s own device.
Tap to flipVishing plus spoofed numbers plus OTP codes lets criminals pass strong authentication from the victim’s own device.