Awas, Beredar Aplikasi Peretas Berkedok Undangan Pernikahan

CNN Indonesia
30 Jan 202311:39

Summary

TLDRThe script discusses a new digital banking scam involving fraudsters using fake wedding invitations sent via WhatsApp to trick victims into downloading malware that intercepts SMS OTPs, facilitating the transfer of mobile banking accounts to the fraudsters. It highlights the importance of public awareness against clicking suspicious links and installing apps from outside the Play Store. The conversation also touches on the need for banks to strengthen security measures, including the implementation of 'What you have' verification methods to prevent unauthorized account transfers.

Takeaways

  • 📲 The script discusses a new mode of banking crime involving digital deception through WhatsApp invitations to weddings, aiming to compromise mobile banking security.
  • 🔒 The criminals require an SMS OTP (One-Time Password) to transfer the victim's mobile banking account to their own account, highlighting the importance of OTP security.
  • 🚫 It is advised not to click on suspicious links or install applications from outside the Play Store, as this could inadvertently grant SMS access to fraudsters.
  • 🔄 The script mentions that the criminals have shifted their tactics from using courier packages to wedding invitations and then to BPJS (Indonesian Health Insurance) bills to trick victims into revealing their OTP.
  • 🤖 The term 'sniffing' is clarified as stealing transactions that pass through communication channels like WhatsApp or the internet, which is different from the current method of SMS forwarding.
  • 🛡️ The need for additional security measures beyond OTP is emphasized, suggesting the use of 'What you have' verification methods, such as requiring a physical item like an ATM card.
  • 👥 The script points out that the data stolen in 2022 has likely spread among fraudsters, indicating that social engineering and profiling of potential victims are common tactics.
  • 🔑 It is suggested that if one's data has been compromised, they should immediately change their mobile banking passwords and PINs to prevent unauthorized access.
  • 🏦 The banking institutions are urged to improve their security systems and consider implementing 'What you have' verification for account transfers to prevent fraud.
  • 📈 There is a call for the OJK (Indonesian Financial Services Authority) to standardize and enforce better security measures for mobile banking services.
  • 🌐 The script highlights the low level of cybersecurity literacy among the general public in Indonesia and the need for better protection and awareness.

Q & A

  • What is the new method of banking crime discussed in the script?

    -The new method of banking crime discussed involves scammers using digital invitations, such as for a wedding, sent via WhatsApp to hack into mobile banking accounts.

  • How do scammers obtain the SMS OTP needed for transferring mobile banking accounts?

    -Scammers send files in Android package or APK format to trick victims into installing applications that forward SMS OTPs to the scammers' devices, allowing them to transfer the banking accounts.

  • What is the difference between the new scam method and traditional phishing attacks?

    -The new scam method is an evolution of phishing where scammers no longer need to send packages or pretend to be couriers; they use digital invitations and other social engineering tactics to trick victims into providing their OTPs.

  • Is this new scam method considered 'sniffing' or 'RAT' (Remote Access Trojan)?

    -No, this method is not considered sniffing or RAT. It is categorized as SMS forwarding, which is less sophisticated but still effective in stealing banking information.

  • What additional security measures are recommended for banks to prevent such scams?

    -Banks are recommended to implement 'What you have' verification methods, such as requiring a physical visit to an ATM or bank with an ATM card or ID for any account number changes, to supplement the OTP security.

  • Why is the OTP via SMS considered the weakest form of OTP security?

    -The OTP via SMS is considered the weakest because it involves a third party and can be intercepted by malicious applications designed to format or steal SMS messages.

  • What is the role of social engineering in this new scam method?

    -Social engineering plays a significant role as scammers impersonate banks or other institutions to trick victims into filling out forms that collect their user IDs, passwords, and PINs.

  • How can the public protect themselves from falling victim to this scam?

    -The public should be cautious about clicking on links or installing apps from outside the Play Store, and always verify requests for OTPs and app permissions before granting them.

  • What is the importance of 'What you have' verification in the context of mobile banking security?

    -'What you have' verification, such as requiring a physical token or card, adds an extra layer of security by ensuring that the person attempting the transaction has a unique, non-transferable item in their possession.

  • What actions should individuals take if they suspect their banking information has been compromised?

    -Individuals should immediately change their passwords and PINs for mobile banking and consider changing their mobile banking accounts if they are unsure of the security measures in place by their bank.

  • What is the role of the financial regulatory authority in addressing this new scam method?

    -The financial regulatory authority, such as OJK in Indonesia, should standardize and enforce strict security measures, including 'What you have' verification, to ensure the safety of mobile banking transactions.

Outlines

00:00

🔒 New Digital Banking Fraud Tactics

The paragraph discusses the emergence of a new method of digital banking fraud involving the use of wedding invitations sent via WhatsApp as a means to compromise mobile banking systems. The fraudsters aim to intercept SMS OTPs to transfer the victim's mobile banking account to their own account. The speaker, an expert in cybersecurity and digital forensics, warns the public not to easily click on suspicious links or install apps from outside the Play Store, as these actions could inadvertently grant the fraudsters access to their banking details. The paragraph also touches on the importance of not just relying on SMS OTP for security, but also using additional authentication methods such as user ID, password, and PIN for transferring accounts.

05:00

📲 Countermeasures Against Mobile Banking Fraud

This paragraph delves into the importance of improving the security measures of mobile banking systems. It highlights the need for banks to implement 'What you have' authentication methods, such as requiring the physical presence of an ATM card or personal identification documents when transferring mobile banking to a new device. The speaker suggests that this would prevent fraudsters from taking over accounts, even if they have the necessary credentials and SMS OTP. The paragraph also calls for the standardization of security measures by regulatory bodies and urges the public to be cautious about installing apps and granting SMS access to unknown applications.

10:01

🚨 Public Awareness and Long-term Protection Strategies

The final paragraph emphasizes the need for public awareness about the potential spread of personal data and banking information among fraudsters. It advises individuals to change their mobile banking passwords and PINs as a precautionary measure if they suspect their data may have been compromised. Additionally, it recommends considering changing the mobile banking provider to one that requires 'What you have' verification for phone number changes. The speaker also calls on banks and the government to implement robust security measures and urges the public to be vigilant about their digital security.

Mindmap

Keywords

💡Cybersecurity

Cybersecurity refers to the practice of protecting internet-connected systems, including hardware, software, and data, from attack, damage, or unauthorized access. In the video, cybersecurity is a central theme, as the discussion revolves around the threats posed by digital banking fraud and the importance of safeguarding personal information and financial transactions.

💡Mobile Banking

Mobile banking is a service that allows users to conduct financial transactions remotely using a mobile device. In the context of the video, mobile banking is highlighted as a target for cybercriminals who exploit vulnerabilities to gain unauthorized access to users' accounts, emphasizing the need for robust security measures.

💡Phishing

Phishing is a type of online scam where criminals send seemingly legitimate emails or messages to trick recipients into providing sensitive information, such as login credentials or financial data. The video discusses a phishing evolution where criminals use various tactics, including fake wedding invitations or BPJS bills, to obtain SMS OTPs for mobile banking account takeover.

💡SMS OTP

SMS OTP stands for Short Message Service One-Time Password. It is a security measure used to verify a user's identity during transactions or account access. The script mentions that criminals are targeting SMS OTPs to facilitate the unauthorized transfer of funds from victims' mobile banking accounts.

💡APK

APK is the file format used to distribute and install applications on the Android operating system. In the video, it is mentioned that criminals send APK files disguised as legitimate updates or notifications, which, when installed, can give them access to the user's SMS and potentially their mobile banking credentials.

💡Social Engineering

Social engineering is the manipulation of individuals into divulging confidential information or performing certain actions. The video describes how cybercriminals use social engineering to trick people into filling out forms or installing malicious apps, which can lead to the theft of their mobile banking credentials.

💡Data Breach

A data breach occurs when unauthorized individuals gain access to sensitive information. The script refers to a past data breach incident in 2022, indicating that the stolen data might be used by criminals for social engineering and other fraudulent activities.

💡Two-Factor Authentication (2FA)

Two-factor authentication is a security process that requires users to provide two different authentication factors to verify their identity. The video suggests that while OTP is a form of 2FA, it may not be sufficient on its own, and additional security measures, such as 'What you have' verification, should be implemented by banks.

💡Cyber Forensics

Cyber forensics is the field of collecting, analyzing, and preserving digital evidence in order to investigate cybercrimes. The video features an expert in cyber security and forensics, who discusses the methods and implications of the digital banking fraud schemes mentioned.

💡Remote Access Trojan (RAT)

A Remote Access Trojan is a type of malware that gives the attacker unauthorized remote access to a victim's device. The video clarifies that the current fraud schemes in Indonesia have not yet escalated to the level of using RATs, but rather involve SMS forwarding, which is a less sophisticated but still dangerous method.

💡What You Have (WYH)

What You Have refers to a form of two-factor authentication that requires the user to possess a physical item, such as an ATM card or a mobile device, to complete a transaction or change settings. The video recommends that banks implement WYH verification to prevent unauthorized account takeovers, even if criminals have access to OTPs and other credentials.

Highlights

New modus operandi in banking crime involving digital deception through a wedding invitation via WhatsApp to hack mobile banking.

Cybersecurity and forensics expert discusses the increasing trend of online crimes, particularly in the banking sector, with reported cases reaching 45,000.

The evolution of phishing techniques now includes the use of Android package or APK files to steal SMS OTP for transferring mobile banking accounts.

Scammers are now using various social engineering tactics such as fake wedding invitations and BPJS bills to trick victims into providing SMS OTP.

The importance of public awareness against clicking and installing suspicious requests or APKs outside the Play Store.

The role of SMS forwarding in recent banking frauds, emphasizing that it's not sniffing or remote access Trojan attacks.

The necessity for additional security measures beyond SMS OTP, such as user ID, password, and transaction PIN, to secure mobile banking transfers.

Indication that the data breach from 2022 has led to the spread of sensitive banking information among fraudsters.

The use of social engineering by cybercriminals to analyze the behavior and habits of potential victims to craft targeted attacks.

The recommendation for banks to implement stronger security protocols, including 'What you have' verification methods like requiring a visit to an ATM or bank branch for account changes.

The call for standardization by regulatory bodies like OJK to enforce better security measures for mobile banking.

The suggestion for users to change their mobile banking passwords and PINs if they suspect their data may have been compromised.

The potential long-term protection measures for users, including changing mobile banking accounts and ensuring banks have robust verification processes in place.

The discussion on the limitations of SMS-based OTP as the weakest form of OTP due to potential interception by third parties.

The comparison of different OTP methods, highlighting the security levels of token-based, authenticator app-based, and SMS-based OTPs.

The emphasis on the importance of 'What you have' verification, such as possession of an ATM card or ID, as a crucial security measure.

The expert's advice for banks and the government to improve security measures and the literacy of cyber activities among the public.

Transcripts

play00:00

ya modus baru dalam kejahatan perbankan

play00:02

digital kembali ditemukan kali ini

play00:04

penipu menggunakan undangan pernikahan

play00:05

digital melalui WhatsApp untuk membobol

play00:08

mobile banking sudah bersama saya

play00:10

melalui sambungan virtual alfontanu Jaya

play00:12

pakar keamanan cyber dan forensik

play00:15

digital Selamat pagi Mas telepon

play00:18

Semoga sehat selalu ya baik Salam sehat

play00:22

juga Mas Mas ini kita selalu melihat

play00:23

bahwasanya kejahatan di online selalu

play00:26

meningkat ya Bahkan Laporan sudah

play00:28

mencapai 45.000 untuk sektor perbankan

play00:31

ataupun kejahatan transaksi melalui

play00:32

online Yang dilaporkan oleh kominfo

play00:35

Apakah modus penipuan online dengan

play00:37

mengirimkan file dengan format Android

play00:39

package atau APK ini merupakan modus

play00:42

living Mas

play00:44

ya ini merupakan perkembangan dari

play00:47

fishing sebenarnya mereka hanya

play00:49

membutuhkan SMS OTP ini untuk

play00:53

memindahkan account mobile banking dari

play00:57

rekening pemilik ke rekening pembajak

play00:59

Jadi sebelumnya kan dulu pakai paket

play01:03

kurir Nah sekarang jadi undangan TK lalu

play01:06

kemarin kita baru dapat lagi ada sebagai

play01:09

tagihan BPJS tujuannya sebenarnya ingin

play01:11

mendapatkan SMS OTP jadi secara otomatis

play01:15

SMS OTP yang masuk untuk persetujuan

play01:17

perpindahan rekening ini akan

play01:19

diformatkan ke perangkat dari penipunya

play01:22

biasanya ke telegram jadi hal itu yang

play01:24

perlu menjadi perhatian masyarakat

play01:26

jangan terlalu mudah mengklik lalu

play01:29

menginstal sebenarnya itu ada ada

play01:32

permintaan persetujuan apakah anda yakin

play01:35

ingin menginstal dari luar Play Store

play01:36

nah jika itu diklik pun nanti anda

play01:39

persetujuan lagi apakah anda yakin ingin

play01:41

memberikan akses SMS kepada aplikasi ini

play01:44

Kalau di klik Ya udah semua SMS yang

play01:46

masuk akan otomatis diteruskan ke

play01:49

penipunya dan itu akan digunakan untuk

play01:52

mengambil alih account mobile banking

play01:54

dan mengurus dananya Bung Yudi Mas

play01:58

tadi ya dengan memberikan tautan

play02:00

kemudian kita mendownload tapi di satu

play02:03

sisi Apakah ini termasuk dalam modus

play02:04

living Karena kalau saya baca Driving

play02:07

ini sangat menggunakan eh mobile banking

play02:09

yang berbasis pada wi-fi ataupun

play02:11

internet publik Apakah ini kurang lebih

play02:14

sama cara kerja ya Mas

play02:16

kalau dari sisi definisi mungkin ini

play02:19

tidak bisa dimasukkan ke snipping karena

play02:22

sniffing itu dia

play02:24

mencuri transaksi yang lewat

play02:27

transaksi yang lewat itu baik WhatsApp

play02:30

maupun dari internet sekarang deskripsi

play02:33

dengan baik jadi yang terjadi adalah SMS

play02:36

forwarding Jadi ini bukan sniping dan

play02:38

juga bukan Rat Jadi bukan remote access

play02:42

Trojan saat ini di Indonesia Kami lihat

play02:44

belum sampai ke revolusi itu kalau sudah

play02:46

masuk ke level rate remote akses turun

play02:49

hujan itu sangat mengkhawatirkan karena

play02:50

sangat berbahaya bisa melakukan remote

play02:53

pada perangkat kita tapi yang terjadi

play02:54

sekarang

play02:56

semata-mata hanya SMS forwarding jadi

play02:59

SMS sudah telegram dan ini yang satu

play03:02

catatan penting yang perlu kita

play03:03

perhatikan adalah untuk mengakses dan

play03:06

memindahkan mobile banking ke telepon

play03:09

lain tidak hanya butuh SMS OTP kita

play03:12

butuh yang lain namanya

play03:14

user ID password dan PIN transaksi nah

play03:17

kami sinyalir bahwa data Ini sebenarnya

play03:21

sudah menyebar di kalangan penipu itu

play03:23

apakah mereka dapatkan waktu fishing

play03:26

yang Tahun 2022 yang waktu itu kenaikan

play03:29

biaya admin dimana banyak menjadi

play03:31

korbannya mereka tidak mau kena biaya

play03:33

admin lalu diarahkan ke situs finishing

play03:35

lalu memasukkan data user ID password

play03:38

dan pin di sana dari situ dilakukan

play03:40

profiling lalu ditarget korbannya jadi

play03:43

eee untuk mendapatkan OTP Nah jadi kalau

play03:47

dia bisa dapatkan otp-nya dan dia punya

play03:49

databasenya yaitu jadi sempurna dia bisa

play03:51

mengambil alih ekornya dan mengurus

play03:53

dananya kalau tadi Mas over mengatakan

play03:56

eee profiling dari calon ataupun target

play04:00

daripada korban sendiri ya kita bisa

play04:02

melihat ini merupakan salah satu

play04:03

indikasi dari social engineering ya Mas

play04:05

gimana para pelaku kegiatan cyber itu

play04:07

juga melihat perilaku dan kecenderungan

play04:10

serta Bagaimana habit dari para calon

play04:12

korbannya dan yang menarik Apakah memang

play04:14

data-data yang dicuri tadi itu tadi Mas

play04:17

mengacu pada peristiwa pencurian data di

play04:19

2022 Apakah ini juga merupakan salah

play04:22

satu hal yang perlu diwaspadai mengingat

play04:24

data kita sudah tidak lagi bersifat

play04:26

rahasia terutama terkait dengan

play04:28

data-data mungkin alamat kemudian juga

play04:30

data pribadi yang boleh jadi semua sudah

play04:33

tersebar Mas

play04:36

ya Jadi sebenarnya data ini sangat

play04:39

rahasia dan mereka dapatkan dengan

play04:43

kecerdikannya melakukan rekayasa sosial

play04:46

jadi mereka melakukan rekayasa sosial

play04:49

memalsukan sebagai pengumuman bank kalau

play04:52

anda tidak ingin dikenakan biaya fix

play04:55

transfer 150.000 per bulan maka anda

play05:00

harus Isi form ini padahal itu

play05:02

memalsukan dari bank bank tidak

play05:04

melakukan hal itu

play05:06

nasabah mana ada yang mau dikenakan

play05:09

150.000 flat selama sebulan walaupun

play05:11

transfernya unlimited lalu mereka akan

play05:14

mengisi datanya Nah di situ dipancing

play05:16

untuk mengisi data user ID password dan

play05:19

PIN nah dari situ dikumpulkan datanya

play05:21

dan kami sinyalir waktu itu korbannya

play05:25

sangat banyak dari beberapa

play05:28

bank pengelola mobile banking lalu data

play05:31

itu kemungkinan besar sudah beredar di

play05:34

kalangan penipu ini jadi Jadi sekarang

play05:36

mereka sudah punya nomor telepon sudah

play05:38

punya user ID password dan PIN lalu

play05:40

mereka tinggal mendapatkan OTP ini nah

play05:43

dapatkan OTP ini ya mereka kirim APK nah

play05:46

apk-nya mereka pinter sekali kemarin

play05:48

jadi sebagai kurir paket lalu

play05:50

selanjutnya sekarang jadi undangan nikah

play05:52

besok dia jadi BPJS jadi Hal ini yang

play05:55

yang perlu diperhatikan oleh masyarakat

play05:58

dan bank penyelenggara mobile banking

play06:01

juga Arab juga Tolong diperbaiki sistem

play06:03

keamanannya Jadi jika terjadi

play06:05

perpindahan nomor account mobile banking

play06:09

harap anda gunakan otentikasi What you

play06:12

have Jadi bukan what you know what you

play06:15

have itu seperti

play06:16

korbannya pemilik rekening harus ke ATM

play06:20

untuk karena dia butuh kartu ATM dan

play06:23

penipu tidak punya dia perusahaan untuk

play06:25

mengganti user ID dari mobile bankingnya

play06:27

atau dia harus ke CS memperlihatkan

play06:30

ktp-nya KTP seperti ini yang kecil perlu

play06:35

diperhatikan juga oleh penyelenggaraan

play06:37

mobile banking jadi masyarakat memang

play06:39

pada umumnya kan awam gitu Kalau orang

play06:41

yang tidak mengerti melakukan klik lalu

play06:44

setuju semua Nah kalau misalnya

play06:46

melakukan verifikasi What you have

play06:48

finish Setiap perpindahan account maka

play06:49

walaupun penipu memiliki kredensial dan

play06:52

memiliki SMS OTP dia tidak akan bisa

play06:54

mengambil alih dananya Kenapa karena

play06:57

sudah dilindungi dengan baik oleh bank

play06:59

nah hal itu yang kami sarankan untuk

play07:01

diperhatikan oleh bank penyedia juga

play07:02

dari OJK juga kami benar-benar berharap

play07:05

bahwa OJK sebagai Wasis sebagai pengawas

play07:07

untuk melakukan standarisasi yang baik

play07:10

gitu loh pokoknya kalau mau pindah nomor

play07:13

handphone harus ada verifikasi What you

play07:16

have ke banknya atau ktm-nya jadi itu

play07:19

yang kami sarankan dan masyarakat juga

play07:21

harus berhati-hati jangan sembarangan

play07:24

kalau terima APK langsung di install

play07:26

atau disetujui Kalau anda tadi

play07:28

mengatakan bahwasanya upgrade daripada

play07:30

pelaku kegiatan cyber juga harusnya

play07:33

diimbangi dengan proteksi yang baik dari

play07:35

para pengguna jasa maupun pihak penyedia

play07:39

perbankan sendiri ya Mas tetapi yang

play07:41

menarik tadi anda katakan terkait dengan

play07:42

bagaimana aplikasi tersebut juga harus

play07:45

diimbangi dengan verifikasi seperti obat

play07:47

you have lalu mengapa hal tersebut tidak

play07:49

terlalu jamak dilakukan di Indonesia

play07:51

ataupun memang ini karena literasi dalam

play07:54

kegiatan cyber di Indonesia masih rendah

play07:56

Mas

play08:00

kelihatannya mungkin

play08:02

penyelenggara mobile banking ini

play08:05

beranggapan bahwa pengamanan OTP ini

play08:08

sudah cukup untuk mengamankan karena OTP

play08:12

ini secara secara teori kan saat ini

play08:14

secara de facto merupakan pengamanan

play08:16

terbaik tetapi yang mereka lupakan

play08:19

adalah pengamanan OTP ini

play08:22

memiliki banyak tingkat keamanan jadi

play08:26

OTP ini ada 3 secara umum satu OTP token

play08:29

token itu yang paling aman karena tidak

play08:31

tidak ada perantara pihak ketiga lalu

play08:34

kedua OTP autentiater seperti Google

play08:36

authenticator Microsoft atau

play08:39

masih aman tetapi relatif Kenapa karena

play08:43

ada daya handphone lalu OTP ketiga

play08:45

dengan menggunakan SMS sebenarnya secara

play08:48

teknis OTP dengan SMS itu adalah OTP

play08:51

yang paling lemah dari semua OTP yang

play08:53

saya Sebutkan Tadi kenapa karena satu

play08:55

ini melibatkan pihak ketiga jadi di

play08:57

tengah jalan pihak ketiga itu jika bocor

play08:59

itu bisa diambil OTP ini ya yang kedua

play09:01

yang seperti hal ini kalau perangkatnya

play09:03

eee disusupi oleh aplikasi untuk

play09:07

mem-format SMS atau pencuri SMS dan

play09:10

korbannya tidak sadar menjalankannya

play09:12

maka OTP itu bisa dicuri nah tadinya OTP

play09:15

yang menjadi eee What you happy itu

play09:18

sebagai perangkat itu ketika sudah

play09:21

dikeluarkan angkanya lalu berhasil

play09:23

disadap itu jadi what you know what you

play09:26

know Itu kan bisa disebarkan

play09:28

username

play09:30

itu bisa dibagikan tetapi What you have

play09:33

itu nggak bisa dibagikan

play09:35

jadi itu seperti kartu ATM seperti KTP

play09:39

atau wajah kita jadi kita mesti ke bank

play09:42

kalau misalnya mau ganti nomor handphone

play09:43

atau apa Nah itu yang yang perlu

play09:46

diperhatikan oleh penyelenggara mobile

play09:48

banking

play09:51

terkait dengan tips sendiri selain tadi

play09:53

ada mengatakan bahwasanya buat you have

play09:55

itu merupakan salah satu hal yang

play09:57

krusial untuk melakukan verifikasi

play09:59

ketika ada pergantian nomor telepon

play10:01

ataupun ketika ada penggunaan telepon

play10:04

ataupun data berbasis telepon yang tidak

play10:08

sesuai dengan peruntukannya Ada hal lain

play10:10

nggak Mas yang harus kira-kira kita

play10:13

perkirakan bisa menjadi salah satu

play10:15

protection di awal buat para pengguna

play10:18

jasa perbankan mobile ataupun para

play10:20

pengguna telepon mas

play10:24

kalau melihat bahwa data ini sudah

play10:26

menyebar bahwa kemungkinan jika kita

play10:30

merasa bahwa dulu kita pernah dikirimi

play10:32

data ini lalu mungkin data kita sudah

play10:34

menyebak jadi ada ada satu saran

play10:38

dan satu saran longtem saya adalah

play10:41

segera ganti password dan pin dari

play10:44

mobile banking anda itu supaya kalau

play10:46

misalnya datanya sudah menyebar udah

play10:48

diganti pelaku penipuannya nggak bisa

play10:51

melakukan login itu yang pertama yang

play10:53

kedua jika sudah melakukan hal itu kalau

play10:56

bisa sih ganti account mobile bankingnya

play10:58

dan Kalau anda kurang yakin banknya

play11:01

mengamankan dengan What you have kalau

play11:03

misalnya ganti nomor saya sarankan udah

play11:05

ganti aja penyelenggara mobile

play11:07

bankingnya dengan yang kalau misalnya

play11:09

terjadi pergantian nomor dia perlu

play11:11

verifikasi ke bank atau ke atm-nya

play11:14

daripada dana anda yang jadi taruhannya

play11:17

gitu loh Itu Saran saya sih Selain itu

play11:20

untuk bank dan pemerintah saya harapkan

play11:24

cobalah terapkan pengamanan yang baik

play11:26

yang seperti kami sarankan tadi

play11:32

Terima kasih untuk perbincangan ya Mas

play11:34

Selamat pagi

Rate This

5.0 / 5 (0 votes)

Étiquettes Connexes
CybersecurityBanking FraudDigital ScamsMobile BankingOTP SecuritySMS PhishingCyber ForensicsSocial EngineeringData PrivacySecurity Measures
Besoin d'un résumé en anglais ?