Social Icons

  • twitter
  • patreon
  • podcast
  • mail
New Money Review

A periodical covering the accelerating changes in money

  • HOME
  • ACCOUNT
  • EXCHANGE
  • PAYMENT
  • VALUE
  • About
  • HOME
  • ACCOUNT
  • EXCHANGE
  • PAYMENT
  • VALUE
  • About

Breaking News

6 days ago
The rise of techno-fascism
4 months ago
Unseen Money 13—Washing the proceeds in cyberspace
4 months ago
Unseen Money 12: Keeping hackers out of your DeFi wallet
6 months ago
Unseen Money 11—a bad bird on your wire
6 months ago
Unseen Money 10: The UK—open for (dodgy) business
ACCOUNT, EXCHANGE, Featured, PAYMENT, VALUE

Unseen Money 11—a bad bird on your wire

Written by Paul Amery on May 19, 2025

More in ACCOUNT:

  • The rise of techno-fascism October 27, 2025
  • Unseen Money 12: Keeping hackers out of your DeFi wallet July 15, 2025
  • Unseen Money 10: The UK—open for (dodgy) business May 1, 2025

Most scams where the victim is tricked into paying money to fraudsters originate on social media—often on Facebook, Instagram and WhatsApp.

But in the UK around one scam in five—and nearly half by the total value stolen—exploits weaknesses in our telecommunications infrastructure.

That could be someone spoofing the number of a legitimate entity, such as the tax office or your bank, when calling you. It could be a scammer exploiting security vulnerabilities in the mobile network to compromise and intercept voice and SMS messages.

In a rapidly rising form of fraud, criminals impersonate the nearest cell phone tower and send messages that look like they’re from your bank or mobile service provider

In a rapidly rising form of fraud, criminals impersonate the nearest cell phone tower and send messages that look like they’re from your bank or mobile service provider. One click on a link and you’re soon handing over valuable personal information or downloading malware that gives the scammers access to your payment app or crypto wallet.

In the latest episode of Unseen Money from New Money Review, my co-host Timur Yunusov and I are joined by telecom cybersecurity expert Dmitry Kurbatov, chief executive of UK-based company SecurityGen.

In the podcast, Dmitry explains how criminals can spoof a trusted entity’s phone number when calling you. We look at SIM swap frauds and discuss who bears responsibility for the continuing security flaws in mobile networks.

We highlight in which countries users are currently most exposed to mobile phone-based frauds. We look at the recent SK Telecoms breach in South Korea, which exposed the personal and financial data of up to 23 million users. And we describe the ever more ingenious methods being used by scammers to subvert telecoms networks.

Listen to the podcast.

Some technical terms used during the podcast:

“SIP trunking” is the digital method of making and receiving phone calls and other digital communication over an internet connection.

“SIP protocol” is a signalling protocol used for initiating, maintaining, and terminating multimedia sessions, including voice, video, and messaging.

“SIM farms” or “SIM boxes” bridge the internet and cellular networks, enabling the routing and redirection of calls or messages through multiple SIM cards.

“Rich Communication Services (RCS)” are a messaging protocol that enhances traditional SMS by offering richer features like multimedia sharing, group chats, read receipts and typing indicators.

“Drive-by smishing” is where fraudsters use fake base stations to force victims’ phones to connect to a fake mobile network and then use SMS messages to distribute malicious links or initiate scams.

In “software-defined radio”, components that are conventionally implemented in analogue hardware (e.g., mixers, filters, amplifiers, modulators/demodulators, detectors) are instead implemented by means of software on a computer.

A “global title” is an address used in SCCP (Signalling Connection Control Part, a network-layer protocol in telecommunications) for routing signalling messages on telecommunications networks.

“SS7” is a set of telecommunications protocols that are used to exchange information between different telephone networks.

“IPX” is a telecommunications interconnection model for the exchange of internet protocol-based traffic between customers of separate mobile and fixed operators.

*************

The New Money Review podcast brings you the best minds from the world of money.

From economics to payments, financial markets, technology, law, digital assets, crime and fraud, you’ll find an episode that interests you. 

 

Recent

  • The rise of techno-fascism

    The rise of techno-fascism


  • Unseen Money 13—Washing the proceeds in cyberspace

    Unseen Money 13—Washing the proceeds in cyberspace


  • Unseen Money 12: Keeping hackers out of your DeFi wallet

    Unseen Money 12: Keeping hackers out of your DeFi wallet


  • Unseen Money 11—a bad bird on your wire

    Unseen Money 11—a bad bird on your wire


Popular

  • Bitcoin: competitor or complement to gold? 2 comments
  • Heat rises over cryptocurrencies’ energy costs  2 comments
  • The cat-and-mouse game of cryptocurrency mining 2 comments
  • JPM Coin adds to pressure on central banks 2 comments
  • Can cryptocurrency networks govern themselves? 2 comments
  • Cryptocurrencies: who’s at the controls? 1 comments
  • Freer thinking about money 1 comments
  • Quantum-proofing digital money 1 comments
  • Cryptocurrencies’ emergence makes central bankers nervous 1 comments
  • Old payment systems never die 1 comments

Let’s connect…

  • twitter
  • patreon
  • podcast
  • mail

New Money Review Podcast

Support New Money Review

Our patreon (fiat) account

About

New Money Review covers innovations in money and their implications for our financial, social and political systems.

Published under a Creative Commons licence.

Site design | Lemonbox

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Let’s connect…

  • twitter
  • patreon
  • podcast
  • mail

New Money Review

. Designed by WPZOOM

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok