Bts Scam: Accounts getting emptied due to fake towers, network of fake mobile networks gives sleepless nights to security agencies – Fake Bts Scam How Accounts Drained Via Signal Hijacking New Network Hole Shocks Investigators

Summary

Nowadays, scammers are using portable fake mobile towers, which can be hidden in the trunk of a car, bag or on the roadside. At the same time, the mobile phone always chooses the strongest signal, in such a situation many times it leaves the real tower and connects to the fake tower. As soon as…

Bts Scam: Accounts getting emptied due to fake towers, network of fake mobile networks gives sleepless nights to security agencies – Fake Bts Scam How Accounts Drained Via Signal Hijacking New Network Hole Shocks Investigators

Nowadays, scammers are using portable fake mobile towers, which can be hidden in the trunk of a car, bag or on the roadside. At the same time, the mobile phone always chooses the strongest signal, in such a situation many times it leaves the real tower and connects to the fake tower. As soon as this happens, the security of the phone gets downgraded (4G/5G to 2G) and scammers get in.

How does fraud happen?

Once you connect to the fake network, scammers can send mass SMS blasts from your number, sending fake bank alerts, OTP requests and phishing links. Then by scaring you they make you click the link or fill the details. During this time the user does not even have a clue, because all this happens at the network level.

Also read: Safer Internet Day 2026: Innocent children are getting trapped in the trap of adult content, set these parental controls before giving the phone.

How dangerous is this scam?

These scams like fraud messages, banking OTP theft from your number and unauthorized transactions, personal data leak, identity theft are not limited to India only. Even in countries like Greece, police have caught such fake tower gangs.

Why are telecom companies worried?

Mobile phones cannot differentiate between real and fake towers. Experts say that now a new network protocol is needed so that the phone connects only to the verified tower.

Also read: Apple can bring iPhone 17e in the budget of ₹ 50,000: Will be equipped with the latest A19 chip, preparation for launch in March

How can users stay safe?

Stopping this is a big challenge for telecom companies because phones are programmed to choose the best signal. Until new protocols are in place, here’s what you should do:


  • Network monitoring: If your phone suddenly switches from 5G to 2G or shows no service without any reason, then consider it as suspicious activity and be alert.

  • distance from link: Do not click on any link received in any SMS, no matter how genuine it may seem.

  • Verification: Confirm any message related to the bank only through the official app or by calling the customer care number.

Exit mobile version