A typical theft is committed by firstly using techniques such as phishing or spyware to gain access to a victim's online banking credentials in order to initiate a transfer of funds. The next step is to be able to intercept the authentication SMS sent by the bank. This is done by procuring a new SIM and porting the victim’s mobile number. The fraud is then typically committed very shortly afterwards.
Value-add to existing fraud detection systems
Financial institutions can vastly improve their existing fraud detection systems by factoring in Mobile Number porting events as they occur in real-time. As an example: 'online funds transfer just initiated to a new payee, and the customers mobile number has just been ported' - raise alert and refer to fraud group