They describe the purpose of the request to you: an attempt to transfer from your account has been detected, someone is trying to take out a loan in your name, the security of your card is at risk.
They explain to you that you need to act immediately: for example, go through the verification procedure by providing your payment details.
Along the way, they ask a lot of questions to lower your guard and find out additional information: do you currently have a card in hand, how often do you make purchases with it, in which stores and for what amounts.
Using your answers, they tell you how the data leak allegedly occurred: for example, if you say that you recently paid for an apartment with a card through an app, you will be told that this app was recently hacked.
To protect your money, you are asked to provide your card slovenia mobile database details, then they make a “test” transfer, which they later promise to cancel, and ask you for an SMS code to complete the transaction.
For the scheme to work, the scammers must gain trust and convince the victim that they have a direct relationship with the bank. To do this, they use various methods and techniques, such as:
background noise similar to office sounds;
use of financial terminology and official formulations in conversation;
switching the conversation to another specialist;
stories about other clients who found themselves in the same situation as you;
programs that imitate a voice robot that requires you to say a confirmation code from an SMS.
But the main component, without which no fraudulent scheme will work, is your personal information. First of all, criminals need to know your name and mobile number.