SIM Swap Fraud in Indonesia: How Attackers Drain Your Bank and E-Wallet
Learn how SIM swap scams work in Indonesia through Telkomsel, Indosat, and XL, how attackers intercept OTPs to drain bank accounts, and কীভাবে protect yourself.
SIM Swap Fraud in Indonesia: How Attackers Drain Your Bank and E-Wallet
SIM swap fraud is one of the most devastating cyberattacks affecting Indonesian mobile users. In a successful SIM swap, the attacker takes control of your phone number — and with it, every account that relies on SMS ভেরিফিকেশন. Within minutes, they can drain your bank account, empty your e-wallets, and lock you out of your digital life.
Indonesia's heavy reliance on SMS-based OTP (One-Time Password) for banking, e-wallets, and government services makes its citizens particularly vulnerable. এখানে রয়েছে exactly how this attack works and কীভাবে defend against it.
How a SIM Swap Attack Works
The Attack Chain
Step 1: Information Gathering
↓
Step 2: SIM Card Replacement
↓
Step 3: OTP Interception
↓
Step 4: Account Takeover
↓
Step 5: Fund Drainage
ধাপ ১: Information Gathering
Before the attack, the scammer collects your personal data:
| Information Needed | How They Get It |
|---|---|
| Full name | Social media, ডেটা লিকes |
| NIK (KTP number) | Data breaches (BPJS, Dukcapil leaks) |
| Phone number | Social media, business cards, ডেটা লিকes |
| Mother's maiden name | Social engineering, social media stalking |
| Date of birth | Social media, ডেটা লিকes |
| Address | Data breaches, social media |
| Recent transaction history | Social engineering via fake bank calls |
Indonesia's extensive ডেটা লিকes (covered in our NIK/KTP data leak guide) mean much of this information is readily available on dark web marketplaces.
ধাপ ২: SIM Card Replacement
With আপনার ব্যক্তিগত তথ্য in hand, the attacker approaches a mobile carrier — Telkomsel, Indosat Ooredoo Hutchison, XL Axiata, or Smartfren — and requests a SIM card replacement. They may:
- Visit a physical outlet using a fake KTP matching your identity
- Call customer service and pass identity ভেরিফিকেশন questions using your leaked data
- Bribe a carrier employee — insider threats are a documented attack vector
- Use a fraudulent power of attorney claiming to act on your behalf
ধাপ ৩: OTP Interception
Once the new SIM card is activated, your phone immediately loses signal. The attacker's SIM now receives all your SMS messages, including:
- Banking OTPs
- E-wallet ভেরিফিকেশন কোডs
- Email password reset codes
- WhatsApp ভেরিফিকেশন কোডs
- Government service OTPs
ধাপ ৪: Account Takeover
The attacker rapidly works through your accounts:
- Resets your mobile banking password using SMS OTP
- Logs into your GoPay, OVO, and DANA accounts
- Takes over your email by resetting the password via SMS
- Accesses any other account linked to your phone number
ধাপ ৫: Fund Drainage
| Target | Method | Speed |
|---|---|---|
| Bank account | Transfer to mule accounts | Minutes |
| GoPay | Transfer or purchase | Minutes |
| OVO | Transfer to bank or purchase | Minutes |
| DANA | Transfer to linked account | Minutes |
| Tokopedia balance | Purchase and resell items | Hours |
| Crypto exchange | Withdraw to external wallet | Minutes |
The entire process — from SIM activation to emptied accounts — can take less than 30 minutes.
সতর্কতামূলক লক্ষণ of a SIM Swap in Progress
Recognizing the attack early is critical. Watch for these signs:
| Warning Sign | What It Means | Action Required |
|---|---|---|
| Sudden loss of mobile signal | Your SIM has been deactivated | Contact carrier immediately from another phone |
| "No service" or "Emergency calls only" | New SIM activated on your number | Rush to carrier outlet with your KTP |
| Unexpected SMS about SIM changes | Carrier may send notification before swap | Call carrier hotline immediately |
| Unable to make calls or send SMS | Your SIM is no longer active | This is an emergency — act within minutes |
| Banking notifications for transactions you did not make | Attacker is already draining accounts | Call bank to freeze accounts |
The moment your phone loses signal unexpectedly and does not recover within 2-3 minutes, treat it as a potential SIM swap attack. Do not wait.
কীভাবে সুরক্ষিত রাখবেন Yourself
Carrier-Level সুরক্ষা
| Action | Telkomsel | Indosat | XL Axiata |
|---|---|---|---|
| Register biometrics for SIM changes | Visit GraPARI | Visit Gerai Indosat | Visit XL Center |
| Set a SIM lock PIN | Contact 188 | Contact 185 | Contact 817 |
| Request notification for SIM changes | In-app or call center | In-app or call center | In-app or call center |
| Verify your registered data is current | MyTelkomsel app | myIM3 app | myXL app |
Banking and Financial সুরক্ষা
- Enable app-based অথেন্টিকেশন instead of SMS OTP wherever possible
- Set transaction limits — Limit daily transfer amounts to minimize potential losses
- Enable push notifications for all transactions, not just SMS
- Use different contact numbers — Consider using a separate number for banking and financial services
- Enable biometric login for banking and e-wallet apps
- Register for call-back ভেরিফিকেশন — Some banks offer phone ভেরিফিকেশন before large transfers
Digital Hygiene
- Minimize personal data exposure online — Avoid posting your phone number, birthday, and mother's name publicly
- Use app-based 2FA (Google Authenticator, Authy) instead of SMS wherever supported
- Monitor your phone signal — Be aware of unexpected signal loss
- Secure your email with app-based 2FA since email is the recovery channel for most accounts
- Regularly check accounts linked to your phone number
কী করবেন If You Are a SIM Swap Victim
First 5 Minutes
- Use another phone to call your carrier — Request immediate SIM deactivation
- Go to the nearest carrier outlet with your original KTP
- Call your bank — Request a full account freeze
First Hour
- Change passwords on all critical accounts using a device you trust
- Revoke active sessions on email, banking, and social media
- Freeze e-wallet accounts — Contact GoPay (via Gojek app), OVO (1500696), DANA (via app)
- Inform close contacts that your number may be compromised
First 24 Hours
- File a police report at your local Polsek with evidence of unauthorized transactions
- Report to Bank Indonesia — Contact 131 or visit bi.go.id
- Report to OJK — Call 157 for financial service complaints
- Document all losses with screenshots and transaction records
- Contact your bank's fraud department to initiate the dispute process
Sharing Account Recovery Information সুরক্ষিতভাবে
After a SIM swap attack, you often need to coordinate with family members — sharing temporary passwords, bank reference numbers, or police report details. In this high-stress situation, information is frequently shared carelessly through messages that could be intercepted.
LOCK.PUB provides a way to share sensitive recovery details through পাসওয়ার্ড-সুরক্ষিত, expiring links. When coordinating with your bank, a lawyer, or family members about the incident, আপনি পারেন share case numbers, temporary credentials, and financial details without leaving them exposed in chat histories.
The Systemic Problem
SIM swap fraud succeeds in Indonesia because of a combination of factors:
- Massive ডেটা লিকes have made personal ভেরিফিকেশন data widely available
- Over-reliance on SMS OTP for financial অথেন্টিকেশন
- Inconsistent identity ভেরিফিকেশন at carrier outlets
- Limited carrier liability when SIM swaps are fraudulently authorized
Until carriers implement stronger biometric ভেরিফিকেশন for SIM changes and banks move away from SMS-based OTP, the responsibility falls on individuals to add protective layers.
The 5-Minute Security Audit
Do this right now:
- Open your carrier app — Is your registered information current?
- Check your bank app — Is app-based 2FA enabled?
- Review your email — Is it secured with app-based 2FA (not SMS)?
- Set up transaction alerts — Are push notifications enabled for all accounts?
- Use LOCK.PUB — Are you sharing sensitive information সুরক্ষিতভাবে?
A SIM swap attack can wipe out years of savings in minutes. These five steps take less time than making a cup of coffee, and they could save everything in your accounts.
Keywords
You might also like
SIM Swap Scam Targeting Globe, Smart & DITO Customers in the Philippines
Learn how SIM swap attacks target Globe, Smart, and DITO subscribers in the Philippines. Understand the risks, warning signs, and কীভাবে protect your accounts.
SIM Swap Fraud in Turkey: কীভাবে সুরক্ষিত রাখবেন Your Turkcell, Vodafone, and Turk Telekom Account
Learn how SIM swap attacks work in Turkey, how attackers drain bank accounts and e-wallets through stolen phone numbers, and কীভাবে set up carrier-specific সুরক্ষাs.
SIM Swap Fraud Targeting Celcom, Maxis & Digi Customers in Malaysia
Malaysian telco customers are increasingly targeted by SIM swap attacks. Learn how criminals hijack your Celcom, Maxis, or Digi number to access your bank accounts and e-wallets.
Create your password-protected link now
Create password-protected links, secret memos, and encrypted chats for free.
Get Started Free