SIM swap Fraud v Indonésii: How Attackers Drain Your Bank and E-Wallet
Learn how SIM swap scams work v Indonésii through Telkomsel, Indosat, and XL, how attackers intercept OTPs to drain bank accounts, and how to protect yourself.
SIM swap Fraud v Indonésii: How Attackers Drain Your Bank and E-Wallet
SIM swap fraud is one of the most devastating cyberattacks affecting Indonesian mobile users. In a successful SIM swap, the attacker takes control of your phone number — and with it, every account that relies on SMS verification. Within minutes, they can drain your bank account, empty your e-wallets, and lock you out of your digital life.
Indonesia's heavy reliance on SMS-based OTP (One-Time Password) for banking, e-wallets, and government services makes its citizens particularly vulnerable. Here is exactly how this attack works and how to defend against it.
How a SIM swap Attack Works
The Attack Chain
Step 1: Information Gathering
↓
Step 2: SIM Card Replacement
↓
Step 3: OTP Interception
↓
Step 4: Account Takeover
↓
Step 5: Fund Drainage
Step 1: Information Gathering
Before the attack, the scammer collects your personal data:
| Information Needed | How They Get It |
|---|---|
| Full name | Social media, data breaches |
| NIK (KTP number) | Data breaches (BPJS, Dukcapil leaks) |
| Phone number | Social media, business cards, data breaches |
| Mother's maiden name | Social engineering, social media stalking |
| Date of birth | Social media, data breaches |
| Address | Data breaches, social media |
| Recent transaction history | Social engineering via fake bank calls |
Indonesia's extensive data breaches (covered in our NIK/KTP data leak guide) mean much of this information is readily available on dark web marketplaces.
Step 2: SIM Card Replacement
With your personal information in hand, the attacker approaches a mobile carrier — Telkomsel, Indosat Ooredoo Hutchison, XL Axiata, or Smartfren — and requests a SIM card replacement. They may:
- Visit a physical outlet using a fake KTP matching your identity
- Call customer service and pass identity verification questions using your leaked data
- Bribe a carrier employee — insider threats are a documented attack vector
- Use a fraudulent power of attorney claiming to act on your behalf
Step 3: OTP Interception
Once the new SIM card is activated, your phone immediately loses signal. The attacker's SIM now receives all your SMS messages, including:
- Banking OTPs
- E-wallet verification codes
- Email password reset codes
- WhatsApp verification codes
- Government service OTPs
Step 4: Account Takeover
The attacker rapidly works through your accounts:
- Resets your mobile banking password using SMS OTP
- Logs into your GoPay, OVO, and DANA accounts
- Takes over your email by resetting the password via SMS
- Accesses any other account linked to your phone number
Step 5: Fund Drainage
| Target | Method | Speed |
|---|---|---|
| Bank account | Transfer to mule accounts | Minutes |
| GoPay | Transfer or purchase | Minutes |
| OVO | Transfer to bank or purchase | Minutes |
| DANA | Transfer to linked account | Minutes |
| Tokopedia balance | Purchase and resell items | Hours |
| Crypto exchange | Withdraw to external wallet | Minutes |
The entire process — from SIM activation to emptied accounts — can take less than 30 minutes.
Varovné signály of a SIM swap in Progress
Recognizing the attack early is critical. Watch for these signs:
| Warning Sign | What It Means | Action Required |
|---|---|---|
| Sudden loss of mobile signal | Your SIM has been deactivated | Contact carrier immediately from another phone |
| "No service" or "Emergency calls only" | New SIM activated on your number | Rush to carrier outlet with your KTP |
| Unexpected SMS about SIM changes | Carrier may send notification before swap | Call carrier hotline immediately |
| Unable to make calls or send SMS | Your SIM is no longer active | This is an emergency — act within minutes |
| Banking notifications for transactions you did not make | Attacker is already draining accounts | Call bank to freeze accounts |
The moment your phone loses signal unexpectedly and does not recover within 2-3 minutes, treat it as a potential SIM swap attack. Do not wait.
Jak se chránit
Carrier-Level Ochrana
| Action | Telkomsel | Indosat | XL Axiata |
|---|---|---|---|
| Register biometrics for SIM changes | Visit GraPARI | Visit Gerai Indosat | Visit XL Center |
| Set a SIM lock PIN | Contact 188 | Contact 185 | Contact 817 |
| Request notification for SIM changes | In-app or call center | In-app or call center | In-app or call center |
| Verify your registered data is current | MyTelkomsel app | myIM3 app | myXL app |
Banking and Financial Ochrana
- Enable app-based authentication instead of SMS OTP wherever possible
- Set transaction limits — Limit daily transfer amounts to minimize potential losses
- Enable push notifications for all transactions, not just SMS
- Use different contact numbers — Consider using a separate number for banking and financial services
- Enable biometric login for banking and e-wallet apps
- Register for call-back verification — Some banks offer phone verification before large transfers
Digital Hygiene
- Minimize personal data exposure online — Avoid posting your phone number, birthday, and mother's name publicly
- Use app-based 2FA (Google Authenticator, Authy) instead of SMS wherever supported
- Monitor your phone signal — Be aware of unexpected signal loss
- Secure your email with app-based 2FA since email is the recovery channel for most accounts
- Regularly check accounts linked to your phone number
Co dělat If You Are a SIM swap Victim
First 5 Minutes
- Use another phone to call your carrier — Request immediate SIM deactivation
- Go to the nearest carrier outlet with your original KTP
- Call your bank — Request a full account freeze
First Hour
- Change passwords on all critical accounts using a device you trust
- Revoke active sessions on email, banking, and social media
- Freeze e-wallet accounts — Contact GoPay (via Gojek app), OVO (1500696), DANA (via app)
- Inform close contacts that your number may be compromised
First 24 Hours
- File a police report at your local Polsek with evidence of unauthorized transactions
- Report to Bank Indonesia — Contact 131 or visit bi.go.id
- Report to OJK — Call 157 for financial service complaints
- Document all losses with screenshots and transaction records
- Contact your bank's fraud department to initiate the dispute process
Sdílení Account Recovery Information bezpečně
After a SIM swap attack, you often need to coordinate with family members — sharing temporary passwords, bank reference numbers, or police report details. In this high-stress situation, information is frequently shared carelessly through messages that could be intercepted.
LOCK.PUB provides a way to share sensitive recovery details through password-protected, expiring links. When coordinating with your bank, a lawyer, or family members about the incident, you can share case numbers, temporary credentials, and financial details without leaving them exposed in chat histories.
The Systemic Problem
SIM swap fraud succeeds in Indonesia because of a combination of factors:
- Massive data breaches have made personal verification data widely available
- Over-reliance on SMS OTP for financial authentication
- Inconsistent identity verification at carrier outlets
- Limited carrier liability when SIM swaps are fraudulently authorized
Until carriers implement stronger biometric verification for SIM changes and banks move away from SMS-based OTP, the responsibility falls on individuals to add protective layers.
The 5-Minute Security Audit
Do this right now:
- Open your carrier app — Is your registered information current?
- Check your bank app — Is app-based 2FA enabled?
- Review your email — Is it secured with app-based 2FA (not SMS)?
- Set up transaction alerts — Are push notifications enabled for all accounts?
- Use LOCK.PUB — Are you sharing sensitive information securely?
A SIM swap attack can wipe out years of savings in minutes. These five steps take less time than making a cup of coffee, and they could save everything in your accounts.
Keywords
You might also like
SIM swap Scam Targeting Globe, Smart & DITO Customers na Filipínách
Learn how SIM swap attacks target Globe, Smart, and DITO subscribers na Filipínách. Understand the risks, warning signs, and how to protect your accounts.
SIM swap Fraud v Turecku: Jak chránit Your Turkcell, Vodafone, and Turk Telekom Account
Learn how SIM swap attacks work v Turecku, how attackers drain bank accounts and e-wallets through stolen phone numbers, and how to set up carrier-specific protections.
SIM swap Attacks Targeting Kyivstar, Vodafone UA, and lifecell Customers
How SIM swap fraud works na Ukrajině, targeting customers of Kyivstar, Vodafone Ukraine, and lifecell. Learn how criminals hijack your phone number to access banking and Diia accounts.
Create your password-protected link now
Create password-protected links, secret memos, and encrypted chats for free.
Get Started Free