The company that provides your banks phone system has full access to pretty much every piece of information your bank holds on you, including call recordings, phone numbers, addresses, debts, credits, and your phone password. We can trick our own systems into thinking it’s you on the phone.
Avoid calling your bank at all costs, and if they call you say “no thank you I’ll do that online or in branch”, as soon as you pass security the phone system is accessing all your data.
If possible go into branch or do everything on a banking app which has far better security.
You actually want them to do this, it’s terrifying easy to set up a cell tower or call centre and convince banks and people you are customers or banks.
You probably mean TOTP. OTP is a generic term for any one-time-password which includes SMS-based 2FA. The other main standard is HOTP which will use a counter or challenge instead of the time as the input but this is rarely used.
Ah I see, yes app/web OTP is one of the best methods, unless people are calling to report the app/website not working (a workflow I’ve seen many times)
The industry has put hundreds of millions into voice recognition but the sample size required for AI to trick voicerec is really low now.
Not the password to unlock your phone, but the credentials your bank may require to verify your identity over the phone. A security question/answer, a passphrase or a sequence keyed during the call.
This is correct, i should have said “telephone banking password/passcode” but also the security questions are at best hash encrypted (so basically plain text).
I had thousands of hours of call recording and millions of customer details on my work laptop all unencrypted.
The security for enterprise telephony companies is seriously lax, I wouldn’t be surprised if a few unexplained leaks originated from these companies.