In Peru, there are an average of 4,581 mobile thefts per day, according to Osiptel.

One of the modalities of computer fraud the most used in Peru is the money transfer through a stolen cell phone. This is known as ‘thief transfer’a very common form of money theft when your passwords are saved in financial requests.

“This fraud consists of accessing the financial requests of the victim and use them for different reasons, such as transferring money or impersonating them to apply for loans through their registered contacts on the mobile phone,” he explained. Aldo Madruga, Senior Manager of Fraud and Corporate Integrity at Banco Pichincha.

According to Private Investment Surveillance Agency in Telecommunications (Osiptel), an average of 4,581 mobile phones are stolen daily in the country. When a criminal manages to gain access to bank accounts, he can act in the following ways:

Make transfers to your own account or to third parties.

Impersonate the victim and ask for financial credits.

If they cannot access the accounts, they ask their contacts for money, for example: a loan or emergency help.

1. File the complaint at the police station.

2. Communicate with financial institutions to block your cards and digital users. In the same way, confirm your operations by the movements of your account.

3. Contact your mobile carrier to report what happened and block your chip/mobile device. This step is also very important to do immediately after the flight.

4. Change passwords to your emails and apps from financial institutions or other apps you have had on your mobile device.

5. Notify your family and friends in case the criminal wants to use your contact list to ask for money and try to scam them. In addition to these recommendations, financial institutions and telephone companies have security protocols to alert and warn customers of this type of fraud.

“Banco Pichincha is always concerned with improving the security and digital experience of its customers, it has a monitoring system that monitors that there are no fraudulent situations 24 hours a day and every day of the year. In addition, it has developed methods to verify the identity of users through biometric fingerprint and facial tools,” said Aldo Madruga.

Categorized in: