How hackers target customers through digital identities

Scams aren't a result of an individual's naivety but because hackers use sophisticated tactics to deceive. They skilfully manipulate trust, turning seemingly genuine emails into potent tools for exploitation. Discover how even a harmless email can transform a customer into the weakest link in cyber security.

FacebookTwitterLinkedIn
how hackers target customers through digital identities

Article

 SingVerify, Cyber Security

Manipulating someone to spill their passwords is often easier than breaking into a system directly. This tactic, Social engineering, includes various malicious activities facilitated through psychological manipulation where perpetrators deceive users into committing security errors or revealing confidential data.

Fraudsters typically rely on two primary tactics: impersonating trusted entities and instilling a sense of urgency in their communications. For instance, they may send emails purportedly from a colleague requesting sensitive information or place urgent phone calls claiming a credit card transaction has failed. The urgency of these situations often prompts individuals to act impulsively, making it much easier to give away sensitive information.1

Fraudsters' toolbox

Phishing

Fake emails requesting login details by posing as trusted entities like banks

Baiting

Offering free movie downloads that require users to enter their email credentials

Spear phishing

Targeted emails, often mimicking executives, directing specific actions like wire transfers

Scareware

Fake virus alerts urging immediate purchase of antivirus software

Pretexting

Posing as delivery personnel to gain access to restricted areas

Vishing

Deceiving individuals over the phone, often pretending to be tech support

The cost of deception

Protecting customers' digital identities is essential.

The financial consequences are evident, with government officials' impersonation scams leading the charts with average losses of $116,000, closely trailed by investment scams at $60,0002. Moreover, the emotional toll is substantial, as highlighted by a McKinsey survey revealing that 70% of banking customers felt anxiety, stress, or frustration upon being warned about potential fraud3. The figures from the Singapore Police Force further emphasise the severity, showing a consistent rise in losses, with victims losing S$651 million in 20234.

Safeguarding customers' digital identities goes beyond protecting finances. It is also about preserving trust, loyalty, and emotional well-being in an increasingly digital world.

How telcos data can aid in mitigating scams

Telco data is a shield for combating identity scams across the banking, finance, and retail sectors. With the help of telco data, businesses can swiftly detect suspicious activities, authenticate user identities, and prevent fraudulent transactions in real-time. Additionally, telco data helps identify anomalies in user behaviour, such as unusual login locations, unauthorised access attempts, or atypical transaction patterns, enabling immediate intervention to prevent fraudulent activities before they escalate.

Go beyond OTPs with SingVerify

When bad actors attempt login, they can deceive victims into approving authentication through social engineering tactics. This poses a significant risk to consumers as current Multifactor Authentication processes are susceptible to social engineering manipulation.

However, solutions like SingVerify offer a potent defence against such threats, empowering enterprises to effectively combat phishing and malware app scams. SingVerify's suite of solutions authenticates digital identities against telco data, a pioneering move in Singapore. Through various APIs, SingVerify grants on-demand and secure access to telco data, enabling telco networks to authenticate digital identities directly.

SingVerify sets itself apart from traditional methods by augmenting multifactor authentication using telco data. With SingVerify, service providers can validate customers' identities, matching their phone numbers against real-time telco data across various services like banking and social media. This silent authentication in the background significantly reduces opportunities for scammers to exploit two-factor or multifactor authentication processes, ensuring a safer digital environment for all users.

Security and improved user experience: have them both with SingVerify

SingVerify ensures seamless user authentication while safeguarding digital identities. Leveraging real-time telco data, it replaces vulnerable methods like OTPs with silent network authentication, which verifies users in the background without interrupting their experience.

Additionally, SingVerify is designed to align with the GSMA Open Gateway framework, a globally recognised initiative. This framework facilitates universal access, swift deployment, and seamless integration across diverse mobile networks. As a result, a broader spectrum of service providers and businesses can leverage SingVerify’s benefits.

Explore how the suite of SingVerify solutions can protect your business

Number Verify API: traditional MFA processes are vulnerable to social engineering attacks. Leveraging SIM cards and SIM-based data as secure authentication sources, Number Verify API conducts silent network authentication in real time, preventing scammers from hijacking 2FA or MFA processes.

Device Location API: when malicious actors attempt to access an employee's device, they often manipulate the user to approve authentication through social engineering tactics. SingVerify’s Device Location API verifies the device's location by triangulating real-time device location data with cell tower information, bolstering security measures.

Scam Sniffer API: utilising Scam Sniffer’s in-house analytical models, you can compile a blacklist of potential scammers. This list can be integrated with other databases. When a suspicious or high-value transaction occurs, the API can provide insights on whether the end-user has interacted with potential scammers, enabling proactive fraud prevention measures.

How SingVerify is transforming authentication for industry leaders

All-in-one trading platform, Tiger Brokers, and mobile authentication provider, IPification have integrated SingVerify into their security frameworks, enhancing authentication measures and streamlining verification processes.

Felix Huang, Head of Global Solutions at Tiger Brokers, emphasised the importance of such enhancements in ensuring robust client service experiences. Stefan Kostic, CEO of IPification, highlighted the global surge in digital fraud and the necessity for frictionless authentication solutions like SingVerify to safeguard users5.

This partnership signifies a commitment to bolstering security and user experiences for businesses and customers in Singapore.

Choose the right partner for cyber security

Combatting scams is a collective effort from governments, businesses, and citizens. Businesses must prioritise employee training, starting with selecting a reliable tech provider. Partnering with providers that offer ongoing support, seamless integration, and compliance with regulations can help strengthen defences against fraud.

Secure digital identities with Singtel.

References:

1. What is social engineering, IBM

2. Singapore Police Force News Release - MID-YEAR SCAMS AND CYBERCRIME STATISTICS 2023

3. McKinsey, A new approach to fighting fraud while enhancing customer experience. 2022

4. The Diplomat, Is Singapore Doing Enough to Safeguard Itself Against Cybersecurity Attacks and Scams?, 2024

5. Singtel launches authentication solution, SingVerify, to curb rising scams, News Release, 2024

You may also like

The new ESG: Double materialityShare
Mar 2025 | -
sustainability
The new ESG: Double materiality
Double materiality looks at the corporate impact of climate change from two directions - the impact the company has on the environment and vise versa. For example, a carbon-producing company facilitates a heating planet and increasing temperatures affect that company's ability to operate. Both are considered through a financial lens and can be described as an outside in, or inside out view. Let's look at how technology, particularly AI, has a role to play in gathering the data to achieve sustainability in an increasingly compliance-driven corporate landscape.
Industry secrets: How the tech sector achieves sustainabilityShare
Feb 2025 | -
sustainability
How the tech sector achieves sustainability
Tech companies are using their products, assets, ways of working and talent to achieve sustainability, and they’re willing to share their secrets. Let’s look at how companies achieve tech-driven sustainability. 
Trending in 2025 - Digital ThreadsShare
Feb 2025 | -
sustainability
Trending in 2025 - Digital Threads
Digital threads are the evolution of digital twins. They gather, monitor and adjust details in the supply chain beyond just the factory floor. They're a simulation of the entire value chain and can reveal where wastage and stock loss are happening. More accessible than blockchain and more comprehensive than digital twins, they're a key trend for manufacturers in 2025.