top of page

PROJECT: UNDERSTANDING THE "PHANTOM HACKER" SCAM

  • isabels39
  • Jul 28
  • 8 min read

PLEASE SHARE THIS PUBLIC DOCUMENT

"Phantom Hacker" scams are a particularly insidious and multi-layered form of social engineering,

often targeting individuals who might be less tech-savvy or more trusting, like the elderly.

These scams are designed to create a sense of panic and urgency,

leading victims to make irrational decisions to "protect" their money.

MODUS OPERANDI:

  • The "Phantom Hacker" scam typically unfolds in several phases, often involving multiple impersonations to build trust and legitimacy.


PHASE 1: INITIAL CONTACT AND TECH SUPPORT IMPERSONATION

  • INITIAL CONTACT:

  • The scam often begins with an unsolicited contact.

  • This could be:

    • A PHONE CALL:

      • The scammer spoofs their caller ID to make it appear as if they are calling from a legitimate technology company (e.g., Microsoft, Apple, Norton, McAfee) or sometimes even your bank's fraud department.

    • A POP-UP MESSAGE:

      • A deceptive pop-up appears on your computer screen (often generated by malicious websites you might have accidentally visited) claiming your computer has a serious virus or has been hacked, and urging you to call a specific "tech support" number.

    • AN EMAIL OR SMS:

      • Similar to phishing, these messages claim a security issue and direct you to call a number or click a link.

  • CREATING A SENSE OF THREAT: 

    • Once contact is made (usually by the victim calling the number provided), the scammer, posing as a tech support agent, claims to have detected a severe security breach on your computer or network.

    • They might say your device is infected with malware, or that "foreign hackers" have gained access to your system.

  • GAINING REMOTE ACCESS: 

    • The scammer pressures the victim to download a specific remote access software (e.g., TeamViewer, AnyDesk) under the guise of "fixing the problem" or "running a diagnostic scan."

    • Once installed, this software gives the scammer complete control over the victim's computer.

  • "DEMONSTRATING" THE THREAT:

    • The scammer then "demonstrates" the fake hack.

    • They might open system files, run fake scans, or manipulate the screen to show supposed malicious activity or warning messages, making the victim believe their system is compromised.

    • They might even ask the victim to log into their online banking to "check for suspicious transactions," effectively getting a glimpse of their accounts and identifying lucrative targets.

  • THE "HANDOVER": 

    • After "confirming" the hack, the fake tech support agent informs the victim that their bank accounts are now at risk due to this breach.

    • They then state that they will connect the victim to their bank's fraud department to secure their funds.


PHASE 2: FINANCIAL INSTITUTION IMPERSONATION 

  • THE "BANK CALL":

    • Almost immediately, the victim receives another call (often from the same scammer, or a different member of the scam syndicate, using call spoofing again) pretending to be from their bank's fraud department.

    • This person acts very convincingly, often using formal language and expressing urgency.

  • FABRICATING A "SAFE ACCOUNT":

    • The fake bank representative reiterates the "hacking" threat and convinces the victim that their money is no longer safe in their current accounts.

    • They then instruct the victim to immediately transfer their funds to a "safe" or "alias" account, which they claim is a temporary secure holding account, often a government-backed or "segregated" account.

  • DIRECTING FUND TRANSFERS:

    • The scammer provides specific instructions for transferring the money.

    • This could involve:

      • Direct EFTs (Electronic Fund Transfers): The victim is guided to log into their online banking (while the scammer is still on the phone or has remote access) and make large transfers to accounts controlled by the criminals.

      • Wire Transfers: For larger sums, they might instruct wire transfers.

      • Cryptocurrency: Increasingly, they might direct victims to purchase cryptocurrency and transfer it to the scammer's wallets, as crypto transactions are harder to trace and reverse.

      • Cash Withdrawals: In some cases, they might even instruct victims to withdraw large sums of cash and deposit them into specific accounts or hand them over to "couriers."

  • SECRECY AND PRESSURE:

    • The scammers often impose strict secrecy, telling the victim not to tell anyone, not even family or bank tellers, about the "real reason" for the transfers, as it's part of a "confidential investigation" or "security protocol."

    • They maintain immense pressure, emphasising the immediate danger of losing all funds if they don't comply.

    • They may keep the victim on the phone for hours or even days.


PHASE 3: GOVERNMENT IMPERSONATION (OPTIONAL, BUT COMMON) 

  • REINFORCING THE LIE:

    • If the victim becomes suspicious, or as a further layer of deception, another scammer might call, posing as a government official (e.g., from SARS, a financial regulatory body, or even "Interpol").

    • This individual's role is to reinforce the legitimacy of the "safe account" and pressure the victim to continue transferring funds or to pay additional "fees" for security or recovery.

  • FAKE DOCUMENTATION:

    • To further convince the victim, they might send official-looking emails or documents with fake letterheads and logos to "prove" their identity and the legitimacy of the situation.

THE AIM OF THESE CRIMINALS:

The overarching aim of "Phantom Hacker" scammers is direct financial theft and identity theft, often leading to the victim losing their entire life savings. Specifically, their aims include:

  • STEALING MONEY DIRECTLY: 

    • This is the primary goal – to get the victim to transfer their funds into accounts controlled by the criminals.

  • GAINING ACCESS TO FINANCIAL ACCOUNTS:

    • By having victims log into their online banking, they gather account numbers, balances, and transaction history, which can be used for further fraudulent activities.

  • OBTAINING SENSITIVE PERSONAL INFORMATION:

    • Through remote access and conversation, they can gather ID numbers, addresses, contact details, and other personal data that can be used for identity theft.

  • INSTALLING MALWARE: 

    • While the remote access software is central, they might also install other malware (e.g., keyloggers to capture future passwords, spyware) to maintain control or steal more data.

  • EXPLOITING TRUST AND FEAR: 

    • They leverage psychological tactics (social engineering) to manipulate victims into complying, playing on their fear of losing money and their trust in authority figures (banks, tech companies, government).

  • CASHING OUT QUICKLY: 

    • Especially with cryptocurrency transfers, the aim is to move the stolen funds quickly through various channels to make them untraceable.

  • TARGETING VULNERABLE INDIVIDUALS:

    • They specifically target individuals who may be less familiar with technology or more susceptible to high-pressure tactics, often older adults, as they are likely to have significant savings.

SECURITY BEST PRACTICES:

Protection against "Phantom Hacker" scams, like other social engineering attacks, relies heavily on awareness, scepticism, and strict adherence to security best practices.

  • UNSOLICITED CONTACT IS A RED FLAG:

    • Never trust unexpected calls, emails, SMSs, or pop-ups claiming there is a problem with your computer, bank account, or other service.

    • Legitimate banks, tech companies, or government agencies will never call you out of the blue and ask you to transfer money to a "safe account" or download remote access software.

  • ALWAYS VERIFY INDEPENDENTLY:

    • If you receive a suspicious call or message, hang up immediately.

    • Do NOT call back the number they gave you.

    • Instead, find the official contact number for your bank or the company they claimed to represent (from their official website, the back of your bank card, or a trusted phone book).

    • Call that verified number and explain the situation.

    • They will confirm if there is a genuine issue or if it was a scam.

  • NEVER GRANT REMOTE ACCESS TO UNKNOWN INDIVIDUALS:

    • Unless you initiated the tech support call with a trusted company and are absolutely certain of their identity, never allow anyone to remotely access your computer or phone.

    • Be aware that remote access software allows someone to see everything on your screen and control your device.

  • NO LEGITIMATE ENTITY ASKS YOU TO MOVE MONEY TO "SAFE ACCOUNTS":

    • This is the ultimate red flag.

    • No bank, government agency, or reputable institution will ever ask you to transfer your money to a "safe account" to protect it from hackers.

    • This is a classic scam tactic.

    • Your money is protected by the bank's security measures.

    • Be highly suspicious of any requests for transfers via wire, cryptocurrency, or cash deposits to unfamiliar accounts.

  • BE WARY OF HIGH-PRESSURE TACTICS:

    • Scammers thrive on urgency and fear.

    • They will try to panic you into acting without thinking.

    • A legitimate professional will not pressure you to make immediate, irreversible financial decisions.

  • PROTECT YOUR PERSONAL INFORMATION:

    • Never share your PINs, passwords, OTPs, or full banking details over the phone, via email, or text, unless you are certain of the recipient's identity and you initiated the secure communication.

    • Limit the personal information you share on social media, as scammers use this to tailor their attacks.

  • KEEP SOFTWARE AND SECURITY UPDATED:

    • Ensure your operating system, web browser, and antivirus software are always up to date.

    • These updates often include critical security patches.

    • Use reputable antivirus and anti-malware software and run regular scans.

  • ENABLE MULTI-FACTOR AUTHENTICATION (MFA/2FA):

    • Enable MFA on all your online accounts (banking, email, social media) wherever it's offered.

    • This adds an extra layer of security, making it much harder for scammers to access your accounts even if they somehow obtain your password.

  • EDUCATE YOURSELF AND OTHERS:

    • Stay informed about the latest scam techniques.

    • Crucially, talk to elderly family members and friends about these scams.

    • They are often targeted due to their trusting nature and potentially less familiarity with modern digital threats.

    • Help them understand the red flags.

  • REPORT SCAMS:

    • If you suspect you have been targeted or have fallen victim, report it immediately to your bank's fraud department.

    • Also, report it to the South African Police Service (SAPS) at your nearest police station or through their cybercrime unit.

    • Organisations like the South African Banking Risk Information Centre (SABRIC) are also valuable resources.

The "Phantom Hacker" scam is effective because it plays on a genuine fear of hacking and exploits trust

in legitimate institutions. By remaining vigilant and always independently verifying unexpected requests,

South Africans will significantly protect themselves from these sophisticated criminal operations. 

Specialised Security Services invites the public to the Mike Bolhuis Daily Projects WhatsApp Channel.

This channel is important in delivering insights into the latest crime trends, awareness, warnings and the exposure of criminals.


How to Join the WhatsApp Channel:

1. Make sure you have the latest version of WhatsApp on your device.

2. Click on the link below to join the Mike Bolhuis Daily Projects WhatsApp Channel:

3. Follow the prompts to join the channel.

4. Make sure you click on "Follow", then click on the "bell"-icon (🔔)

CONTACT MR MIKE BOLHUIS FOR SAFETY AND SECURITY MEASURES, PROTECTION, OR AN INVESTIGATION IF NEEDED.

ALL INFORMATION RECEIVED WILL BE TREATED IN THE STRICTEST CONFIDENTIALITY AND EVERY IDENTITY WILL BE PROTECTED.

Regards,

Mike Bolhuis

Specialist Investigators into

Serious Violent, Serious Economic Crimes & Serious Cybercrimes

PSIRA Reg. 1590364/421949

Mobile: +27 82 447 6116

Fax: 086 585 4924

Follow us on Facebook to view our projects -


EXTREMELY IMPORTANT: All potential clients need to be aware that owing to the nature of our work as specialist investigators there are people who have been caught on the wrong side of the law - who are trying to discredit me - Mike Bolhuis and my organisation Specialised Security Services - to get themselves off the hook. This retaliation happens on social media and creates doubt about our integrity and ability. Doubt created on social media platforms is both unwarranted and untrue. We strongly recommend that you make up your minds concerning me and our organisation only after considering all the factual information - to the exclusion of hearsay and assumptions. Furthermore, you are welcome to address your concerns directly with me should you still be unsatisfied with your conclusions. While the internet provides a lot of valuable information, it is also a platform that distributes a lot of false information. The distribution of false information, fake news, slander and hate speech constitutes a crime that can be prosecuted by law. Your own research discretion and discernment are imperative when choosing what and what not to believe.


STANDARD RULES APPLY: Upon appointment, we require a formal mandate with detailed instructions. Please take note that should you not make use of our services – you may not under any circumstance use my name or the name of my organisation as a means to achieve whatever end.


POPI ACT 4 of 2013 South Africa: Mike Bolhuis' "Specialised Security Services" falls under Section 6 of the act. Read more here: https://mikebh.link/fntdpv

SSS TASK TEAM:
ree

Copyright © 2015- PRESENT | Mike Bolhuis Specialised Security Services | All rights reserved.


Our mailing address is:

Mike Bolhuis Specialised Security Services

PO Box 15075 Lynn East

Pretoria, Gauteng 0039

South Africa

Add us to your address book


THIS PUBLIC DOCUMENT WAS INTENDED TO BE SHARED, PLEASE DO SO.

CONTACT US

Pretoria, 75 Wapad, Leeuwfontein Estate, Roodeplaat, 0186, South Africa

​​

E-mail: mike@mikebolhuis.co.za
Mobile: 082 447  6116
International: +27 82
447 6116
Fax: 086 585 4924

  • Instagram
  • Facebook
  • YouTube
  • TikTok
chat with mike bolhuis on whatsapp

Thanks for submitting!

Copyright © mikebolhuis.co.za

MLB DIENSTE CC Reg: 1995/036819/23

PSIRA Reg: 1590364/421949

Web design by Mike Bolhuis Cybercrime Unit

bottom of page