World4 min read

Scammers Hacked Her Phone and Stole Thousands - How Did They Get Her Details?

Written by ReDataFebruary 8, 2026
Scammers Hacked Her Phone and Stole Thousands - How Did They Get Her Details?

Sue Shore, a 58-year-old British woman, became the target of a sophisticated fraud operation that began with a seemingly innocent text message and ended with her bank accounts being drained. The victim told the BBC how scammers, after obtaining her personal details, managed to hack her mobile phone and bypass banking security measures, stealing thousands of pounds. This case is not isolated but part of a global alarming trend of cybercrime that exploits massive data breaches and increasingly elaborate social engineering techniques.

The modus operandi began with an SMS pretending to be from her phone provider, reporting supposed suspicious activity on her line and requesting immediate contact. When calling the provided number, Shore was attended by individuals posing as technical support agents, who convinced her to install a remote access application on her device under the pretext of 'fixing a security issue'. What she didn't know was that this application gave criminals complete control over her smartphone, allowing them to intercept two-factor banking verification codes and access confidential information stored on the device.

Subsequent investigation by BBC journalists revealed that Shore's personal data, including her full name, address, phone number, and account details, had been exposed in multiple data breaches occurring in recent years. These security breaches, originating from retail companies, utility services, and online platforms, create a vulnerable information ecosystem that scammers systematically exploit. Cybercriminals use 'doxing' techniques to collect information fragments from different sources and build detailed profiles of their victims, exponentially increasing the effectiveness of their phishing and identity theft attacks.

'I felt violated and completely vulnerable,' Shore told the BBC. 'I thought I was being careful with my information, but these criminals had so much data about me that they easily convinced me they were legitimate. The most terrifying part is that they used real information about my accounts and activities to gain my trust.' Her testimony reflects the growing sophistication of these fraudulent operations, where criminals spend weeks or even months researching their targets before executing the final attack.

The financial impact for Shore amounted to over £15,000, money that represented her savings from several years. However, the emotional and psychological damage has been equally devastating. 'I no longer trust my phone, my emails, not even the calls I receive,' she confessed. 'I live with constant anxiety every time my mobile rings or a notification arrives.' This case has prompted British authorities to issue alerts about the increase in 'SIM swapping' and 'remote access trojan' attacks, where criminals not only steal information but take complete control of their victims' devices.

Cybersecurity experts consulted for this report explain that the proliferation of data breaches has created a flourishing black market where personal information is traded for minimal amounts. 'A complete identity data package, including social security numbers, credit history, and passwords, can be sold for less than $50 on the dark web,' noted digital security analyst Michael Chen. 'Scammers then invest time and resources in perfecting their persuasion techniques, studying psychology manuals and conducting rehearsals before contacting their targets.'

The conclusion of this case is clear: the responsibility for data protection cannot fall exclusively on individuals. While measures like two-step verification and caution regarding suspicious communications are essential, the root of the problem lies in the lack of strict regulation regarding the storage and protection of personal information by companies and institutions. Sue Shore's case serves as an urgent warning about the need for legislative reforms that impose severe penalties for data breaches and establish mandatory security protocols. Meanwhile, thousands of people remain exposed in a digital landscape where their personal data circulates freely among criminals, waiting for the right moment to turn information into financial losses and emotional trauma.

CiberseguridadFraude DigitalProtección de DatosPhishingDelitos FinancierosPrivacidad

Read in other languages