Technology4 min read

Scammers hacked her phone and stole thousands - how did they get her details?

Written by ReDataFebruary 9, 2026
Scammers hacked her phone and stole thousands - how did they get her details?

Sue Shore, a 58-year-old British woman, became the target of a sophisticated scam that began with a simple text message and ended with the theft of thousands of pounds from her bank accounts. Her case, reported to the BBC, exposes alarming vulnerabilities in personal digital security and the lucrative market for leaked personal data on the dark web. Shore's story is not an isolated incident but a representative example of a cybercrime epidemic affecting millions worldwide, where scammers use increasingly convincing social engineering techniques combined with personal information obtained from massive data breaches.

The modus operandi began when Shore received a text message that appeared to be from her bank, alerting her to suspicious activity. The message, which included personal details like her full name and the last digits of her card, directed her to call a phone number. Upon calling, she was answered by individuals posing as bank security department employees who, with disturbingly precise knowledge of her life, convinced her that her accounts were in imminent danger. Under this pretext, they manipulated her into downloading a remote access application on her smartphone, effectively granting them total control over her device. Within hours, the criminals emptied her accounts, making transfers totaling thousands of pounds.

A subsequent BBC investigation, in collaboration with cybersecurity experts, revealed the likely origin of the initial information that made the scam so credible. Shore's personal data, including her name, address, phone number, and details associated with financial services, were found in leaked databases available on clandestine internet forums. These leaks typically originate from security breaches at large corporations, e-commerce websites, or even public services. Cybercriminals buy and sell these data packages, known as 'fullz,' which contain enough information to impersonate a victim or launch highly targeted phishing attacks, known as 'spear-phishing.'

"It was terrifying how much they knew about me," Shore told the BBC. "They seemed to know my movements, details I would never share online. They made me feel it was the only way to protect my money, when it was actually the complete opposite." Her testimony underscores the psychological effectiveness of these scams, which exploit fear and urgency to override victims' natural skepticism. Authorities, such as Action Fraud in the UK, report an exponential increase in 'smishing' (SMS phishing) and remote access attack incidents, particularly targeting people over 55, who may be less familiar with modern digital tactics.

The impact of this crime extends beyond immediate financial loss. For Shore, the recovery process has been long and emotionally draining. Although her bank eventually refunded most of the lost money after a prolonged investigation, the violation of her privacy and the feeling of vulnerability persist. "I no longer trust my phone. I check every message ten times. It has completely changed my relationship with technology," she confessed. Her experience resonates with that of countless victims who, after a scam, suffer from anxiety, stress, and a deep distrust of institutions and digital communications.

Security experts warn that the proliferation of data leaks has created a permanent ecosystem of risk. Simon Newman, from the Cyber Resilience Centre for London, explained: "Personal data is the currency of cybercriminals. Once your information is in a leak, it circulates indefinitely on criminal forums. Scammers use it to lend credibility to their attacks, making fraudulent messages appear legitimate." They recommend protective measures such as using unique and complex passwords for each service, enabling two-factor authentication (2FA) on all possible accounts, and extreme caution with any unsolicited message requesting actions or personal information, no matter how genuine it seems.

Sue Shore's story serves as a stark warning in an age of hyperconnectivity. It highlights the shared responsibility between individuals, who must remain vigilant and educated about digital threats, and companies and institutions, which must strengthen the protection of their customers' data and implement stricter security controls. As data leaks remain common and scammers perfect their techniques, the battle against digital fraud will require a combination of advanced technology, robust regulation, and constant public awareness. The case demonstrates that behind every cybercrime statistic is a real person facing the consequences of an information system that remains profoundly vulnerable.

CiberseguridadFraude DigitalProtección de DatosPhishingDark WebIngeniería Social

Read in other languages