UPI — SMS Spoofing

Rushi Mehta
2 min readJul 4, 2022

--

Device binding is an important security feature of UPI application. During UPI registration, there is a random string that the mobile app generates and sends to a number for registration.

Fraudsters have found a way to bypass the same time and again. Recently UPI SMS Spoofing cases are observed. Liability of fraud should be on the App provider; as due to a vulnerability, customer loses money.

Step 1: Create a Phishing Link to Harvest UPI MPIN

Step 2: Fraudster generates a string from his phone and sends to victim asking him to forward

Step 3: Victim unknowingly sends the received device string to UPI registration number. Thus, the device of fraudster gets binded to phone number of victim.

Jio Message
PayTM Message

Now, fraudster has Mobile App + MPIN, thus will be taking out the money.

Investigation Bits:

  1. Email to be written to NPCI regarding liability of Bank’s application as due to their negligence, fraud was conducted.
  2. Get IP details, Device Detail etc from the UPI App which fraudster used.
  3. Follow fraud money trail and freeze the funds/orders.

*******

--

--

Rushi Mehta
Rushi Mehta

Written by Rushi Mehta

Cyber Security & Fintech Risk Enthusiast, Trekker, Meditator and Contributor!

Responses (1)