The phantom scam has already claimed victims across the country.
It begins with a fake call, continues with a link to install an app, and ends when the victim taps their card to their cell phone. From there, criminals can clone the data and use it for remote purchases.
In this report, our director Marcelo Nagy explains why this scam is so difficult to detect, how criminals test vulnerabilities with small charges, and what companies can do to respond once the incident has already occurred.
📖 See the full article with Marcelo Nagy:
