top of page
griffin jd.jpg

PROJECT: KNOCKS AND SCAMS - EXTORTION AND THEFT COMBINED WITH SIM SWAP FRAUD

PLEASE SHARE THIS PUBLIC DOCUMENT

 

This scam is a variation of extortion and theft combined with elements of SIM SWAP fraud. 

While it might not have one specific name, it could be described as "Ransomware Cell phone Theft"

or "Mall Cell phone Extortion Scam." 


ACTUAL CASE SCENARIO:

Please listen to the following recordings of the conversations

between the victim and the extortionists (with our client's permission).

The conversations are in Afrikaans.

 

MODUS OPERANDI:

  • THEFT:

    • The perpetrators, often operating in groups in shopping malls, target victims and steal their cell phones, frequently using distraction techniques or sleight of hand. 

    • They are organised and may have spotters to identify potential targets.

  • PHONE LOCKDOWN (OR BELIEF OF LOCKDOWN): 

    • The thieves may try to lock the stolen phone or make the victim believe it is locked.

    • This could involve changing the password if the phone is unlocked when stolen or simply letting the victim think they have remotely locked it (even if they have not).

    • The key is that the thieves do not necessarily need access to the data if they are only after money.

  • CONTACT AND EXTORTION: 

    • Thieves know that victims will try to call their stolen phone. 

    • They answer the call and demand a ransom (R1000.00 - R3000.00) via cash send, e-wallet, or other untraceable methods. 

    • They threaten a SIM swap if the ransom is not paid, leveraging the fear of losing control over their number and potentially sensitive data.

  • FALSE PROMISE OF RETURN:

    • Thieves promise to return the phone after payment.

    • This is almost always a lie.

    • Their goal is the money, not the phone itself (which they can sell for parts or use for other illicit activities).

  • SIM SWAP THREAT (OR ACTUAL SIM SWAP): 

    • The threat of a SIM swap is a powerful motivator. 

    • If the thieves can unlock the phone or bypass security, they could attempt a SIM swap to gain complete control of the victim's number. 

    • The threat of this is often enough to get victims to pay. 

    • If they cannot unlock the phone, they still use the threat to create urgency.

  • PAYMENT AND DISAPPEARANCE:

    • Once the victim pays, the thieves disappear, leaving the victim without their phone or their money.

 

PREVENTION STRATEGIES:

  • BE AWARE OF YOUR SURROUNDINGS:

    • Be extra vigilant in shopping malls and other public places. 

    • Avoid displaying expensive cell phones openly. 

    • Be wary of anyone acting suspiciously.

  • SECURE YOUR PHONE:

    • Use strong passwords, PINs, or biometric locks.

    • Enable "Find My Device" (or the equivalent for your phone's operating system) to locate, lock, or wipe your phone remotely. 

    • This makes it more difficult for thieves to profit from the device.

  • BACK UP YOUR DATA REGULARLY.

  • DO NOT ENGAGE WITH EXTORTIONISTS:

    • As difficult as it is, do NOT pay the ransom. 

    • Paying encourages this type of crime and does not guarantee the return of your phone. 

    • Report the theft to the police immediately.

  • REPORT SUSPICIOUS ACTIVITIES:

    • If you see suspicious behaviour in shopping malls, report it to security or mall management.

  • EDUCATE OTHERS:

    • Share this information with family and friends, especially those more vulnerable to this type of scam.

  • CONTACT YOUR BANK/MOBILE PROVIDER:

    • If you are a victim, immediately contact your bank to block any potentially fraudulent transactions.

    • Contact your mobile provider to report the stolen phone and discuss options for securing your number (e.g., temporarily suspending the SIM).

  • SUPPORT LAW ENFORCEMENT:

    • Cooperate fully with the police in their investigation. 

    • Provide details about the theft. It could assist them to identify and apprehend the perpetrators.

 

By understanding how this scam works and taking preventive measures,

the public can help reduce its effectiveness and protect themselves from becoming victims.

 

Specialised Security Services invites the public to the Mike Bolhuis Daily Projects WhatsApp Channel.

This channel is important in delivering insights into the latest crime trends, awareness, warnings and the exposure of criminals.


How to Join the WhatsApp Channel:

1. Make sure you have the latest version of WhatsApp on your device.

2. Click on the link below to join the Mike Bolhuis Daily Projects WhatsApp Channel:

3. Follow the prompts to join the channel.

4. Make sure you click on "Follow", then click on the "bell"-icon (🔔)

 
CONTACT MR MIKE BOLHUIS FOR SAFETY AND SECURITY MEASURES, PROTECTION, OR AN INVESTIGATION IF NEEDED.

ALL INFORMATION RECEIVED WILL BE TREATED IN THE STRICTEST CONFIDENTIALITY AND EVERY IDENTITY WILL BE PROTECTED.
 

Regards,

Mike Bolhuis

Specialist Investigators into

Serious Violent, Serious Economic Crimes & Serious Cybercrimes

PSIRA Reg. 1590364/421949

Mobile: +27 82 447 6116

Fax: 086 585 4924

Follow us on Facebook to view our projects -


EXTREMELY IMPORTANT: All potential clients need to be aware that owing to the nature of our work as specialist investigators there are people who have been caught on the wrong side of the law - who are trying to discredit me - Mike Bolhuis and my organisation Specialised Security Services - to get themselves off the hook. This retaliation happens on social media and creates doubt about our integrity and ability. Doubt created on social media platforms is both unwarranted and untrue. We strongly recommend that you make up your minds concerning me and our organisation only after considering all the factual information - to the exclusion of hearsay and assumptions. Furthermore, you are welcome to address your concerns directly with me should you still be unsatisfied with your conclusions. While the internet provides a lot of valuable information, it is also a platform that distributes a lot of false information. The distribution of false information, fake news, slander and hate speech constitutes a crime that can be prosecuted by law. Your own research discretion and discernment are imperative when choosing what and what not to believe.


STANDARD RULES APPLY: Upon appointment, we require a formal mandate with detailed instructions. Please take note that should you not make use of our services – you may not under any circumstance use my name or the name of my organisation as a means to achieve whatever end.


POPI ACT 4 of 2013 South Africa: Mike Bolhuis' "Specialised Security Services" falls under Section 6 of the act. Read more here: https://mikebh.link/fntdpv

 
SSS TASK TEAM:
 
 

Copyright © 2015- PRESENT | Mike Bolhuis Specialised Security Services | All rights reserved.


Our mailing address is:

Mike Bolhuis Specialised Security Services

PO Box 15075 Lynn East

Pretoria, Gauteng 0039

South Africa

Add us to your address book


THIS PUBLIC DOCUMENT WAS INTENDED TO BE SHARED, PLEASE DO SO.

466 views0 comments

Recent Posts

See All

Comentarios


CONTACT US

Pretoria, 75 Wapad, Leeuwfontein Estate, Roodeplaat, 0186, South Africa

​​

E-mail: mike@mikebolhuis.co.za
Mobile: 082 447  6116
International: +27 82
447 6116
Fax: 086 585 4924

  • Instagram
  • Facebook
  • YouTube
  • TikTok
Mike Bolhuis WhatsApp contact

Thanks for submitting!

Copyright © mikebolhuis.co.za

MLB DIENSTE CC Reg: 1995/036819/23

PSIRA Reg: 1590364/421949

Web design by Mike Bolhuis Cybercrime Unit

bottom of page