Owners of 1-Time Passcode Theft Service Plead Guilty

Scope of the OTP Theft Service and Accountability

  • Many argue law enforcement should target not only the service operators but also the buyers of “theft-as-a-service.”
  • Commenters highlight a broader “underground economy” of cybercrime: exploit kits, ransomware-for-hire, DDoS-for-hire, phishing services, captcha solving, and illicit use of residential IPs.
  • Some note that criminal ecosystems themselves have internal markets and parasitism (frauds scamming other frauds).

Real-World OTP Failures and Banking Practices

  • Example from Argentina: Payoneer users allegedly lost funds due to OTP interception tied to a specific mobile carrier; rumors mention insider SMS selling, with no clear restitution.
  • Several banks still rely heavily or exclusively on SMS-based 2FA; some support hardware keys, but others do not.
  • SMS is criticized as weak, but defenders say it’s easier to support for non-technical users and leverages carrier infrastructure.

Auth Methods: SMS, TOTP, WebAuthn

  • SMS: seen as insecure but widely deployed; vulnerable to interception and social engineering.
  • TOTP (authenticator apps): stronger than SMS but still phishable in real time.
  • WebAuthn: praised as phishing-resistant because credentials bind to domains; hardware keys are best, but software implementations trade some security for usability.
  • Usability concerns: device loss, migration, backups, and smartphone assumptions make “stronger” methods hard at scale.

How This Specific Scam Worked and Mitigations

  • Attack pattern: attackers already had login + phone; robocall victims pretending to be fraud prevention, then tricked them into reading or entering the legit bank OTP.
  • Commenters stress that vague OTP messages (“your verification code is…”) lack context; propose including what action, amount, location, and device is being authorized.
  • General theme: users must be trained not to trust any party that initiates contact and asks for codes, especially by phone.

Law Enforcement, Deterrence, and Public Shaming

  • Some are surprised young UK-based operators thought they’d avoid consequences; others point out they ran for years before being caught.
  • Debate over publishing convicted criminals’ photos: seen as disambiguation, warning, and deterrent vs. concerns about harm if convictions are later overturned.
  • Cross-border cybercrime is described as hard and expensive to prosecute; police are more active when offenders are clearly under their jurisdiction.