Incident Response & Recovery

USSD Call Forwarding Fraud: What Enterprises Must Do

How USSD call forwarding fraud works, how attackers hijack OTPs, and how enterprises can prevent telecom-based cyber attacks in 2026.

USSD call forwarding fraud attack showing how attackers intercept OTPs and hijack accounts using telecom manipulation in 2026

USSD Call Forwarding Fraud: The New Face of Cybercrime

Cyber fraud is evolving and it’s no longer just about malicious links or hacked systems. USSD call forwarding fraud is the latest threat, where attackers manipulate individuals into redirecting their own calls unknowingly handing over access to sensitive information like OTPs and verification calls.

This isn’t hacking in the traditional sense. It’s psychological manipulation at its sharpest.

What Is USSD Call Forwarding Fraud?

USSD (Unstructured Supplementary Service Data) is a GSM communication protocol used by mobile networks. Codes like *21#, *61#, or *67# allow users to access telecom services instantly without internet access.

In USSD call forwarding fraud, scammers trick victims into dialing a code such as:

*21*<fraudster's number>#

This activates call forwarding, redirecting all incoming calls including OTPs and banking verification calls to the attacker.

A Real-Life Example: How One Simple Action Led to Fraud

A recent case highlights how easily this scam unfolds.

A user received a call from someone posing as a courier executive. The caller claimed a delivery issue and asked her to dial a number to resolve it. Trusting the request, she followed the instructions.

Shortly after:

  • Her contacts began receiving messages asking for urgent money

  • She lost control over her communication channels

  • The scammer became unreachable and untraceable

What happened? She had unknowingly activated USSD call forwarding fraud.

How the Scam Works (Step-by-Step)

1. The Hook

Fraudsters initiate contact through:

  • Fake courier notifications

  • KYC verification alerts

  • Job offers or account updates

2. The Trigger

They create urgency:

  • “Your account will be blocked”

  • “Delivery will be cancelled”

  • “Immediate action required”

3. The Action

Victims are asked to dial a USSD code.

4. The Exploit

Call forwarding gets activated.

5. The Outcome

Scammers receive:

  • OTP calls

  • Bank verification calls

  • Authentication requests

They bypass security layers and gain control.

Why USSD Call Forwarding Fraud Is So Effective

  • No malware required

  • Works on all phones (even non-smartphones)

  • Leaves minimal trace

  • Exploits human psychology, not technology

In most cases, the weakest link isn’t the system, it’s human behavior.

Common Social Engineering Tactics Used

Fraudsters design messages to trigger emotional responses:

  • Urgency → “Act now or lose access”

  • Fear → “Your account is at risk”

  • Curiosity → “You’ve won a reward”

  • Trust → “I’m calling from your bank/courier service”

These triggers push victims into acting quickly without verification.

Warning Signs You Should Never Ignore

  • Requests to dial codes starting with * or #

  • Messages from unknown numbers with urgent instructions

  • Calls claiming immediate consequences

  • Instructions that bypass official apps or websites

If something feels rushed, it’s likely a scam.

How to Prevent USSD Call Forwarding Fraud

Follow These Simple Steps:

  • Never dial unknown USSD codes

  • Verify requests via official channels only

  • Avoid acting under pressure

  • Use official apps for courier or banking services

  • Educate employees and teams about social engineering risks

What to Do If You’ve Been Targeted

Act immediately to minimize damage:

Disable Call Forwarding

  • Dial ##002# (universal reset)

  • Or use ##21# to deactivate call forwarding

Check Status

  • Dial *#21# to verify if forwarding is active

Report the Incident

Prompt action can prevent further loss.

Quick Answer (Featured Snippet Ready)

What is USSD call forwarding fraud?
USSD call forwarding fraud is a scam where attackers trick users into dialing USSD codes (like *21#) that redirect incoming calls, including OTPs, to the fraudster’s number, enabling unauthorized access to accounts.

Why Awareness Is Your Strongest Defense

Cybercrime today is less about breaking systems and more about influencing people.

Even law enforcement agencies emphasize this. Public awareness campaigns, like those promoting the message “Stop, Think, Act”, highlight a simple truth:

The best defense is a moment of pause.

How Enterprises and IT Leaders Should Respond

For organizations, this threat goes beyond individual users.

Key Actions:

  • Conduct cybersecurity awareness training

  • Implement multi-layered authentication (beyond OTPs)

  • Monitor unusual login patterns

  • Establish incident response protocols

Human-centric attacks require human-centric defense strategies.

Final Thoughts

USSD call forwarding fraud is a reminder that not all cyber threats come from complex code, some come from simple instructions.

A single dial can compromise your security.

Stay cautious. Verify every request. And never let urgency override judgment.

Need Expert Guidance?

Cyber threats are evolving fast but so are defense strategies.

Get in touch with our experts to strengthen your cybersecurity framework and protect your organization from advanced social engineering attacks.

At Whiteknight, we help businesses stay resilient, secure, and one step ahead of cybercriminals.

Stay aware. Stay secure.