Incident Response & Recovery
USSD Call Forwarding Fraud: What Enterprises Must Do
How USSD call forwarding fraud works, how attackers hijack OTPs, and how enterprises can prevent telecom-based cyber attacks in 2026.

USSD Call Forwarding Fraud: The New Face of Cybercrime
Cyber fraud is evolving and it’s no longer just about malicious links or hacked systems. USSD call forwarding fraud is the latest threat, where attackers manipulate individuals into redirecting their own calls unknowingly handing over access to sensitive information like OTPs and verification calls.
This isn’t hacking in the traditional sense. It’s psychological manipulation at its sharpest.
What Is USSD Call Forwarding Fraud?
USSD (Unstructured Supplementary Service Data) is a GSM communication protocol used by mobile networks. Codes like *21#, *61#, or *67# allow users to access telecom services instantly without internet access.
In USSD call forwarding fraud, scammers trick victims into dialing a code such as:
*21*<fraudster's number>#
This activates call forwarding, redirecting all incoming calls including OTPs and banking verification calls to the attacker.
A Real-Life Example: How One Simple Action Led to Fraud
A recent case highlights how easily this scam unfolds.
A user received a call from someone posing as a courier executive. The caller claimed a delivery issue and asked her to dial a number to resolve it. Trusting the request, she followed the instructions.
Shortly after:
Her contacts began receiving messages asking for urgent money
She lost control over her communication channels
The scammer became unreachable and untraceable
What happened? She had unknowingly activated USSD call forwarding fraud.
How the Scam Works (Step-by-Step)
1. The Hook
Fraudsters initiate contact through:
Fake courier notifications
KYC verification alerts
Job offers or account updates
2. The Trigger
They create urgency:
“Your account will be blocked”
“Delivery will be cancelled”
“Immediate action required”
3. The Action
Victims are asked to dial a USSD code.
4. The Exploit
Call forwarding gets activated.
5. The Outcome
Scammers receive:
OTP calls
Bank verification calls
Authentication requests
They bypass security layers and gain control.
Why USSD Call Forwarding Fraud Is So Effective
No malware required
Works on all phones (even non-smartphones)
Leaves minimal trace
Exploits human psychology, not technology
In most cases, the weakest link isn’t the system, it’s human behavior.
Common Social Engineering Tactics Used
Fraudsters design messages to trigger emotional responses:
Urgency → “Act now or lose access”
Fear → “Your account is at risk”
Curiosity → “You’ve won a reward”
Trust → “I’m calling from your bank/courier service”
These triggers push victims into acting quickly without verification.
Warning Signs You Should Never Ignore
Requests to dial codes starting with * or #
Messages from unknown numbers with urgent instructions
Calls claiming immediate consequences
Instructions that bypass official apps or websites
If something feels rushed, it’s likely a scam.
How to Prevent USSD Call Forwarding Fraud
Follow These Simple Steps:
Never dial unknown USSD codes
Verify requests via official channels only
Avoid acting under pressure
Use official apps for courier or banking services
Educate employees and teams about social engineering risks
What to Do If You’ve Been Targeted
Act immediately to minimize damage:
Disable Call Forwarding
Dial ##002# (universal reset)
Or use ##21# to deactivate call forwarding
Check Status
Dial *#21# to verify if forwarding is active
Report the Incident
Call 1930 (Cyber Crime Helpline – India)
Report via: https://cybercrime.gov.in
Inform your bank and telecom provider
Prompt action can prevent further loss.
Quick Answer (Featured Snippet Ready)
What is USSD call forwarding fraud?
USSD call forwarding fraud is a scam where attackers trick users into dialing USSD codes (like *21#) that redirect incoming calls, including OTPs, to the fraudster’s number, enabling unauthorized access to accounts.
Why Awareness Is Your Strongest Defense
Cybercrime today is less about breaking systems and more about influencing people.
Even law enforcement agencies emphasize this. Public awareness campaigns, like those promoting the message “Stop, Think, Act”, highlight a simple truth:
The best defense is a moment of pause.
How Enterprises and IT Leaders Should Respond
For organizations, this threat goes beyond individual users.
Key Actions:
Conduct cybersecurity awareness training
Implement multi-layered authentication (beyond OTPs)
Monitor unusual login patterns
Establish incident response protocols
Human-centric attacks require human-centric defense strategies.
Final Thoughts
USSD call forwarding fraud is a reminder that not all cyber threats come from complex code, some come from simple instructions.
A single dial can compromise your security.
Stay cautious. Verify every request. And never let urgency override judgment.
Need Expert Guidance?
Cyber threats are evolving fast but so are defense strategies.
Get in touch with our experts to strengthen your cybersecurity framework and protect your organization from advanced social engineering attacks.
At Whiteknight, we help businesses stay resilient, secure, and one step ahead of cybercriminals.
Stay aware. Stay secure.


