Cyber Threats to South African Banks: Social Engineering, SIM Swap, and Mobile Malware

South African banks are facing a new wave of cyber threats. Criminals are focusing less on “hacking” and more on tricking people, abusing mobile numbers, and targeting smartphones.

Published in:

Executive Summary: Why It Matters

South African banks are facing a new wave of cyber threats. Criminals are focusing less on “hacking” and more on tricking people, abusing mobile numbers, and targeting smartphones. Common tactics include:

  • Social engineering: Manipulating people (customers or staff) to hand over information or approve payments.
  • SIM swap fraud: Hijacking phone numbers to intercept bank security codes.
  • Mobile malware: Infecting Android devices to steal banking information.

The rise of instant payments (like PayShap) means banks and customers have even less time to spot and stop fraud. Banking professionals must understand these evolving risks and know how to respond effectively.

Key Cyber Threats to South African Banks

1. Social Engineering

What is it? Fraudsters use phone calls, emails, SMS, or WhatsApp to impersonate bank representatives. They may ask customers to reveal security codes, confirm payments, or change account details.

Common Scams:

  • Fake calls “from your bank” requesting one-time PINs (OTPs)
  • Messages about “account verification” or “refunds”
  • Urgent requests to update or confirm beneficiaries

How to Defend:

  • Staff should never action requests on inbound calls. Always confirm by calling customers back on official numbers.
  • Use simple, strong scripts: “Your bank will never ask for an OTP” must be repeated and enforced.
  • Escalate suspicious cases: If you sense urgency, secrecy, or pressure, freeze the process and involve the fraud team.
  • Warn customers: On risky payments or changes, display clear on-screen warnings and slow down the payment process.

2. SIM Swap Fraud

What is it? Criminals get control of a customer’s phone number by illegally swapping their SIM or porting the number to another network. This allows them to intercept SMS OTPs and potentially re-register banking apps.

How It Happens:

  • A fraudster tricks the mobile operator or uses fake documents.
  • The victim loses mobile signal; now the criminal has their number.
  • Criminals request sensitive banking actions, using intercepted OTPs.

How to Defend:

  • Check for recent SIM changes: Add extra verification (or temporary blocks) after a SIM swap.
  • Use app-based approvals instead of SMS OTP for important transactions.
  • Partner with mobile networks: Share information about suspicious SIM swaps instantly.
  • Alert customers: Inform them immediately if their number changes or a banking device is re-registered, and provide clear steps on what to do.

3. Mobile Banking Malware

What is it? Malicious apps, mostly targeting Android phones, try to steal banking details by overlaying fake login screens, capturing taps, or intercepting SMS.

How to Spot and Stop It:

  • Block untrusted overlays: Prevent other apps from placing screens over your banking app.
  • Educate users: Remind them to download apps only from official app stores and to avoid suspicious links.
  • Use strong app security: Device checks, tamper protection, and biometric logins make fraud harder.
  • Monitor anomalies: Track unusual device activity, abnormal login patterns, or repeated failed logins.

Practical Defences for Banking Professionals

Frontline Staff (branches, call centres):

  • Always verify requests, especially for sensitive changes.
  • Never accept an OTP or password provided over the phone.
  • Escalate any call or request that feels suspicious or rushed.

Fraud and Security Teams:

  • Replace SMS OTP with in-app approval for high-risk actions.
  • Watch for recent SIM swaps or unusual device changes.
  • Freeze and review high-risk transactions, beneficiaries, or account changes if suspicious.

Technology Teams:

  • Harden mobile apps: anti-tampering, overlay protection, and strong encryption.
  • Integrate device risk signals into fraud monitoring systems.

Compliance & Legal:

  • Know which incidents require reporting to regulators (POPIA, Cybercrimes Act).
  • Ensure all notices to affected customers are clear, timely, and helpful.

Tips for Effective Customer Communication

  • Use plain language — avoid jargon.
  • Provide specific, actionable steps if the customer suspects fraud.
  • Make messages available in major South African languages when possible.

Quick Security Checklist

  • Onboarding: Educate customers about phishing and scams.
  • Account Changes: Add extra checks and notify customers if contact details change.
  • Payments: Warn about new or risky payees. Slow down the process if a risk is spotted.
  • Call Centre: Use scripts to normalise saying “no” to suspicious requests. Require callback verification for any sensitive action.

Reporting & Ethical Considerations

  • Report cyber-fraud to the correct authority (like SABRIC or the Information Regulator) when required.
  • Always prioritise customer safety and privacy — don’t use confusing warnings or hide critical information.
  • Keep clear records of incidents for future audits and investigations.

Key Takeaways

  • Move away from SMS OTP for sensitive actions; use secure in-app approvals tied to the customer’s device.
  • Blend strong technology controls with clear human processes and education.
  • Stay updated with regulatory expectations and report serious incidents quickly.
  • Focus on outcomes: aim to reduce fraud losses and customer harm, not just tick boxes.

Further Learning and Resources

By focusing on these controls and keeping both people and technology in mind, South African banks can better protect their customers and maintain trust in an era of rising digital threats.

Scroll to Top