Proofs
Victims of mobile hacking fraud should gather the following evidence:
- Screenshots of Phishing Messages: Save any SMS or email messages that appear suspicious, particularly those that include links, attachments, or requests for personal information.
- Logs of Unauthorized Transactions: If there are any unexpected transactions or money transfers from your mobile wallet or bank accounts, collect transaction records as evidence.
- Device Activity Logs: If possible, gather logs showing unusual activity on your mobile device, such as apps opening without consent or unauthorized changes to settings.
- Screenshots of Fake Apps: If you unknowingly downloaded a malicious app, take screenshots of it to show how it appeared legitimate and explain how it led to your device being hacked.
- Call Logs and Messages: Save any records of suspicious phone calls, SMS messages, or emails you received during or after the incident.