The caller first asks the victim for their Aadhaar number and then tells them this is a verification call from Unique Identification Authority. The caller then asks them to reveal the code sent to their registered phone number from Unique Identification Authority of India to complete the verification process.
The conman starts a very different process at his end. In this process, the conman uses the OTP to change the phone number linked to the victim’s Aadhaar number on the website. Now, after the change the new mobile phone no connected to this adhar is in the possession of the conman.
The conman’s next step is to download a popular United Payment Interface-supported application, which automatically detects Aadhaar number linked to the SIM card of the phone in which the banking application is installed. At the end of this operation, the conman has access to the victim’s bank account and can initiate banking transactions to remove money.