Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 700

Mobile OTP Interception

What is Mobile OTP Interception?

Mobile OTP InterceptionAttacks that capture one-time passwords delivered to a phone, undermining SMS- or app-based two-factor authentication.


OTPs delivered by SMS, voice, or push are intercepted through several channels: SS7 / Diameter signalling abuse that reroutes SMS to attacker-controlled equipment, SIM swapping to clone a victim's number, Android banking trojans that read SMS or screen content via the Accessibility Service, malicious notification listeners on a compromised phone, and OTP-relay services such as Telegram bots used by fraud crews. Defences include moving from SMS OTP to phishing-resistant authentication (FIDO2 security keys, passkeys, or platform authenticators), enforcing number-port locks with the carrier, restricting Accessibility usage on Android, and detecting velocity and device-binding anomalies at the application layer.

Examples

  1. 01

    Researchers documented SS7 attacks redirecting bank OTP SMS to attacker numbers and emptying victim accounts in Germany.

  2. 02

    An Android trojan with Accessibility access reads OTP SMS notifications and forwards them via Telegram in real time.

Frequently asked questions

What is Mobile OTP Interception?

Attacks that capture one-time passwords delivered to a phone, undermining SMS- or app-based two-factor authentication. It belongs to the Mobile Security category of cybersecurity.

What does Mobile OTP Interception mean?

Attacks that capture one-time passwords delivered to a phone, undermining SMS- or app-based two-factor authentication.

How does Mobile OTP Interception work?

OTPs delivered by SMS, voice, or push are intercepted through several channels: SS7 / Diameter signalling abuse that reroutes SMS to attacker-controlled equipment, SIM swapping to clone a victim's number, Android banking trojans that read SMS or screen content via the Accessibility Service, malicious notification listeners on a compromised phone, and OTP-relay services such as Telegram bots used by fraud crews. Defences include moving from SMS OTP to phishing-resistant authentication (FIDO2 security keys, passkeys, or platform authenticators), enforcing number-port locks with the carrier, restricting Accessibility usage on Android, and detecting velocity and device-binding anomalies at the application layer.

How do you defend against Mobile OTP Interception?

Defences for Mobile OTP Interception typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Mobile OTP Interception?

Common alternative names include: OTP interception, 2FA bypass on mobile.

Related terms

See also