Fraud on mobile accounts highlights security gaps as O2 writes off charges
A This is Money reader found multiple SIM-only contracts opened in her name, triggering months of notifications and debt-collection contact before the charges were canceled; the case underscores the importance of strong, unique passwords…

A Washington, Tyne and Wear, woman was stunned earlier this year when O2 alerted her that six new mobile lines and six direct debits had been set up in her name, totaling about £150 a month. The company said someone had fraudulently ordered new SIM cards on the account, and that it would cancel the lines and amend the customer’s credit file. Yet the notifications persisted for months, including messages tied to accounts she did not authorize and even a stray alert suggesting she had received a phone abroad. After a period of trying to resolve the matter directly with O2, she left the carrier, paying a £38.97 exit fee, and joined a different provider. The ongoing communications and debt-collection inquiries nevertheless continued to arrive at a rate that worried her about potential damage to her credit record and finances.
The consumer in question, known as C.C. of Washington, said the situation grew more troubling when one alert appeared with the line “Welcome to Pakistan,” a clue that the fraud might involve roaming charges or misrouted bills tied to the compromised account. O2 later confirmed that four SIM-only contracts had been opened on her name — fewer than the six or ten she feared — with two-year terms and unlimited data, typically priced around £20–£25 per month. The discrepancy between what she believed and what O2 found added to the confusion and stress, especially as the account notifications continued to land on the customer’s own phone.
The case eventually drew the attention of This is Money’s consumer expert Helen Crane, who has a weekly column aimed at shining a light on problems with companies and offering solutions. Crane described the situation as frightening: the victim faced the prospect of a large monthly bill for contracts she did not sign up for, and the fear that the fraud could tarnish her credit file with unexplained hard inquiries and debt records. She noted that while the person claimed to leave O2, the fallout persisted with notifications and pressure from debt collectors, causing months of worry for someone who works long shifts and had difficulty staying on hold during work.
Crane’s investigation found that the fraud likely occurred after the attacker was able to pass security checks on the MyO2 account. The precise method by which the intruder gained access was not disclosed, but the article suggested possibilities such as obtaining the user’s password or access to an email account used to reset credentials. In other cases these breaches involve attackers compromising a different service with weaker security and reusing the same password elsewhere. The takeaway emphasized by Crane and O2’s handling is the need for robust, unique passwords for each important account and, ideally, multi-factor authentication to prevent unauthorized access.
After reviewing the case, O2 said it had investigated and confirmed that fraud occurred, and it wrote off all charges — including the £577.22 that had appeared on the customer’s account at one point — to ensure no debt remained tied to the name. A company spokesperson reiterated that a scammer was able to pass security on the customer’s MyO2 account, and that the carrier had taken steps to protect the customer going forward. The spokesperson also urged customers to use strong, unique passwords for each important account and to stay vigilant against attempts to access personal information.
The resolution underscores a broader concern in Technology & AI discussions: while digital tools and automated security systems help monitor and respond to fraud, determined criminals continue to probe for weaknesses in authentication, data integrity, and cross-channel signals. In this case, the combination of account takeovers and persistent notifications created a web of confusion and fear for the victim, illustrating how even a single breach can ripple through credit history, debt collection, and ongoing service relationships. The experience also highlights the importance of timely, transparent communication from service providers, particularly when security incidents involve direct debits, roaming charges, or multiple line items tied to a single customer identity.
Experts stress that the path forward involves layered security measures, including unique, hard-to-guess passwords for each service, enablement of two-factor authentication where available, and rapid restoration of account control as soon as suspicious activity is detected. Providers are urged to review their security checks and customer verification processes to reduce the possibility that a fraudster can pass simple security questions or bypass password protections. For consumers, the message is clear: if you suspect fraud on your mobile account, raise the alarm promptly, document all communications, and push for rapid verification and removal of any unauthorized charges. When successful, these steps can prevent a temporary disruption from turning into a long-running ordeal and protect both financial records and credit standing in an increasingly interconnected digital ecosystem.