There is something particularly unsettling about the fact that a single sound — a “yes” said in the impulse to answer a call — can be turned into authorization for a scam in full. We are not talking about advanced technological attacks, invisible spy software, or virus-laden links. In this case, the villain is something even more dangerous: the user’s own voice. While many Brazilians believe that only those who click without thinking or provide sensitive data fall into traps, the truth is that the most critical stage of some phone frauds begins precisely at the response we give without thinking.
The so-called “SIM scam” has become an emblematic example of how social engineering can exploit automatic habits. It is a silent, simple, and extremely effective attack, especially against people who still answer unknown numbers reflexively. The call comes in, the phone vibrates, the person picks up the device, says “hello?” — and, in a few seconds, they have already been led to the “yes” that the criminals need to capture.
The Mechanics Behind the “SIM” Scam
In its most common form, the scam works like this: the criminal calls the victim with a script calculated to elicit an affirmative response. They may ask a vague question, like “can you hear me?”, or try to pose as a known company, claiming to need to confirm data. The moment the victim says “yes,” the call is recorded, and that audio snippet becomes treated as a piece of validation.
-
ZCC 11000 crane lands at the port of Vitória and heads to Ceará in a convoy with 64 trailers: Zoomlion, founded in 1992, builds a monster that lifts over 600 compact cars to 93 m.
-
The biggest drama of being born on Mars is not breathing: Rice biologist says that colonists’ children may cease to be Homo sapiens, shaped by low gravity, radiation, and isolation that divides humanity.
-
With no separate outdoor unit and designed to fit in the window, monoblock air conditioners used in Japan emerge as an alternative for those who cannot install a split system in a rented apartment.
-
China prepares a 78,000-ton pilotable floating island for deep-sea research: it accommodates 240 people for months, withstands category 17 typhoons and 9-meter waves, and uses metamaterials that dissipate nuclear explosions.
But why does this work? The answer is uncomfortable: because many automated services still use voice snippets as a confirmation element for simple processes — especially service activations, data adjustments, or acceptance of phone terms. Scammers then edit the audio, trim the exact part, and fit that “yes” into fraudulent flows to try to simulate consent.
It is clear that serious institutions have already strengthened their protections, but not all sectors have evolved at the same pace. Small businesses, outsourced services, and legacy systems become prime targets. The scam exploits exactly this technological disparity.
Why “OK” and “I Accept” Also Raise the Alarm
Although “yes” is the main fuel of the scam, other expressions are beginning to catch the attention of experts. “OK,” for example, is universal, short, and used casually in any conversation. For criminals, it is easy to capture, easy to isolate, and easy to reuse. In legacy systems, this response can be interpreted as a sign that the user agreed to an instruction, validated an action, or authorized some procedure.
On the other hand, “I accept” carries even more dangerous weight. Unlike “yes,” which can simply mean attention or generic confirmation, “I accept” expresses formal consent. In practice, scammers may try to leverage isolated recordings of this word to build fraudulent narratives of hiring, enrollment, or purchase. In more sophisticated scams, it is used alongside leaked data — CPF, address, phone — to “complete” a convincing scenario of authorization.
This does not mean that anyone who says “OK” or “I accept” on the phone will automatically fall victim to a scam. It does mean, however, that these terms are also in the crosshairs of fraudsters, especially when combined with data capture and the use of vulnerable automated systems.
The Ideal Target: Those Who Answer Without Thinking
The most common profile of scam victims is precisely those who answer any call as a habit. People who respond quickly, who try to be polite, who say “yes?” without reflecting on who is on the line — this audience is first on the list. Calls with initial silence, artificial noise, robotic operators, or fake surveys are strategies to induce short and affirmative responses.
And it is important to highlight: scammers do not need the audio to be long. They do not want you talking, asking for details, or asking questions. They want a few seconds of recording with clarity — and this usually happens even before you understand what the call is about.
How to Avoid Falling for the Scam
The main form of protection is simple but requires discipline: never say “yes” to unknown numbers. Do not confirm data, do not validate information, and do not respond to vague questions. Replace automatic responses with direct questions:
“Who is speaking?”
“What is the reason for the call?”
“Which company?”
Additionally, adopt a golden rule: if it is really important, the institution will offer official channels for follow-up. Hanging up and calling directly to the verified number on the website is always safer.
The scam evolves, but prevention continues to depend on the same basic principle: never give your voice as a tool of authorization to someone you do not know.

-
Uma pessoa reagiu a isso.