Social EngineeringJan Kahmen5 min read

SIM Swapping: Functionality & Protection

SIM swapping is a type of identity-based fraud in which criminals gain access to another person's account by transferring their SIM card to another phone.

What Is SIM Swapping?

SIM swapping is a form of identity-based fraud in which criminals transfer a victim's SIM card to a device they control, thereby taking over the victim's mobile phone number. Once they have control, they can intercept one-time passwords and access codes, gaining entry to the victim's accounts. They may also hijack or steal data associated with other services. The ultimate goal is to break into the victim's online accounts -- whether banking, email, or social media.

How Often Does SIM Swapping Happen?

SIM swapping scams are becoming increasingly common, particularly in countries where identity theft and cybercrime are widespread. However, these attacks occur worldwide. In the U.S. alone, over 1,611 SIM swapping cases were reported between 2018 and 2020, with damages totaling approximately 68 million US dollars. As technology continues to evolve, SIM swapping fraud is expected to keep growing.

How Does SIM Swapping Work?

SIM swapping involves transferring the credentials of a SIM card to a new card. Once the transfer is complete, the original card becomes invalid, and all services provided by the network operator are redirected to the new card. The fraud typically begins with the attacker gathering personal information about the mobile account holder -- either by purchasing stolen data on the black market or through targeted phishing attacks. The fraudster then contacts the phone company where the account is registered and impersonates the legitimate account holder. They claim to have lost their SIM card and request that the number be ported to a new one. In rarer cases, an employee of the mobile carrier may collaborate directly with the attacker, providing the information needed to transfer the number to a SIM card of the attacker's choosing. If the fraud succeeds, the attacker gains full control over the phone number and can intercept calls and text messages.

How to Recognize a SIM Swap Attack

  • Unexpected notifications: If you suddenly receive text messages or calls indicating an unexpected change to your mobile service, a SIM swapping attack may have taken place.
  • Loss of phone service: If you can no longer make calls or access mobile data, contact your carrier immediately to determine whether a SIM swap was performed.
  • Unusual social media activity: If you notice posts on your social media profiles that you did not make, this could indicate a SIM swap attack.
  • Account lockouts and unknown transactions: Warning signs typically appear shortly after the attack. Watch for unexpected account lockouts, unauthorized transactions, and suspicious calls, texts, or emails.

How Do I Protect Myself from SIM Swapping?

  • Practice safe browsing: Be cautious online. Watch out for phishing emails, avoid suspicious links, and never disclose sensitive personal information. No legitimate service provider will ever ask for banking details or social security numbers via email.
  • Secure your mobile account: Many carriers allow you to add extra security to your account through unique passwords, PIN codes, or security questions that must be answered before any changes can be made.
  • Use authenticator apps: For two-factor authentication, use an authenticator app instead of SMS-based codes. These apps are tied to your physical device rather than your phone number, significantly reducing the risk of SIM hijacking.
  • Set up callback verification: If your bank or mobile carrier offers it, configure your account so that only the registered phone number is called to verify changes -- an effective safeguard against SIM swap fraud.

Conclusion

SIM swapping is a serious form of identity theft in which criminals take over a victim's mobile phone number by transferring their SIM card to a device under the attacker's control. This type of fraud is widespread and continues to grow globally. To protect yourself, stay vigilant for suspicious activity, secure your mobile account with additional verification measures, and use authenticator apps rather than SMS-based two-factor authentication whenever possible.

Our Services