SIM Swapping
Also known as: SIM swap, SIM hijacking, port-out scam
A social-engineering attack against a mobile carrier that transfers a victim's phone number to a SIM the attacker controls, intercepting SMS codes and password-reset links.
Last updated:
What is SIM swapping?
SIM swapping is an attack in which a fraudster convinces a mobile carrier's support team to transfer the victim's phone number to a new SIM the attacker controls — either by impersonating the victim in a support call, bribing a retail employee, or phishing carrier staff. Once the swap completes, the victim's phone loses service, and every SMS-based MFA code, password-reset link, and carrier billing notice goes to the attacker instead.
The attack chain
Attackers typically spend days to weeks on reconnaissance before the swap:
- Harvest the victim's name, phone number, date of birth, and last four of SSN from data-breach dumps
- Map which services the victim uses (bank, exchange, primary email) by searching breach data or doing targeted phishing
- Execute the swap when the victim is least likely to notice (overnight, weekend, while travelling)
- Rapidly trigger password resets on email and exchange accounts, drain balances, then pivot to any other account that uses the same recovery email
High-value cryptocurrency accounts are a frequent target because transactions are irreversible and the MFA is frequently still SMS-based.
Defenses
- Port-out protection PIN — set with your carrier; required before any SIM change
- Phishing-resistant MFA — TOTP apps, hardware keys, or passkeys instead of SMS for every high-value account
- No SMS recovery on the primary email — if the email account can be reset via SMS, SIM swapping defeats everything else
- Monitor for unexpected loss of mobile service — lost signal without reason is often the first SIM-swap signal
If an account suddenly shows logins you don't recognize, investigate the source IP with our IP lookup tool.