How SIM Swapping Works?
Spying Stage
Phishing Attacks
Attackers use phishing attacks that involve fake email and SMS alerts to trick the users to reveal important details and personal Identification numbers.
Target Your Carrier
Once scammers have your personal information they target your mobile carrier. They use social engineering to persuade the representative to transfer your number to a SIM card they can control. In this process they use your personal details to act like you. To convince the representative they make up stories such as I lost my phone so I need to activate a new SIM card as soon as possible to attend some important business calls. Scammers sound so confident and fluent in their requests the telecom provider often becomes convinced that they easily issue a new SIM as per the requests.
Account Takeover
What do Scammers do After a SIM Swap?
Steal OTPs and 2FA codes
Take over email and social accounts
Drain bank accounts / do payments
Use your identity
Commit fraud on contacts
Sell the number / SIM benefits
Hide tracks
What are the Signs that Signal SIM Swap?
1. Suddenly No Network or Signal
2. Strange Messages or Alerts
3. Bank Notifications Stop Coming
4. Locked Out of Your Accounts
5. Unusual Account Activity
What to do If Your SIM is Swapped?
- Contact your carrier on a different line and tell them it’s a SIM swap fraud. When you report the issue you must demand number reactivation and a fraud ticket.
- Immediately call your bank support representative and tell them about the theft of your number. Ask them to lock or freeze your bank account to prevent the theft of funds.
- Reset your important passwords such as email, social media, internet banking and other key accounts using a device that still has access.
- Contact the cybercrime control authorities in your locality and file a complaint regarding the scam you went through.
How to Prevent SIM Swapping Scams?
Do not Overshare Your Personal Data
Do not Use SMS-Based 2FA
SMS verification codes are convenient but they can be risky as well. If someone gets a duplicate SIM in your number he can receive all the OTPs and verification codes. So it would be safe to avoid using SMS based two-factor authentication services. Instead of this you should use app-based second verification methods to protect your privacy and security.
Do not Ignore Suspicious Signs
- Call your carrier immediately from another phone.
- Check your email for password reset links you didn’t request.
- Lock your bank and email accounts right away.
Empower Your Email Security
- Long, strong, and unique passwords.
- Two-factor authentication services.
- Add safe recovery options that only you control.



