SIM swap attack
A SIM swap attack (also known as port-out scam, SIM splitting,[1] simjacking, and SIM swapping)[2] is a type of account takeover fraud that generally targets a weakness in two-factor authentication and two-step verification in which the second factor or step is a text message (SMS) or call placed to a mobile telephone.
Method
The fraud exploits a mobile phone service provider's ability to seamlessly port a phone number to a device containing a different subscriber identity module (SIM). This mobile number portability feature is normally used when a phone is lost or stolen, or a customer is switching service to a new phone.
The scam begins with a fraudster gathering personal details about the victim, either by use of phishing emails, by buying them from organised criminals,[3] directly socially engineering the victim,[4] or by retrieval from online data breaches.[5]
Armed with these details, the fraudster contacts the victim's mobile telephone provider. The fraudster uses social engineering techniques to convince the telephone company to port the victim's phone number to the fraudster's SIM. This is done, for example, by impersonating the victim using personal details to appear authentic and claiming that they have lost their phone. In some countries, notably India and Nigeria, the fraudster will have to convince the victim to approve the SIM swap by pressing 1.[6][7][4]
Once they have a victim's personal information, attackers commonly impersonate them while contacting technical support services for their telecommunication provider and attempt to convince the employees to switch the victim's phone number to their SIM card.[8][9] In some cases telephone company employees have been bribed by attackers to directly change SIM numbers.[10][5] Attackers have sought out employees of companies including T-Mobile and Verizon through social media or employee directories in attempts to bribe them, sometimes promising money in cryptocurrency for each phone number they transferred.[11][12]
Once this happens, the victim's phone will lose connection to the network, and the fraudster will receive all the SMS and voice calls. This allows the fraudster to intercept one-time passwords sent via text or telephone calls to the victim's number and thus subvert two-factor authentication methods relying on them. Since so many services allow password resets with only access to a recovery phone number, the scam allows criminals to gain access to almost any account tied to the hijacked number. This may allow them to directly transfer funds from a bank account, extort the rightful owner, or sell accounts on the black market for further identity theft and fraud.
Incidents
A number of high-profile hacks have occurred using SIM swapping, including some on the social media sites Instagram and Twitter. In 2019, former Twitter CEO Jack Dorsey's Twitter account was hacked via this method.[13][14]
In December 2018, digital currency investor Michael Terpin – the founder and chief executive officer of Transform Group – filed a lawsuit against Nicholas Truglia, and in May 2020 filed a second lawsuit against 18-year-old Irvington High School senior in Irvington, New York, Ellis Pinsky, accusing them and 20 co-conspirators of swindling $23.8 million in 2018 through the use of account information stolen from smartphones by SIM swaps. At the time, Truglia was 18 years old and Ellis was 15. Truglia was sentenced to 18 months in prison and ordered to pay back $20 million, and Pinsky was ordered to pay back $22M but, as a minor, avoided prison.[15][16] [17][18]
The Microsoft Digital Defense Report 2024 stated that less than one-third of one percent of identity attacks use SIM swapping (compared to 99 percent for breach replay, password spray, and phishing).[19]
The US FBI received 1,600 complaints about SIM-swapping in 2021, an increase of more than 400 percent from 2018.[20][21] "The FBI says that victims lost $68 million to this SIM-card based scam in 2021, compared to just $12 million in the three-year period between 2018 and 2020."[20] SIM swap complaints to the FBI in 2022 rose 26 percent, to 2,026, then dropped by 47 percent to 1,075 in 2023, and dropped by 9 percent to 982 in 2024. The peak in 2022 represented less than 0.3 percent of all reported Internet crimes, including phishing/spoofing (44 percent), data breach (8 percent), and identity theft (4 percent).[22]
SIM swap reports to the UK National Fraud Database rose over 1,000 percent from 2023 to 2024, but the 2,760 reported cases represented less than one percent of all fraud reports.[23]
Kenya’s Safaricom, which serves about two-thirds of Kenya’s 70 million phones, experienced a 327 percent increase in SIM swapping from 2024 to 2025, a jump from 11 cases to 47.[24]
In South Korea, various alleged incidents of SIM swapping attacks have been documented since the beginning of 2022. The common pattern includes victims facing abrupt disruptions in their mobile services, coupled with a notification suggesting a change. As a result, affected individuals discover that their bank and cryptocurrency accounts have been compromised.[25]
References
- ^ admin (2014-05-09). "Alert – how you can be scammed by a method called SIM Splitting". Action Fraud. Retrieved 2018-08-22.
- ^ "NPR Search : NPR". www.npr.org.
- ^ Tims, Anna (2015-09-26). "'Sim swap' gives fraudsters access-all-areas via your mobile phone". the Guardian. Retrieved 2018-08-22.
- ^ a b "Many Bengalureans lose cash to sim card swap fraud - Times of India". The Times of India. Retrieved 2018-08-22.
- ^ a b Murphy, Margi; Bennett, Drake (August 4, 2023). "Teen Gamers Swiped $24 Million in Crypto, Then Turned on Each Other". Bloomberg Businessweek. Retrieved May 11, 2024.
- ^ "Experts Finger Insiders in Telcos for Rising SIM Swap Fraud – Nigerian CommunicationWeek". nigeriacommunicationsweek.com.ng. 14 July 2018. Retrieved 2018-08-22.
- ^ "You will be requested to press 1 or authenticate this Swap". Gadget Now. Retrieved 2018-08-22.
- ^ Hartmans, Avery (12 April 2023). "A hacker ripped me off for $10,000. The scam turned out to be brilliant — and terrifying". Business Insider. Retrieved 11 May 2024.
- ^ Franceschi-Bicchierai, Lorenzo (9 July 2020). "Verizon Adds Protection Against SIM Swapping Hacks in Mobile App". Vice. Retrieved 11 May 2024.
- ^ Franceschi-Bicchierai, Lorenzo (2019-05-13). "AT&T Contractors and a Verizon Employee Charged With Helping SIM Swapping Criminal Ring". Vice News. Retrieved 2020-01-23.
Among the alleged criminals were also two former AT&T contract employees and one former Verizon employee, who helped the alleged criminals by providing private customer information in exchange for bribes, according to court documents.
- ^ Franceschi-Bicchierai, Lorenzo (3 August 2018). "How Criminals Recruit Telecom Employees to Help Them Hijack SIM Cards". Vice. Retrieved 11 May 2024.
- ^ TRUȚĂ, Filip (17 April 2024). "Scammers Are Tempting Telecom Employees with $300 Bribe Offers for SIM Swapping Help". Bitdefender. Retrieved 11 May 2024.
- ^ Barrett, Brian. "How to Protect Your Phone Against a SIM Swap Attack". Wired – via www.wired.com.
- ^ Brandom, Russell (August 31, 2019). "The frighteningly simple technique that hijacked Jack Dorsey's Twitter account". The Verge.
- ^ Stempel, Jonathan (7 May 2020). "U.S. cryptocurrency investor sues suburban NYC teen for $71.4 million over alleged swindle". Reuters. Retrieved 4 January 2021.
- ^ Nadeau, Barbie Latza (8 May 2020). "15-Year-Old From Suburbs Led 'Evil Computer Geniuses' in $24M Cryptocurrency Heist: Lawsuit". The Daily Beast. Retrieved 18 February 2026.
- ^ Vlad Constantinescu (5 December 2022). "SIM Swapper Involved in $22 Million Crypto Heist Sentenced to 18 Months in Prison". Bitdefender. Retrieved 18 February 2026.
- ^ "'Baby Al Capone' Crypto Hacker Agrees to Pay $22M to His Victim". Levin Law. 19 October 2022. Retrieved 18 February 2026.
- ^ "Microsoft Digital Defense Report 2024" (PDF). Microsoft. Retrieved 18 February 2026.
- ^ a b Winters, Mike (February 19, 2022). "This SIM card scam once fooled Jack Dorsey—here's how to avoid it". CNBC. Retrieved February 19, 2022.
- ^ Otis, Ginger Adams (February 18, 2022). "SIM-Swapping Attacks, Many Aimed at Crypto Accounts, Are on the Rise". The Wall Street Journal. Retrieved February 19, 2022.
- ^ "Annual Reports". FBI Internet Crime Complaint Center (IC3). Federal Bureau of Investigation. Retrieved 18 February 2026.
- ^ "1,055% surge in unauthorised SIM swaps as mobile and telecoms sector hit hard by rising fraud". cifas. Retrieved 18 February 2026.
- ^ "Safaricom SIM swap fraud investigations up 327pc". Capital Business. Capital Digital Media. 9 October 2025. Retrieved 18 February 2026.
- ^ Kim, Myounghoon; Suh, Joon; Kwon, Hunyeong (August 2022). "A Study of the Emerging Trends in SIM Swapping Crime and Effective Countermeasures". 2022 IEEE/ACIS 7th International Conference on Big Data, Cloud Computing, and Data Science (BCD). pp. 240–245. doi:10.1109/BCD54882.2022.9900510. ISBN 978-1-6654-6582-3. S2CID 252625262.