Illustration of a confused person holding a phone and cash with warning symbols around them
SIM swap fraud often begins with stolen personal data that criminals use to convince a mobile carrier to transfer a phone number to a new SIM

SIM swap fraud, also called SIM hijacking or port-out fraud, represents a social engineering cyberattack that targets mobile phone numbers rather than devices. Criminal actors manipulate mobile carriers into transferring a victim’s phone number onto a SIM card controlled by attackers.

Once a transfer succeeds, intercepted calls, SMS messages, and verification codes give attackers a direct path into personal and financial accounts. Account takeovers often occur within minutes.

FBI data shows reported SIM swap fraud losses increased dramatically, rising from $12 million during 2018 through 2020 to $68 million in 2021. Growth of four hundred 67% reflects the rapid expansion of the threat.

Targets have included senior executives, cryptocurrency investors, and everyday mobile users. Scale and speed of attacks continue to increase as mobile numbers remain widely used as identity anchors.

What a SIM Is and Why It Matters

Mobile networks depend on SIM cards to establish trust between subscribers and carriers. Subscriber Identity Module cards contain identifiers that allow carriers to recognize devices and authorize access to cellular services.

SIM cards store IMSI values and authentication keys that validate subscribers during network registration and ongoing communication.

Carriers rely on these credentials to route calls, deliver messages, and authorize data usage across cellular infrastructure.

Mobile phone numbers function as identity anchors across many digital services. SMS verification, password recovery workflows, and mobile payment confirmations all depend on possession of an active SIM.

Control of a SIM effectively transfers control over accounts linked to that number.

Risk increases due to how many systems treat phone numbers as proof of identity. Services commonly assume possession of a number implies legitimacy, creating a single point of failure.

Control over a SIM enables interception of private communications and security codes tied to sensitive accounts.

Access typically includes the ability to receive:

  • One-time passcodes sent by banks and financial platforms
  • Password reset links tied to email and cloud services
  • Account recovery messages used during lockout scenarios

Trend Micro characterizes SIM cards as the core of mobile identity, warning that number-based authentication exposes users to identity takeover without direct system intrusion.

How SIM Swap Fraud Happens

SIM swap fraud relies on human manipulation rather than software exploitation. Attackers focus on identity verification gaps within telecom support processes.

Criminals aim to convince carriers to reassign phone numbers to attacker-controlled SIM cards. Once reassignment occurs, technical barriers disappear almost instantly.

Stylized illustration of a hooded person wearing sunglasses and using a smartphone against a bright yellow background
SIM swap fraud happens when criminals trick a mobile carrier into transferring a victim’s phone number to a new SIM card, allowing them to intercept calls, texts, and security codes

Data Collection

Attack preparation begins with information gathering.

Criminals collect personal data using:

  • Phishing emails
  • Fake login pages
  • Social media scraping
  • Doxing activity
  • Malware infections
  • Dark web data markets

Collected details typically include information carriers request during verification.

Commonly used data points include:

  • Full names and phone numbers
  • Birth dates and mailing addresses
  • Email credentials or partial account access

Stolen information allows attackers to convincingly impersonate victims during carrier interactions.

Carrier Manipulation

Fraudsters contact mobile carrier support channels while posing as legitimate subscribers. Conversations often involve emotional pressure, urgency, or fabricated loss scenarios.

Common narratives involve stolen phones, damaged devices, or travel-related service disruptions.

Requests usually ask for SIM replacement or number transfer to a new device. Insider involvement accelerates fraud.

Documented cases show bribed or compromised carrier employees assisting number transfers tied to organized operations linked to telecom infrastructure providers.

Number Porting

Carriers activate victim phone numbers on SIM cards controlled by attackers. Victims often notice service loss without warning.

Typical indicators appear quickly and include:

  • Sudden loss of cellular signal
  • Inability to place or receive calls
  • SMS delivery failures

Calls and messages route directly to attackers once porting completes.

Account Takeover

Access to SMS messages allows interception of one-time passcodes used during authentication. Password resets and account recovery workflows become trivial.

Banking platforms, cryptocurrency exchanges, email accounts, and cloud services often fall within minutes. Trend Micro notes attackers bypass security systems by redirecting mobile identity rather than breaching infrastructure.

Organized SIM Swap Operations

SIM swap fraud increasingly operates at scale. Organized groups manage SIM farms and SIM banks holding hundreds of active cards.

Automation enables rapid execution across multiple victims while reducing manual effort. Systems rotate SIM usage to avoid detection by carriers and service providers.

Infrastructure supporting these operations often includes SIM boxes that convert international calls into local traffic. Cost reduction and traffic masking help conceal fraudulent activity.

Mass SMS capabilities allow attackers to distribute phishing messages or spam calls and campaigns using hijacked numbers tied to legitimate subscribers.

Why SIM Swapping Is So Dangerous

Illustrated person holding a smartphone while a chained credit card is taken away by another hand
SIM swapping can give criminals access to bank accounts, crypto wallets, and email by bypassing two factor authentication tied to a phone number

SIM swapping causes damage due to how deeply phone numbers integrate into digital security models. Attack impact extends far beyond call interception.

Bypass of SMS-Based Two-Factor Authentication

Direct access to verification messages defeats SMS-based security. Accounts protected only by text messages remain vulnerable despite additional login steps.

Authentication systems assume phone possession equals user legitimacy, allowing attackers to pass security checks without credentials.

Rapid Financial Loss

Financial theft occurs quickly once access is gained. Funds can disappear within minutes due to automated transfers and irreversible transactions.

Commonly targeted assets include:

  • Bank accounts and payment apps
  • Investment platforms
  • Cryptocurrency wallets

Recovery becomes difficult after transfers are complete or blockchain confirmations occur.

Business System Compromise

Corporate exposure rises when employee or executive numbers are hijacked. Internal communications and authentication workflows often rely on mobile verification.

Business Email Compromise scams frequently follow SIM swaps. Trend Micro reports global losses tied to these schemes reaching billions of US dollars annually.

Expansion of Identity Fraud

Hijacked accounts enable impersonation across multiple services. Attackers may apply for credit, contact associates, or extend fraud campaigns to family members and coworkers.

Regulatory and Reputational Exposure

Data protection frameworks such as GDPR and the UK Data Protection Act 2018 require reasonable authentication safeguards. Weak reliance on SMS can trigger compliance concerns.

Publicized incidents damage trust and brand credibility, particularly when customer data or funds are affected.

Real-World Impact and Statistics

Abstract data visualization showing a world map with rising digital bars and network connections
SIM swap fraud has caused billions in financial losses worldwide, with attacks increasing as more services rely on phone based authentication

Accounts tied to mobile numbers remain high-value targets for fraud because the numbers serve many verification workflows across financial, social, and communication services.

SIM swap fraud now generates significant financial losses and disrupts personal and enterprise systems. Widespread reporting shows growth in incidents and losses.

In 2023, the FBI’s Internet Crime Complaint Center received 1,075 complaints related to SIM swap fraud, with reported losses approaching $48 million in the United States alone.

Data also shows that SIM-linked account takeovers appear in nearly half of all account takeover cases during 2024, underlining how pervasive mobile number hijackings have become.

Personal financial loss patterns demonstrate the speed and magnitude of damage possible once control shifts away from a victim. Cryptocurrency thefts and bank account hijackings can drain assets in minutes.

A Bank of America customer lost $38,000 in one incident after a mobile number transfer allowed attackers to intercept authentication codes and drain funds. Another case led a carrier to pay a $33 million arbitration award tied to a single SIM swap that resulted in cryptocurrency theft.

Reports tracking incident volume illustrate steep increases across regions. UK fraud prevention data shows SIM swap reports rising by more than tenfold in a recent year, meaning nearly 3,000 incidents were logged compared to under 300 previously.

Older adults disproportionately experience losses, with individuals over age 60 representing a growing share of victims.

Support organizations also note elevated help-seeking behavior. Cases involving unauthorized number transfers grew roughly 160% as people sought assistance with account recovery and fraud resolution, further indicating more frequent attacks.

How to Reduce Risk

Effective defense requires reducing reliance on phone numbers as proof of identity while strengthening verification controls.

Illustration of a person jumping over a digital gap with a warning symbol in a cityscape
Using app based authentication and adding a carrier PIN can significantly reduce the risk of SIM swap fraud

Individual Protections

Avoidance of SMS-based authentication reduces exposure. App-based authenticators such as Google Authenticator or Authy provide stronger protection. Hardware tokens like YubiKey add physical security barriers.

Carrier-level safeguards add friction during number transfer attempts. Many providers offer account PINs or port-out locks requiring verification before reassignment.

Limiting publicly available personal data reduces attacker success. Birth dates, addresses, and phone numbers should remain private where possible.

Monitoring services help detect exposure early. Dark web alerts and breach monitoring identify leaked personal data tied to phone numbers.

Security software and identity protection platforms detect suspicious activity linked to SIM hijacking attempts.

Business Protections

Removal of SMS authentication strengthens enterprise security. Identity and Access Management platforms, biometric verification, and FIDO2 security keys provide stronger alternatives.

SIM swap detection tools reduce fraud risk during authentication. Twilio Lookup SIM Swap API checks recent number transfer activity before sending verification codes.

Zero-trust security models limit damage after compromise by continuously validating users and devices rather than trusting prior authentication.

Employee training reduces social engineering success. Clear identity verification procedures lower impersonation risk.

Incident response planning enables rapid containment. Fast access revocation and coordination with telecom providers reduce attack duration and impact.

The Bottom Line

SIM swap fraud reflects weaknesses in identity trust models rather than technical flaws alone. Phone numbers function as high-value credentials despite limited security guarantees.

Attack sophistication continues to grow while reliance on SMS authentication persists. Strong authentication methods, carrier safeguards, and education significantly reduce exposure.

Future security models favor device-bound, biometric, and hardware-based verification systems over text message codes.