SIM Swapping: How Criminals Hijack Your Phone Number

Your phone number has become one of the most powerful keys to your digital life. Banks, email providers, and social media platforms all use it to verify your identity. SIM swapping is a form of identity theft that exploits exactly this trust — and it can unravel your online security in minutes.

What Is SIM Swapping?

SIM swapping (also called SIM hijacking or port-out fraud) is an attack where a bad actor convinces your mobile carrier to reassign your phone number to a new SIM card that they own. Once successful, every call and text meant for you — including one-time passwords (OTPs) and login verification codes — goes straight to the attacker.

The terrifying part? Your physical phone still works. You just lose cell service without any obvious warning, often mistaking it for a network outage until it's too late.

How Does a SIM Swap Attack Work?

The attack has two phases: intelligence gathering and social engineering.

  1. Reconnaissance: The attacker first collects personal information about you — your full name, address, account number, or the last four digits of your Social Security number. This data is often sourced from data breaches, phishing emails, or even your own social media profiles.
  1. Impersonation: Armed with enough personal details, the attacker contacts your mobile carrier — by phone, online chat, or even in person at a retail store — pretending to be you. They claim their phone was lost or damaged and request that your number be ported to a new SIM.
  1. Takeover: Once the carrier complies, the attacker receives all your SMS messages and calls. They immediately trigger "forgot password" flows on your email, crypto wallets, banking apps, or any account tied to your number. Within minutes, they can lock you out of everything.

The entire attack can succeed in under an hour, and some carriers have proven disturbingly easy to deceive.

Why This Matters for VPN Users and Privacy-Conscious People

If you use a VPN to protect your privacy, you already understand the value of securing your digital identity. But a VPN cannot protect you from SIM swapping — it operates at a completely different layer.

SIM swapping directly undermines two-factor authentication (2FA) based on SMS. Many people believe SMS-based 2FA makes their accounts bulletproof. In reality, it creates a single point of failure tied to your carrier's customer service practices.

High-profile victims have included cryptocurrency investors who lost millions, journalists whose sources were exposed, and executives whose business accounts were drained. Anyone with a publicly known phone number or significant online assets is a target.

Real-World Example

In 2019, Twitter CEO Jack Dorsey had his own Twitter account hijacked via a SIM swap. Attackers briefly used it to post offensive content — a public and embarrassing demonstration of how even powerful, technically sophisticated people are vulnerable.

Cryptocurrency holders are especially targeted. Because crypto transactions are irreversible, attackers often move directly to exchange accounts secured by SMS 2FA, transferring funds before the victim even realizes what happened.

How to Protect Yourself

  • Switch to app-based 2FA (like Google Authenticator or Authy) instead of SMS wherever possible.
  • Use hardware security keys (like YubiKey) for critical accounts.
  • Set a SIM PIN or carrier passcode — most carriers allow you to add a secondary password required for any account changes.
  • Minimize public exposure of your phone number — don't list it on social media profiles.
  • Use a VoIP number as your public-facing contact and keep your real number private.
  • Ask your carrier about port freeze or SIM lock features that restrict unauthorized porting.

SIM swapping is a reminder that strong technical defenses mean little if human processes can be manipulated. Layering your security — combining strong authentication methods, careful personal data hygiene, and privacy tools like VPNs — gives you the best defense against attacks that try to work around technology entirely.