IsThisAScam
홈Blog요금제소개HistoryAPIExtension
Upgrade
KO
Sign in
Sign in
IsThisAScam

Independent scam & phishing analysis. Free for individuals. APIs for developers.

Operated by Zeplik, Inc.
제품
  • Home
  • Blog
  • Pricing
  • 소개
  • History
  • Chrome Extension
Resources
  • Developers
  • API 문서
  • Phishing brief
  • Romance scams
  • Tech support
  • Crypto scams
  • Apple scams
  • PayPal scams
법적 고지
  • 개인정보 처리방침
  • 이용약관
  • product@zeplik.com

© 2026 Zeplik, Inc. All rights reserved.

Built for the calm, the cautious, and the careful.

Home/Glossary/SIM Swapping
Glossary · Attack Vector

What Is SIM Swapping?

An attack where a criminal convinces a mobile carrier to transfer a victim's phone number to a SIM card they control, enabling them to intercept calls, text messages, and two-factor authentication codes.

Quick Definition

An attack where a criminal convinces a mobile carrier to transfer a victim's phone number to a SIM card they control, enabling them to intercept calls, text messages, and two-factor authentication codes.

Think you've been targeted?

Paste the suspicious content here for an instant analysis.

No signup · 6 detection layers · Results in seconds · Cmd+Enter

01SIM Swapping explained.

SIM swapping (also called SIM hijacking) exploits the ability to transfer a phone number between SIM cards — a legitimate feature intended for when you get a new phone. Criminals use social engineering to convince carrier employees to perform this transfer without the real owner's authorization.

Once the attacker controls your phone number, they receive all your calls and texts, including two-factor authentication (2FA) codes. This gives them access to your email, bank accounts, cryptocurrency wallets, and any other accounts protected by SMS-based 2FA.

SIM swapping has become the preferred method for targeting cryptocurrency holders, as blockchain transactions are irreversible. High-profile victims have lost millions of dollars worth of crypto within minutes of their SIM being swapped.

02How it works.

01The attacker gathers personal information about the victim (name, phone number, carrier, last 4 of SSN)
02They contact the mobile carrier, impersonating the victim or bribing a carrier employee
03The carrier transfers the victim's phone number to a SIM card controlled by the attacker
04The victim's phone loses signal, while the attacker starts receiving all calls and texts
05The attacker uses intercepted 2FA codes to access and drain the victim's accounts

03Real-world example.

In 2023, a 25-year-old was sentenced to 5 years in federal prison for conducting SIM swaps that stole $20 million in cryptocurrency from victims across the US. He bribed employees at mobile carriers to perform unauthorized SIM transfers.

04How to protect yourself.

01Switch from SMS-based 2FA to authenticator apps (Google Authenticator, Authy) or hardware keys
02Set a PIN or password on your mobile carrier account to prevent unauthorized changes
03Be cautious about personal information shared online that could be used in social engineering
04If your phone suddenly loses signal, contact your carrier immediately — you may be under attack
05Consider a carrier that offers additional SIM swap protection features
Related Terms
Social EngineeringIdentity TheftTwo-Factor Authentication (2FA)Cryptocurrency Scam
Explore Scam Types
phishingromancecryptoinvestmenttech supportdelivery
Suspect Something?

Run a scan on the message you received.

Run a scan →