Skip to content

SIM Swapping. Scammers are taking over our smartphones…and text messages too!

SIM Card Scammers

Did you know that through a dirty trick called SIM swapping, a scammer could take over your phone? Worse yet, with some additional information about you, do major damage to your finances, your identity, and your life?

Here’s more bad news. Your phone stays in your possession during the “heist.” That means you might not realize it right away, and by the time you do and start to wonder what’s going on, it might be too late to stop them.

This isn’t hype or over exaggeration—fact is, it’s a serious type of crime that’s on the rise in U.S.—the FBI and Justice Department are warning citizens to be aware of SIM swapping and start paying attention to their phone numbers.

This SIM-swapipn scam—sometimes also referred to as SIM-splitting or port-out splitting fraud—puts your smartphone number in the hands of criminals. Once that happens the problems begin, especially if they’ve done some pre-work on you beforehand. For instance, if they’ve been following you on social media or bought your email addresses and passwords online (maybe through a data breach), they can drain your accounts or steal your identity. All this happens before you catch on.

What is a SIM Card?

A SIM—and that stands for Subscriber Identity Module—is a small computer chip that turns your iPhone or Droid into a texting and calling device. The chip is portable and transferable—meaning you can take it out and put into a new phone, as long as it takes the same-size chip (which it probably does). And these days, they’re almost all nano chip cards.

The typical phone customer (maybe even you) rarely thinks about their SIM card. You’re simply excited to have a new phone! Of course, you can’t wait to use the exciting new features, including text messaging, making calls, and an internet connection. And when the time comes to get a new phone, you’re SIM card can simply be changed over.

And you’d think that as long as your phone stays in your possession, you’re safe, right?

Wrong. That’s where the SIM card swap swindle comes into play.

Here’s how SIM swapping works.

  • A scammer targets you and your phone number. Why? They want to see if they can access your accounts and steal money and/or your identity.
  • Bad news. The SIM bandit scammer may have already stolen other personal information about you, including your name, address, and bank account numbers. They’ve done their homework and have a profile on you.
  • Going after your cell phone number. If they can get your cellphone number, it gives them more digital ammunition to attack your identity, because your phone number is linked to many of your accounts.
  • The scammer calls your phone provider (Verizon, AT&T, etc.) and, pretending to be you, tells them, “I need to have my phone number switched to a new SIM card in my new phone.” If they’re smooth and lucky enough—and you don’t have a PIN tied to your account (more on that later), they’ll succeed.
  • You give up control of your number…and more. In the worst-case scenario, the scammer has used your number and other personal information to steal your identity for his own gain.

SIM Swapping: Know what to look for.

Based on the reports and stories that have happened to victims of a SIM swap, here are some signs of trouble that could alert you to potential danger. And if you see any of them, contact your cellular provider immediately to prevent fraud:

  1. You can’t make a call or send a text (and you’re not receiving any). If you didn’t know about SIM swapping you might just think your phone is acting up. Now that you do know, you should consider that your phone number has been hijacked. Take action fast!
  2. You may get an email from your cell provider. You may get an email, based on the email address linked to your account, that your SIM card has been activated on a new phone, at your request. (Yup, that would be a clear hint, wouldn’t it?)
  3. You can’t log in to your bank or other accounts. If the scammer also had your email and password, they might have taken over your accounts, using your phone number to get around what’s called two-factor verification.

Be prepared. Stop SIM Swapping!

Don’t let a swindler steal your phone number right from the phone in your hand. To help you out, here are a few preventative steps.

  1. Most cellphone providers require (or allow) customers to set up a personal identification number to access their account to make changes. So, be sure you have a PIN tied to your account. If your provider does its job right, a scammer could not simply call and arrange a SIM swap.
  2. Another way to fight back is to use two-factor verification (2FA), but not in a form that involves your cellphone number. Most banks and credit card companies offer a few 2FA options. It’s worth checking into.
  3. Also, never assume your phone is simply acting up if you stop getting texts or calls. If you think something’s off, get a hold of friend and have them text or call you as a test. If that doesn’t work, get in touch with your provider immediately to find out what’ going on.

Stay up to date on scams like SIM swapping: Follow the Easy Prey podcast.

You can learn how to stay one step ahead of fraudsters and other con artists by listening to the Easy Prey podcast, hosted by Chris Parker. The podcast features fascinating and enlightening interviews with journalists, authors and experts in cybersecurity and other scam-related topics.

You can find the Easy Prey podcast on your favorite media channel or at easyprey.com.

Related Articles

All
  • All
  • Easy Prey Podcast
  • General Topics
  • Home Computing
  • IP Addresses
  • Networking
  • Online Privacy
  • Online Safety

Is Your Cell Safe? Secrets Your Phone Might Be Broadcasting Behind Your Back

Your mobile phone…is it a life-changing invention or the end of all privacy? Our cell phones give…

[Read More]

Smart Light Bulbs: Wave of the Future or Security Threat?

A recent study from Check Point Research revealed hackers can gain access to smart lightbulbs.

[Read More]
social media application icons on smartphone

How to Find Hidden Profiles on Social Networks

Although challenging, finding hidden profiles on social networks is an achievable task. Try these hacks.

[Read More]
I NOTICED YOU DON'T DELETE YOUR BROWSER HISTORY--I TOO LIKE TO LIVE DANGEROUSLY. —AUSITN POWERS

Clear Browsing History On Your Laptop and Phone to Keep Your Internet Searches Private!

You need to know how to clear browsing history on your computers and phones. Still, that's not...

[Read More]
Hacking? Like with an Axe?

Hacking: It Still Goes On, with Computer Attacks and Data Breaches

The teenage nerd next door isn't the hacker to worry about. Now it's foreign governments, ransomware, and...

[Read More]
Doordash Data Breach

DoorDash Data Breach Delivers Customer Information

The DoorDash data breach, during which driver and customer data was stolen, proves how close to home...

[Read More]