Security

SIM Swapping: The Attack That Makes SMS 2FA Dangerous

SIM swapping is one of the most effective attacks against accounts protected with SMS-based 2FA. It requires no hacking skill โ€” just a phone call to your carrier.

What Is a SIM Swap Attack?

An attacker calls your mobile carrier and impersonates you, claiming they've lost their phone or SIM card. Using personal information gathered from social media, data breaches, or phishing, they convince the carrier to transfer your phone number to a new SIM card they control.

Once your number is on their SIM, they can receive all your SMS messages โ€” including every 2FA code sent to that number.

How Attackers Get Your Personal Information

Carriers typically ask verification questions like your billing address, last four digits of your Social Security number, or account PIN. Attackers obtain this through:

  • Data breaches โ€” billions of records including SSNs are available on dark web markets
  • Social media mining โ€” birthdays, addresses, pet names used in security questions
  • Phishing calls pretending to be carrier support
  • Insider threats โ€” corrupt carrier employees

Real Consequences

SIM swapping has been used to steal cryptocurrency worth millions. In documented cases, attackers have drained entire exchange accounts within minutes of completing a SIM swap. By the time the victim notices something is wrong, the funds are gone.

Notable SIM Swapping Cases

SIM swapping has been responsible for some of the largest individual thefts in cybercrime history:

  • Michael Terpin (2018) โ€” Lost $23.8 million in cryptocurrency through a SIM swap attack on AT&T, subsequently suing AT&T for $200 million.
  • Jack Dorsey (2019) โ€” The then-CEO of Twitter had his own account compromised via SIM swapping.
  • Joel Ortiz (2019) โ€” A 20-year-old who stole over $5 million in cryptocurrency through SIM swapping and was sentenced to 10 years in prison.

Technical Deep Dive: How the Attack Works

  1. Target identification โ€” The attacker identifies a victim with valuable accounts and gathers personal information through social media, data breaches, or phishing.
  2. Carrier contact โ€” The attacker calls the victim's mobile carrier, impersonating the victim with social engineering, fake IDs, or bribed employees.
  3. SIM activation โ€” The carrier transfers the phone number to a SIM card controlled by the attacker. The victim's phone immediately loses service.
  4. Account takeover โ€” The attacker uses SMS-based password reset flows to gain access to email, financial accounts, and crypto wallets.
  5. Asset theft โ€” The attacker drains accounts before the victim realizes what happened.

Carrier-Specific Protection Features

  • T-Mobile โ€” "Account Takeover Protection" and "SIM Protection" can be enabled through the T-Mobile app
  • AT&T โ€” "Extra Security" passcode required for account changes
  • Verizon โ€” "Number Lock" prevents unauthorized port-outs

Contact your carrier and ask them to add a PIN or passcode requirement for any SIM changes or port-out requests. This is the single most important step you can take.

How to Protect Yourself from SIM Swapping

1. Switch from SMS 2FA to an Authenticator App

TOTP codes are generated on your device and are not tied to your phone number. SIM swapping has zero effect on authenticator app-based 2FA. This is the single most important step.

2. Set a Port Freeze / SIM Lock with Your Carrier

Most major carriers allow you to place a port freeze or number lock on your account. This requires in-store verification (with ID) to make any SIM-related changes โ€” making remote SIM swapping nearly impossible.

3. Set a Unique Carrier PIN

Use a carrier-specific PIN or passcode (separate from your account password) that must be provided before any account changes. Don't use predictable numbers like your birthday.

4. Use a Google Voice Number for SMS 2FA

If SMS 2FA is required on a service that doesn't support authenticator apps, use a Google Voice number. Google Voice numbers require Google account authentication to access โ€” much harder to hijack than a carrier number.

What to Do If You're SIM Swapped

  1. Call your carrier immediately โ€” report the SIM swap and restore your number
  2. Change passwords on all accounts accessible via your number
  3. Contact your bank and crypto exchanges if financial accounts were exposed
  4. Review and disable SMS 2FA on all accounts, switching to authenticator apps

Related Articles