Hacked.com icon

hacked.com

SIM Swapping

Professional realistic concept image for SIM swapping

SIM swapping is an account takeover technique where an attacker gets your mobile carrier to move your phone number to a SIM they control.

Once they control the number, they can receive calls and texts meant for you, including sign-in codes, password reset links, and fraud alerts.

Why it matters for account recovery

Your phone number is often part of the control plane: it can reset email, banking, and social accounts. If the number is taken, 'reset your password' stops being a defense and becomes an attacker tool.

Common failure modes and misconceptions

  • Assuming SMS-based verification is strong: It helps against some threats, but it is vulnerable when the phone number can be reissued or ported.
  • Missing the early signal: Sudden loss of service, SIM activation notices, or repeated 'no longer active on this device' prompts can be the start of the takeover.
  • Weak carrier account security: If a carrier account has no PIN, reused passwords, or easy-to-guess recovery, it becomes the path to everything else.

Safe best practices

  • Set a carrier account PIN or port-out lock and keep it private.
  • Prefer strong authentication methods that do not depend on a phone number for critical accounts.
  • Treat unexpected loss of service as a security incident. Secure email and identity accounts quickly from a trusted device.
  • Keep backup recovery methods that do not require SMS in case the number is unavailable.

Related terms

Related guides

SIM swapping is rarely a 'phone problem' in isolation. Treat it as a control plane compromise and rebuild trust from the accounts that can reset everything else.