Trend Micro</a>.</em></p>\r\n<p>A SIM swap scam, aka SIM swapping, SIM jacking, or SIM hijacking, is when a criminal steals someone&rsquo;s mobile phone number by tricking the victim&rsquo;s cell phone provider into transferring the number to a SIM card that is in the criminal&rsquo;s possession.</p>\r\n<p>After the number has been transferred, the criminal can insert the SIM card into their phone and use it to access the victim&rsquo;s online accounts by bypassing two-step verification.</p>\r\n<h2><strong>How do SIM swap scams work?</strong></h2>\r\n<p>Here is a breakdown of what happens during a SIM swap scam:</p>\r\n<ol>\r\n<li>The criminal contacts your mobile phone carrier and pretends to be you.</li>\r\n<li>Most commonly, the criminal will say that their phone and SIM card (your phone and SIM card) has been lost or destroyed and that your mobile phone number needs to be transferred to the new SIM card that they already have.</li>\r\n<li>After the criminal has convinced the customer service representative that their bogus story is legitimate, your mobile phone number will be transferred to their SIM card.</li>\r\n<li>The criminal inserts the SIM that is now linked to your phone number into their phone and uses it to bypass the SMS-based two-factor authentication of your online accounts. Because two-step verification is used during &ldquo;forgot password&rdquo; and &ldquo;account recovery&rdquo; requests, it means the criminal can take over any online accounts linked to your phone number and reset their passwords with no issue.</li>\r\n</ol>\r\n<h2><strong>SIM swap scam statistics</strong></h2>\r\n<p>According to a recent FBI <a href=https://www.scamadviser.com/"https://www.ic3.gov/Media/Y2022/PSA220208/">public service announcement</a>, SIM swap scams are on the rise &mdash; and causing massive losses to victims. Throughout 2021, the FBI received 1,611 reports of SIM swapping, with losses totaling over $68 million. This is in contrast to the entire two-year period between January 2018 and December 2020, when there were just 320 SIM swapping-related complaints, with victims losing approximately $12 million.</p>\r\n<h2><strong>How to stay protected from SIM swap scams &mdash; the FBI&rsquo;s advice</strong></h2>\r\n<p>The FBI recommends people take the following precautions to stay protected from SIM swapping scams:</p>\r\n<ul>\r\n<li>Never post information about your financial assets (including cryptocurrency) anywhere on the internet.</li>\r\n<li>If you receive a phone call from someone requesting information relating to your mobile phone number or cell phone provider account, do not give it. If you believe the call may be from your cell phone provider, contact its customer service department directly.</li>\r\n<li>Avoid sharing personal information (including your mobile phone number) online.</li>\r\n<li>Use a strong and unique password for every online account.</li>\r\n<li>Watch out for any changes in SMS-based connectivity.</li>\r\n<li>Use strong multi-factor authentication methods like biometrics (fingerprints, iris patterns, for example), standalone authentication apps, and physical security tokens.</li>\r\n<li>Never store passwords, usernames, or other personal information that could be used to log in or hack into your online accounts on mobile device apps.</li>\r\n</ul>\r\n<h2><strong>How criminals get personal data</strong></h2>\r\n<p>Wondering how a criminal would even get their hands on the personal information needed to pull off a SIM swap scam in the first place? It&rsquo;s no secret &mdash; they most often get it from data leaks.</p>\r\n<p>The 2021 T-Mobile and LinkedIn data leaks exposed over 800 million people&rsquo;s data &mdash; including personal information such as their full names, physical addresses, phone numbers, Social Security numbers, and more. Leaked data is commonly posted to underground internet forums and the dark web, where criminals can get their hands on it and use it to commit various crimes, including SIM swap scams.</p>\r\n<h2><strong>Be even more protected with Trend Micro&trade; <a href=https://www.scamadviser.com/"https://api.link.trendmicro.com/events/landing-page?product_id=eccbc&amp;source=blog\%22>ID Security</a></strong></h2>\r\n<p>Trend Micro <a href=https://www.scamadviser.com/"https://api.link.trendmicro.com/events/landing-page?product_id=eccbc&amp;source=blog\%22>ID Security</a> &mdash; available for Android and iOS &mdash; can scan the internet and the dark web 24/7 for your personal information. If your data is leaked, the app notifies you immediately so you can take action to avoid people stealing your identity. If your information is out there, you&rsquo;ll be the first to know!</p>\r\n<p>Here are some of the features offered by Trend Micro <a href=https://www.scamadviser.com/"https://api.link.trendmicro.com/events/landing-page?product_id=eccbc&amp;source=blog\%22>ID Security</a> :</p>\r\n<ul>\r\n<li><strong>Personal Data Protection Score</strong> &mdash; See exactly how safe your online personal data is with your customized Protection Score.</li>\r\n<li><strong>24/7 Comprehensive Personal Data Monitoring</strong> &mdash; ID Security can scan the internet and the dark web for all your personal information including up to 5 email addresses and bank account numbers, 10 credit card numbers, your Social Security number, and lots more.</li>\r\n<li><strong>Social Media Account Protection</strong>&nbsp;&mdash; Strengthen the security of your social media accounts. Be instantly alerted if your&nbsp;Facebook&nbsp;or&nbsp;Twitter&nbsp;account&rsquo;s data is leaked by cybercriminals.</li>\r\n</ul>\r\n<p>To learn more about Trend Micro <a href=https://www.scamadviser.com/"https://api.link.trendmicro.com/events/landing-page?product_id=eccbc&amp;source=blog\%22>ID Security</a> and claim your free 30-day trial, click the button below.</p>\r\n<p>&nbsp;</p>"}},{"_template":"Articles\\Button","_identifier":"block-54686","data":{"text":"Get ID Security","link":"https://api.link.trendmicro.com/events/landing-page?product_id=eccbc&source=blog"}},{"_template":"Articles\\Text","_identifier":"block-54699","data":{"text":"<h2><strong>Think you might be the victim of SIM swapping?</strong></h2>\r\n<p>If so, here&rsquo;s what the FBI says you should do:</p>\r\n<ul>\r\n<li>Get in touch with your cell phone provider for help regaining control of your phone number.</li>\r\n<li>Change the passwords to all your online accounts.</li>\r\n<li>Contact your financial institutions so they can watch out for any suspicious activity with your accounts.</li>\r\n<li>Report any suspicious activity to your <a href=https://www.scamadviser.com/"https://www.fbi.gov/contact-us/field-offices/">local FBI field office</a> or your local law enforcement agency and the <a href=https://www.scamadviser.com/"https://www.ic3.gov/Media/Y2022/PSA220208/">FBI&rsquo;s Internet Crime Complaint Center</a>.</li>\r\n</ul>\r\n<p>As ever, if you&rsquo;ve found this article an interesting and/or helpful read, please do&nbsp;SHARE&nbsp;it with friends and family to help keep the online community secure and protected.</p>"}}],"sidebarBlocks":[{"_template":"Small\\Content\\Cta","_identifier":"block-157084","data":{"title":"Report a Scam!","consumer":null,"description":"Have you fallen for a hoax, bought a fake product? Report the site and warn others!","image":"https://files.scamadviser.com/thumbs/tell-your-story-8910e.png_200x200.png","button":"Report a Scam!","link":"https://www.scamadviser.com/leave-review"}},{"_template":"Small\\Content\\Taxonomy","_identifier":"block-157123","data":{"title":"Scam Categories","taxonomies":[{"id":7,"name":"Scam Alerts (1025)","url":"https://www.scamadviser.com/articles/scam-alerts"},{"id":6,"name":"Scam Trends (372)","url":"https://www.scamadviser.com/articles/scam-trends"},{"id":8,"name":"Global Scam Country Guide (44)","url":"https://www.scamadviser.com/articles/global-scam-country-guide"},{"id":87,"name":"Product Reviews (43)","url":"https://www.scamadviser.com/articles/product-reviews"},{"id":88,"name":"Fact Check (43)","url":"https://www.scamadviser.com/articles/fact-check"},{"id":3,"name":"News about Scamadviser (42)","url":"https://www.scamadviser.com/articles/news-about-scamadviser"},{"id":5,"name":"Reliable Sites (37)","url":"https://www.scamadviser.com/articles/reliable-sites"},{"id":1,"name":"Tips & Support (32)","url":"https://www.scamadviser.com/articles/tips-support"},{"id":2,"name":"Research & Reports (26)","url":"https://www.scamadviser.com/articles/research-reports"},{"id":4,"name":"Advice for Companies (2)","url":"https://www.scamadviser.com/articles/advice-for-companies"}]}},{"_template":"Default\\Content\\Heading","_identifier":"block-59407","data":{"align":"left","text":"Help & Info","size":"large"}},{"_template":"Default\\Content\\Articles","_identifier":"block-157795","data":{"articles":[{"_template":"Home\\Articles","_identifier":"block-157824","data":{"title":"Scam Alerts","link":"https://www.scamadviser.com/articles/scam-alerts","icon":"fa-exclamation-triangle","bgImage":"https://files.scamadviser.com/uploads/img-scam-alert-f348b.svg"}},{"_template":"Home\\Articles","_identifier":"block-157839","data":{"title":"Learn Scams","link":"https://www.scamadviser.com/articles/scam-trends","icon":"fa-tags","bgImage":"https://files.scamadviser.com/uploads/img-learn-scam-737a6.svg"}},{"_template":"Home\\Articles","_identifier":"block-157854","data":{"title":"Reliable Sites","link":"https://www.scamadviser.com/articles/reliable-sites","icon":"fa-check-circle","bgImage":"https://files.scamadviser.com/uploads/img-website-213fb.svg"}},{"_template":"Home\\Articles","_identifier":"block-157869","data":{"title":"Advices","link":"https://www.scamadviser.com/articles/advice-for-companies","icon":"fa-comment","bgImage":"https://files.scamadviser.com/uploads/img-advice-f32d8.svg"}},{"_template":"Home\\Articles","_identifier":"block-157884","data":{"title":"Studies","link":"https://www.scamadviser.com/articles/research-reports","icon":"fa-search","bgImage":"https://files.scamadviser.com/uploads/img-report-ebc61.svg"}},{"_template":"Home\\Articles","_identifier":"block-161131","data":{"title":"Global Scams","link":"https://www.scamadviser.com/global-scam-country-guide","icon":"fa-globe","bgImage":"https://files.scamadviser.com/uploads/img-global-scam-005ad.svg"}}],"buttonText":"See all","buttonLink":"https://www.scamadviser.com/help-info"}},{"_template":"Default\\Content\\Heading","_identifier":"block-167997","data":{"align":"left","text":"Top Safety Picks","size":"large"}},{"_template":"Default\\Content\\Lists","_identifier":"block-167811","data":{"heading":"Your Go-To Tools for Online Safety","hint":"Disclaimer: Some of the links here are affiliate links. If you click them and make a purchase, we may earn a commission at no extra cost to you.","description":null,"listItems":[{"_template":"Default\\Items\\ListItem","_identifier":"block-167891","data":{"title":"ScamAdviser App - iOS","titleUrl":"https://apps.apple.com/us/app/scamadviser/id6480509109","linkTarget":"1","text":"Your personal scam detector, on the go! Check website safety, report scams, and get instant alerts. Available on iOS"}},{"_template":"Default\\Items\\ListItem","_identifier":"block-167944","data":{"title":"ScamAdviser App - Android","titleUrl":"https://play.google.com/store/apps/details?id=com.tech.scamadviser","linkTarget":"1","text":"Your personal scam detector, on the go! Check website safety, report scams, and get instant alerts. Available on Android."}},{"_template":"Default\\Items\\ListItem","_identifier":"block-169734","data":{"title":"NordVPN","titleUrl":"http://www.jdoqocy.com/click-101566658-13382109","linkTarget":"1","text":"NordVPN keeps your connection private and secure whether you are at home, traveling, or streaming from another country. It protects your data, blocks unwanted ads and trackers, and helps you access your paid subscriptions anywhere. Try it Today!"}},{"_template":"Default\\Items\\ListItem","_identifier":"block-171573","data":{"title":"Incogni","titleUrl":"http://www.jdoqocy.com/click-101566658-15718702","linkTarget":"1","text":"Incogni automatically removes your personal data from data brokers that trade in personal information online, helping reduce scam and identity theft risks without the hassle of manual opt-outs. Reclaim your privacy now!"}}]}},{"_template":"Default\\Content\\Heading","_identifier":"block-59517","data":{"align":"left","text":"Popular Stories","size":"large"}},{"_template":"Default\\Content\\Blogs","_identifier":"block-59530","data":{"items":[{"id":1406,"title":"7 Best VPN Services for Security, Speed, and Privacy","url":"https://www.scamadviser.com/articles/7-best-vpn-services-for-security-speed-and-privacy","excerpt":"In a nutshell: A good VPN protects your privacy with strong encryption, a strict no-logs policy, and fast protocols like WireGuard. The best VPNs also offer wide server coverage, leak protection, and easy-to-use apps for all devices. For 2025, the top providers are NordVPN, ExpressVPN, Surfshark, Proton VPN, Private Internet Access, CyberGhost, and Mullvad—each excelling in speed, security, or value.\r\n\r\nIn an age where every click is tracked, a Virtual Private Network (VPN) is no longer just a luxury—it's an essential tool for digital privacy and security. A VPN works by creating a secure, encrypted tunnel between your device and the internet, masking your real IP address and protecting your sensitive data from prying eyes.\r\nBut with hundreds of providers out there, how do you sort the secure from the suspect? This guide breaks down the non-negotiable features of a quality VPN and highlights the 7 top-rated services for 2025.\r\nWhat to Look for in a Good VPN: The 4 Non-Negotiable Pillars\r\n1. Ironclad Security Features\r\n\r\nStrong Encryption: AES-256, the gold standard.\r\nSecure Protocols: OpenVPN, WireGuard, NordLynx, Lightway. Avoid PPTP.\r\nKill Switch: Ensures no accidental IP leaks.\r\nLeak Protection: Covers DNS, IPv6, and WebRTC.\r\n\r\n2. Verified Privacy Practices\r\n\r\nNo-Logs Policy: No activity or metadata tracking.\r\nIndependent Audits: Verification by third parties.\r\nSafe Jurisdiction: Prefer countries outside the 5/9/14 Eyes alliances.\r\n\r\n3. High-Speed Performance\r\n\r\nFast Protocols: WireGuard and equivalents.\r\nLarge Server Network: Less crowding, more reliable speeds.\r\n\r\n4. Essential Usability Features\r\n\r\nMulti-Device Apps: Windows, Mac, iOS, Android, routers.\r\nSimultaneous Connections: One account, many devices.\r\nUnblocking Power: Netflix, Hulu, BBC ","buttonText":"Read more","renderAsInertiaLink":false},{"id":1475,"title":"Data Breach Victim? Your Emergency Action Plan Starts Now","url":"https://www.scamadviser.com/articles/data-breach-victim-your-emergency-action-plan-starts-now","excerpt":"How to Protect Yourself and Your Family After a Data Breach\r\nWhen Your Data Falls Into the Wrong Hands\r\nJust received that terrifying notification? Or perhaps you've noticed suspicious activity in your accounts? Take a deep breath. A data breach, the unauthorized access or exposure of sensitive, protected, or confidential data, is a deeply unsettling event. It can plunge you into a world of worry, bringing risks from financial losses and identity theft to significant emotional distress and reputational damage.\r\nThe numbers don't lie: according to a 2024 report, the number of data breach victim notices has grown by a staggering 211% year-over-year. This isn't just a distant threat; it's a stark reality many individuals face. This year alone, we've seen major organizations like Adidas and Qantas grapple with high-profile data breaches, affecting countless customers. This underscores a critical truth: nobody is untouchable. Subsequently, strategic action is the only way to minimize the risk and protect your future.\r\nThis guide is your emergency action plan, designed to walk you through every crucial step—from confirming the breach to fortifying your digital life for the long term.\r\nPart 1: Confirming the Breach and Understanding the Damage\r\nThe very first step is to answer the question definitively: Was my data compromised, and if so, how badly?\r\nStart with the basics:\r\n\r\nCheck Official NotificationsReputable companies are legally obligated to inform you if your data was part of a breach. Look for official emails, letters, or public announcements.\r\nCheck Verified Breach DatabasesPlatforms like HaveIBeenPwned help you see if","buttonText":"Read more","renderAsInertiaLink":false}]}}],"meta":{"title":"What Is a SIM Swap Scam & How to Stay Protected?","description":"Check if a website is a scam website or a legit website. ScamAdviser helps identify if a webshop is fraudulent or infected with malware, or conducts phishing, fraud, scam and spam activities. Use our free trust and site review checker.","canonical":"https://www.scamadviser.com/articles/what-is-a-sim-swap-scam-how-to-stay-protected","alternates":[{"language":"x-default","url":"https://www.scamadviser.com/articles/what-is-a-sim-swap-scam-how-to-stay-protected"},{"language":"nl","url":"https://www.scamadviser.com/nl/articles/wat-is-sim-swap-scam-en-hoe-blijf-je-beschermd"},{"language":"pt","url":"https://www.scamadviser.com/pt/articles/o-que-e-um-esquema-de-troca-de-sim-e-como-se-manter-protegido"},{"language":"es","url":"https://www.scamadviser.com/es/articles/que-es-una-estafa-sim-swap-y-como-protegerse"},{"language":"de","url":"https://www.scamadviser.com/de/articles/was-ist-ein-sim-swap-betrug-und-wie-kann-man-sich-schuetzen"},{"language":"fr","url":"https://www.scamadviser.com/fr/articles/quest-ce-quune-arnaque-a-lechange-de-cartes-sim-et-comment-se-proteger"},{"language":"it","url":"https://www.scamadviser.com/it/articles/cose-la-truffa-dello-scambio-di-sim-e-come-proteggersi"},{"language":"uk","url":"https://www.scamadviser.com/uk/articles/shcho-take-shakhraystvo-zi-zminoiu-sim-karty-ta-iak-zakhystytysia"},{"language":"ro","url":"https://www.scamadviser.com/ro/articles/ce-este-o-inselatorie-de-tip-sim-swap-si-cum-sa-va-protejati"},{"language":"ru","url":"https://www.scamadviser.com/ru/articles/chto-takoe-moshennichestvo-s-obmenom-sim-kart-i-kak-ot-nego-zaschititsya"},{"language":"zh","url":"https://www.scamadviser.com/zh/articles/shi-yao-shi-simqia-diao-huan-pian-ju"},{"language":"tc","url":"https://www.scamadviser.com/tc/articles"},{"language":"ja","url":"https://www.scamadviser.com/jp/articles/simsuwatsupuzha-qi-toha"}]},"language":"en","head":[],"pendingCookieConsent":false,"isHomePage":false,"navigation":{"items":{"data":[{"id":1082,"name":"Report a Scam","template_name":"report_a_scam","newwindow":false,"url":"https://www.scamadviser.com/report-a-scam"},{"id":1103,"name":"Scam IQ Test","template_name":"redirect","newwindow":true,"url":"https://digital-survival-challenge-beta.vercel.app/"},{"id":1100,"name":"Business","template_name":"redirect","newwindow":true,"url":"https://www.scamadviserbiz.com/"}]},"languages":{"current":"en","available":[{"label":"Deutsch","code":"de","url":"https://www.scamadviser.com/de/articles/was-ist-ein-sim-swap-betrug-und-wie-kann-man-sich-schuetzen"},{"label":"English","code":"en","url":"https://www.scamadviser.com/articles/what-is-a-sim-swap-scam-how-to-stay-protected"},{"label":"Español","code":"es","url":"https://www.scamadviser.com/es/articles/que-es-una-estafa-sim-swap-y-como-protegerse"},{"label":"Français","code":"fr","url":"https://www.scamadviser.com/fr/articles/quest-ce-quune-arnaque-a-lechange-de-cartes-sim-et-comment-se-proteger"},{"label":"Italiano","code":"it","url":"https://www.scamadviser.com/it/articles/cose-la-truffa-dello-scambio-di-sim-e-come-proteggersi"},{"label":"日本","code":"jp","url":"https://www.scamadviser.com/jp/articles/simsuwatsupuzha-qi-toha"},{"label":"Nederlands","code":"nl","url":"https://www.scamadviser.com/nl/articles/wat-is-sim-swap-scam-en-hoe-blijf-je-beschermd"},{"label":"Português","code":"pt","url":"https://www.scamadviser.com/pt/articles/o-que-e-um-esquema-de-troca-de-sim-e-como-se-manter-protegido"},{"label":"Romanian","code":"ro","url":"https://www.scamadviser.com/ro/articles/ce-este-o-inselatorie-de-tip-sim-swap-si-cum-sa-va-protejati"},{"label":"Russian","code":"ru","url":"https://www.scamadviser.com/ru/articles/chto-takoe-moshennichestvo-s-obmenom-sim-kart-i-kak-ot-nego-zaschititsya"},{"label":"繁体中文","code":"tc","url":"https://www.scamadviser.com/tc/articles"},{"label":"Ukrainian","code":"uk","url":"https://www.scamadviser.com/uk/articles/shcho-take-shakhraystvo-zi-zminoiu-sim-karty-ta-iak-zakhystytysia"},{"label":"简体中文","code":"zh","url":"https://www.scamadviser.com/zh/articles/shi-yao-shi-simqia-diao-huan-pian-ju"}]},"search":{"placeholders":{"website":"Enter any website, phone number, crypto address, IBAN number...","phone":"Search phone","crypto":"Search a cryptoaddress...","iban":"Search a IBAN address..."},"urls":{"website":"https://www.scamadviser.com/check-website","phone":"https://www.scamadviser.com/check-phone","crypto":"https://www.scamadviser.com/check-crypto","iban":"https://www.scamadviser.com/check-iban"}}},"footer":{"consumerSection":{"title":"For Consumers","items":{"data":[{"id":37,"name":"Report a Scam","template_name":"redirect","newwindow":false,"url":"https://www.scamadviser.com/leave-review"},{"id":1048,"name":"How to get your money back","template_name":"redirect","newwindow":false,"url":"https://www.scamadviser.com/how-to-get-your-money-back-from-a-scam"},{"id":1078,"name":"ScamAdviser App & Browser Extension","template_name":"default","newwindow":false,"url":"https://www.scamadviser.com/download-browser-extension-app"},{"id":1058,"name":"How to Recognize a Scam","template_name":"redirect","newwindow":false,"url":"https://www.scamadviser.com/how-to-recognize-a-scam"},{"id":1072,"name":"Check a site for me","template_name":"redirect","newwindow":false,"url":"https://www.scamadviser.com/check-a-site-for-me"}]}},"businessSection":{"title":"For Businesses","items":{"data":[{"id":1017,"name":"Claim your Website","template_name":"claim-website","newwindow":false,"url":"https://www.scamadviser.com/claim-your-site"},{"id":1085,"name":"API & Data Feed","template_name":"default","newwindow":false,"url":"https://www.scamadviser.com/scamadviser-api"},{"id":1025,"name":"Install Our Logo","template_name":"default","newwindow":false,"url":"https://www.scamadviser.com/install-our-logo"},{"id":1015,"name":"Become our Partner","template_name":"default","newwindow":false,"url":"https://www.scamadviser.com/become-a-partner"},{"id":1023,"name":"Advertise on ScamAdviser","template_name":"redirect","newwindow":false,"url":"https://www.scamadviser.com/advertise-on-scamadviser"}]}},"aboutUsSection":{"title":"About Scamadviser","items":{"data":[{"id":20,"name":"About Us","template_name":"default","newwindow":false,"url":"https://www.scamadviser.com/about-scamadviser"},{"id":14,"name":"FAQ","template_name":"default","newwindow":false,"url":"https://www.scamadviser.com/faq"},{"id":1012,"name":"In the Press","template_name":"default","newwindow":false,"url":"https://www.scamadviser.com/in-the-press"},{"id":13,"name":"Contact","template_name":"contact","newwindow":false,"url":"https://www.scamadviser.com/contact"}]}},"subFooter":{"items":{"data":[{"id":16,"name":"Privacy Policy","template_name":"default","newwindow":false,"url":"https://www.scamadviser.com/privacy-policy"},{"id":17,"name":"Terms & Conditions","template_name":"default","newwindow":false,"url":"https://www.scamadviser.com/terms-conditions"},{"id":1061,"name":"Imprint","template_name":"default","newwindow":false,"url":"https://www.scamadviser.com/imprint"},{"id":28,"name":"Disclaimer","template_name":"default","newwindow":false,"url":"https://www.scamadviser.com/disclaimer"},{"id":18,"name":"Content Guidelines","template_name":"default","newwindow":false,"url":"https://www.scamadviser.com/review-guidelines"},{"id":1039,"name":"Notice and Take Down","template_name":"default","newwindow":false,"url":"https://www.scamadviser.com/notice-and-take-down-procedure"},{"id":1040,"name":"Sitemap","template_name":"sitemap","newwindow":false,"url":"https://www.scamadviser.com/sitemap"},{"id":1016,"name":"Copyright","template_name":"default","newwindow":false,"url":"https://www.scamadviser.com/copyright-notice"}]}},"initiativeText":"ScamAdviser is a member of"},"socials":[{"url":"https://www.facebook.com/sadviser/","icon":"facebook-square"},{"url":"https://www.youtube.com/channel/UCERAPMuOxhqOg6WqIDR1G2w","icon":"youtube"},{"url":"https://twitter.com/scamadviser","icon":"twitter-square"},{"url":"https://www.linkedin.com/company/scamadviser","icon":"linkedin-square"},{"url":"https://t.me/scamadviser_scammybot","icon":"telegram"},{"url":"https://wa.me/31612902070","icon":"whatsapp"},{"url":"https://www.scamadviser.com/scammy-chatbot","icon":"university"}]},"url":"/articles/what-is-a-sim-swap-scam-how-to-stay-protected","version":"b585c9c1f4996e80265fb32e550ca3c3","encryptHistory":false,"clearHistory":false}">

What Is a SIM Swap Scam & How to Stay Protected?

Header

Author: Trend Micro

March 3, 2022

This article is from Trend Micro.

A SIM swap scam, aka SIM swapping, SIM jacking, or SIM hijacking, is when a criminal steals someone’s mobile phone number by tricking the victim’s cell phone provider into transferring the number to a SIM card that is in the criminal’s possession.

After the number has been transferred, the criminal can insert the SIM card into their phone and use it to access the victim’s online accounts by bypassing two-step verification.

How do SIM swap scams work?

Here is a breakdown of what happens during a SIM swap scam:

  1. The criminal contacts your mobile phone carrier and pretends to be you.
  2. Most commonly, the criminal will say that their phone and SIM card (your phone and SIM card) has been lost or destroyed and that your mobile phone number needs to be transferred to the new SIM card that they already have.
  3. After the criminal has convinced the customer service representative that their bogus story is legitimate, your mobile phone number will be transferred to their SIM card.
  4. The criminal inserts the SIM that is now linked to your phone number into their phone and uses it to bypass the SMS-based two-factor authentication of your online accounts. Because two-step verification is used during “forgot password” and “account recovery” requests, it means the criminal can take over any online accounts linked to your phone number and reset their passwords with no issue.

SIM swap scam statistics

According to a recent FBI public service announcement, SIM swap scams are on the rise — and causing massive losses to victims. Throughout 2021, the FBI received 1,611 reports of SIM swapping, with losses totaling over $68 million. This is in contrast to the entire two-year period between January 2018 and December 2020, when there were just 320 SIM swapping-related complaints, with victims losing approximately $12 million.

How to stay protected from SIM swap scams — the FBI’s advice

The FBI recommends people take the following precautions to stay protected from SIM swapping scams:

  • Never post information about your financial assets (including cryptocurrency) anywhere on the internet.
  • If you receive a phone call from someone requesting information relating to your mobile phone number or cell phone provider account, do not give it. If you believe the call may be from your cell phone provider, contact its customer service department directly.
  • Avoid sharing personal information (including your mobile phone number) online.
  • Use a strong and unique password for every online account.
  • Watch out for any changes in SMS-based connectivity.
  • Use strong multi-factor authentication methods like biometrics (fingerprints, iris patterns, for example), standalone authentication apps, and physical security tokens.
  • Never store passwords, usernames, or other personal information that could be used to log in or hack into your online accounts on mobile device apps.

How criminals get personal data

Wondering how a criminal would even get their hands on the personal information needed to pull off a SIM swap scam in the first place? It’s no secret — they most often get it from data leaks.

The 2021 T-Mobile and LinkedIn data leaks exposed over 800 million people’s data — including personal information such as their full names, physical addresses, phone numbers, Social Security numbers, and more. Leaked data is commonly posted to underground internet forums and the dark web, where criminals can get their hands on it and use it to commit various crimes, including SIM swap scams.

Be even more protected with Trend Micro™ ID Security

Trend Micro ID Security — available for Android and iOS — can scan the internet and the dark web 24/7 for your personal information. If your data is leaked, the app notifies you immediately so you can take action to avoid people stealing your identity. If your information is out there, you’ll be the first to know!

Here are some of the features offered by Trend Micro ID Security :

  • Personal Data Protection Score — See exactly how safe your online personal data is with your customized Protection Score.
  • 24/7 Comprehensive Personal Data Monitoring — ID Security can scan the internet and the dark web for all your personal information including up to 5 email addresses and bank account numbers, 10 credit card numbers, your Social Security number, and lots more.
  • Social Media Account Protection — Strengthen the security of your social media accounts. Be instantly alerted if your Facebook or Twitter account’s data is leaked by cybercriminals.

To learn more about Trend Micro ID Security and claim your free 30-day trial, click the button below.

 

Think you might be the victim of SIM swapping?

If so, here’s what the FBI says you should do:

  • Get in touch with your cell phone provider for help regaining control of your phone number.
  • Change the passwords to all your online accounts.
  • Contact your financial institutions so they can watch out for any suspicious activity with your accounts.
  • Report any suspicious activity to your local FBI field office or your local law enforcement agency and the FBI’s Internet Crime Complaint Center.

As ever, if you’ve found this article an interesting and/or helpful read, please do SHARE it with friends and family to help keep the online community secure and protected.

Report a Scam!

Have you fallen for a hoax, bought a fake product? Report the site and warn others!

Help & Info

Top Safety Picks

Your Go-To Tools for Online Safety
Disclaimer: Some of the links here are affiliate links. If you click them and make a purchase, we may earn a commission at no extra cost to you.

  1. ScamAdviser App - iOS : Your personal scam detector, on the go! Check website safety, report scams, and get instant alerts. Available on iOS
  2. ScamAdviser App - Android : Your personal scam detector, on the go! Check website safety, report scams, and get instant alerts. Available on Android.
  3. NordVPN : NordVPN keeps your connection private and secure whether you are at home, traveling, or streaming from another country. It protects your data, blocks unwanted ads and trackers, and helps you access your paid subscriptions anywhere. Try it Today!
  4. Incogni : Incogni automatically removes your personal data from data brokers that trade in personal information online, helping reduce scam and identity theft risks without the hassle of manual opt-outs. Reclaim your privacy now!

Popular Stories

In a nutshell: A good VPN protects your privacy with strong encryption, a strict no-logs policy, and fast protocols like WireGuard. The best VPNs also offer wide server coverage, leak protection, and easy-to-use apps for all devices. For 2025, the top providers are NordVPN, ExpressVPN, Surfshark, Proton VPN, Private Internet Access, CyberGhost, and Mullvad—each excelling in speed, security, or value. In an age where every click is tracked, a Virtual Private Network (VPN) is no longer just a luxury—it's an essential tool for digital privacy and security. A VPN works by creating a secure, encrypted tunnel between your device and the internet, masking your real IP address and protecting your sensitive data from prying eyes. But with hundreds of providers out there, how do you sort the secure from the suspect? This guide breaks down the non-negotiable features of a quality VPN and highlights the 7 top-rated services for 2025. What to Look for in a Good VPN: The 4 Non-Negotiable Pillars 1. Ironclad Security Features Strong Encryption: AES-256, the gold standard. Secure Protocols: OpenVPN, WireGuard, NordLynx, Lightway. Avoid PPTP. Kill Switch: Ensures no accidental IP leaks. Leak Protection: Covers DNS, IPv6, and WebRTC. 2. Verified Privacy Practices No-Logs Policy: No activity or metadata tracking. Independent Audits: Verification by third parties. Safe Jurisdiction: Prefer countries outside the 5/9/14 Eyes alliances. 3. High-Speed Performance Fast Protocols: WireGuard and equivalents. Large Server Network: Less crowding, more reliable speeds. 4. Essential Usability Features Multi-Device Apps: Windows, Mac, iOS, Android, routers. Simultaneous Connections: One account, many devices. Unblocking Power: Netflix, Hulu, BBC

How to Protect Yourself and Your Family After a Data Breach When Your Data Falls Into the Wrong Hands Just received that terrifying notification? Or perhaps you've noticed suspicious activity in your accounts? Take a deep breath. A data breach, the unauthorized access or exposure of sensitive, protected, or confidential data, is a deeply unsettling event. It can plunge you into a world of worry, bringing risks from financial losses and identity theft to significant emotional distress and reputational damage. The numbers don't lie: according to a 2024 report, the number of data breach victim notices has grown by a staggering 211% year-over-year. This isn't just a distant threat; it's a stark reality many individuals face. This year alone, we've seen major organizations like Adidas and Qantas grapple with high-profile data breaches, affecting countless customers. This underscores a critical truth: nobody is untouchable. Subsequently, strategic action is the only way to minimize the risk and protect your future. This guide is your emergency action plan, designed to walk you through every crucial step—from confirming the breach to fortifying your digital life for the long term. Part 1: Confirming the Breach and Understanding the Damage The very first step is to answer the question definitively: Was my data compromised, and if so, how badly? Start with the basics: Check Official NotificationsReputable companies are legally obligated to inform you if your data was part of a breach. Look for official emails, letters, or public announcements. Check Verified Breach DatabasesPlatforms like HaveIBeenPwned help you see if