Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1046

SIM Cloning

What is SIM Cloning?

SIM CloningCopying the secret key Ki from a SIM card so that a second card can impersonate the original on the mobile network.


SIM cloning recovers the subscriber's IMSI and the secret key Ki stored in a SIM, then writes them to a programmable card to produce a duplicate that registers on the carrier as the original. The attack was first practical against COMP128-1, the original GSM authentication algorithm broken in 1998 by the Smartcard Developer Association and David Wagner: a researcher with physical access could query the card around 50 000 times and derive Ki via differential cryptanalysis. COMP128-2 and v3 fixed the math but legacy SIMs were vulnerable for years. Cloning enables voice/SMS interception, location spoofing and 2FA theft. Mitigations include modern Milenage USIMs, anti-clone monitoring on the HLR/HSS, and replacing SMS one-time codes with authenticator apps or FIDO2.

Examples

  1. 01

    An old prepaid GSM SIM cloned to a programmable card to receive a target's calls.

  2. 02

    Insider at a kiosk reading Ki from a customer's SIM during a phone repair.

Frequently asked questions

What is SIM Cloning?

Copying the secret key Ki from a SIM card so that a second card can impersonate the original on the mobile network. It belongs to the Attacks & Threats category of cybersecurity.

What does SIM Cloning mean?

Copying the secret key Ki from a SIM card so that a second card can impersonate the original on the mobile network.

How does SIM Cloning work?

SIM cloning recovers the subscriber's IMSI and the secret key Ki stored in a SIM, then writes them to a programmable card to produce a duplicate that registers on the carrier as the original. The attack was first practical against COMP128-1, the original GSM authentication algorithm broken in 1998 by the Smartcard Developer Association and David Wagner: a researcher with physical access could query the card around 50 000 times and derive Ki via differential cryptanalysis. COMP128-2 and v3 fixed the math but legacy SIMs were vulnerable for years. Cloning enables voice/SMS interception, location spoofing and 2FA theft. Mitigations include modern Milenage USIMs, anti-clone monitoring on the HLR/HSS, and replacing SMS one-time codes with authenticator apps or FIDO2.

How do you defend against SIM Cloning?

Defences for SIM Cloning typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for SIM Cloning?

Common alternative names include: GSM SIM cloning, COMP128 clone.

Related terms