Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1047

SIM Swapping

What is SIM Swapping?

SIM SwappingA fraud technique in which an attacker tricks or bribes a mobile carrier into transferring a victim's phone number to a SIM the attacker controls.


SIM swapping (also called SIM-jacking or port-out fraud) abuses carrier account-recovery and number-portability processes. Using stolen personal data and social engineering of customer-service staff, or insider help, the attacker has the victim's number ported to a new SIM. Once the number is theirs, the criminal intercepts SMS codes, voice calls, and password-reset links and rapidly takes over email, banking, and crypto-wallet accounts. Mitigations include moving off SMS-based MFA toward FIDO2 keys, passkeys, or authenticator apps; setting a carrier PIN or port-out lock; using non-public recovery emails; and monitoring for sudden loss of cellular service, which is often the first sign of an attack.

Examples

  1. 01

    Calling the carrier with leaked PII to request a new SIM and then resetting bank-account passwords by SMS.

  2. 02

    An insider at a mobile store performing the swap for a fee.

Frequently asked questions

What is SIM Swapping?

A fraud technique in which an attacker tricks or bribes a mobile carrier into transferring a victim's phone number to a SIM the attacker controls. It belongs to the Attacks & Threats category of cybersecurity.

What does SIM Swapping mean?

A fraud technique in which an attacker tricks or bribes a mobile carrier into transferring a victim's phone number to a SIM the attacker controls.

How does SIM Swapping work?

SIM swapping (also called SIM-jacking or port-out fraud) abuses carrier account-recovery and number-portability processes. Using stolen personal data and social engineering of customer-service staff, or insider help, the attacker has the victim's number ported to a new SIM. Once the number is theirs, the criminal intercepts SMS codes, voice calls, and password-reset links and rapidly takes over email, banking, and crypto-wallet accounts. Mitigations include moving off SMS-based MFA toward FIDO2 keys, passkeys, or authenticator apps; setting a carrier PIN or port-out lock; using non-public recovery emails; and monitoring for sudden loss of cellular service, which is often the first sign of an attack.

How do you defend against SIM Swapping?

Defences for SIM Swapping typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for SIM Swapping?

Common alternative names include: SIM-jacking, Port-out fraud, SIM hijacking.

Related terms

See also