Terence Eden’s Blog<p><strong>That's Not How A SIM Swap Attack Works</strong></p><p><a href="https://shkspr.mobi/blog/2025/04/thats-not-how-a-sim-swap-attack-works/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">shkspr.mobi/blog/2025/04/thats</span><span class="invisible">-not-how-a-sim-swap-attack-works/</span></a></p><p>There's <a href="https://www.theguardian.com/money/2025/apr/15/ee-was-unapologetic-after-i-tried-to-stop-a-sim-swap" rel="nofollow noopener noreferrer" target="_blank">a disturbing article in The Guardian</a> about a person who was on the receiving end of a successful cybersecurity attack.</p><blockquote><p>EE texted to say they had processed my sim activation request, and the new sim would be active in 24 hours. I was told to contact them if I hadn’t requested this. I hadn’t, so I did so immediately. Twenty-four hours later, my mobile stopped working and money was withdrawn from my bank account.</p><p><strong>With their alien sim, the fraudster infiltrated my handset and stole details for every account I had.</strong> Passwords and logins had been changed for my finance, retail and some social media accounts. </p></blockquote><p>(Emphasis added.)</p><p>I realise it is in the consumer rights section of the newspaper, not the technology section, and I dare-say some editorialising has gone on, but that's <em>nonsense</em>.</p><p>Here's how a SIM swap works.</p><ol><li>Attacker convinces your phone company to reassign your telephone number to a new SIM.</li><li>Attacker goes to a website where you have an account, and initiates a password reset.</li><li>Website sends a verification code to your phone number, which is now in the hands of the attacker.</li><li>Attacker supplies verification code and gets into your account.</li></ol><p>Do you notice the missing step there?</p><p>At no point does the attacker "infiltrate" your handset. Your handset is still in your possession. The SIM is dead, but that doesn't give the attacker access to the phone itself. There is simply <strong>no way</strong> for someone to put a new SIM into their phone and automatically get access to your device.</p><p>Try it now. Take your SIM out of your phone and put it into a new one. Do all of your apps suddenly appear? Are your usernames and passwords visible to you? No.</p><p>There are ways to transfer your data from an <a href="https://support.apple.com/en-gb/HT210216" rel="nofollow noopener noreferrer" target="_blank">iPhone</a> or <a href="https://support.google.com/android/answer/13761358?hl=en" rel="nofollow noopener noreferrer" target="_blank">Android</a> - but they require a lot more work than swapping a SIM.</p><p>So how did the attacker know which websites to target and what username to use?</p><p><strong>What (Probably) Happened</strong></p><p>Let's assume the person in the article didn't have malware on their device and hadn't handed over all their details to a cold caller.</p><p>The most obvious answer is that the attacker <em>already</em> knew the victim's email address. Maybe the victim gave out their phone number and email to some dodgy site, or they're listed on their contact page, or something like that.</p><p>The attacker now has two routes.</p><p>First is "hit and hope". They try the email address on hundreds of popular sites' password reset page until they get a match. That's time-consuming given the vast volume of websites.</p><p>Second is targetting your email. If the attacker can get into your email, they can see which sites you use, who your bank is, and where you shop. They can target those specific sites, perform a password reset, and get your details.</p><p>I strongly suspect it is the latter which has happened. The swapped SIM was used to reset the victim's email password. Once in the email, all the accounts were easily found. At no point was the handset broken into.</p><p><strong>What can I do to protect myself?</strong></p><p>It is important to realise that <a href="https://shkspr.mobi/blog/2024/03/theres-nothing-you-can-do-to-prevent-a-sim-swap-attack/" rel="nofollow noopener noreferrer" target="_blank">there's nothing you can do to prevent a SIM-swap attack</a>! Your phone company is probably incompetent and their staff can easily be bribed. You do not control your phone number. If you get hit by a SIM swap, it almost certainly isn't your fault.</p><p>So here are some practical steps anyone can take to reduce the likelihood and effectiveness of this class of attack:</p><ul><li>Remember that <a href="https://shkspr.mobi/blog/2020/03/its-ok-to-lie-to-wifi-providers/" rel="nofollow noopener noreferrer" target="_blank">it's OK to lie to WiFi providers</a> and other people who ask for your details. You don't need to give someone your email for a receipt. You don't need to hand over your real phone number on a survey. This is the most important thing you can do.</li><li>Try to hack yourself. How easy would it be for an attacker who had stolen your phone number to also steal your email address? Open up a private browser window and try to reset your email password. What do you notice? How could you secure yourself better?</li><li>Don't use SMS for two-factor authentication. If you are given a choice of 2FA methods, use a dedicated app. If the only option you're given is SMS - contact the company to complain, or leave for a different provider.</li><li>Don't rely on a <a href="https://bsky.app/profile/scientits.bsky.social/post/3lmz2zaxkf22k" rel="nofollow noopener noreferrer" target="_blank">setting a PIN for your SIM</a>. The PIN only protects the physical SIM from being moved to a new device; it does nothing to stop your number being ported to a new SIM.</li><li>Finally, realise that professional criminals only need to be lucky once but you need to be lucky all the time.</li></ul><p>Stay safe out there.</p><p><a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://shkspr.mobi/blog/tag/2fa/" target="_blank">#2fa</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://shkspr.mobi/blog/tag/cybersecurity/" target="_blank">#CyberSecurity</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://shkspr.mobi/blog/tag/mfa/" target="_blank">#MFA</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://shkspr.mobi/blog/tag/security/" target="_blank">#security</a> <a rel="nofollow noopener noreferrer" class="hashtag u-tag u-category" href="https://shkspr.mobi/blog/tag/sim/" target="_blank">#sim</a></p>