SIM Swaps and Account Takeovers: Prevention Guide
Understand how SIM swap attacks work, why SMS 2FA is vulnerable, and how to protect your crypto accounts from takeover.
📢 Important Disclaimer
This content is for educational purposes only. It is not financial, investment, legal, or tax advice. Cryptocurrency assets are volatile and high risk. You could lose your entire investment. This site makes no recommendations or endorsements, provides no price predictions, and offers no trading strategies. Always conduct your own research and consult with qualified professionals before making any financial decisions.
Who This Is For
Anyone using SMS-based two-factor authentication (2FA) for crypto exchanges or wallets needs to understand SIM swap attacks. Even security-conscious users can be vulnerable if they rely on phone numbers for account security. This guide explains how these attacks work and how to protect yourself.
⚠️ Key Risks
SIM swap reality check:
- SIM swaps can happen to anyone—attackers have successfully targeted executives, celebrities, and security professionals
- Once the attacker controls your phone number, they can reset passwords and bypass SMS 2FA
- Your mobile carrier's customer service is often the weakest link
- Recovery is difficult once funds are stolen
What Is a SIM Swap?
A SIM swap (also called SIM hijacking) is when an attacker convinces your mobile carrier to transfer your phone number to a SIM card they control.
The result: The attacker receives all calls and text messages intended for you—including 2FA codes.
Why it matters for crypto: Many exchanges and services use SMS codes for:
- Two-factor authentication (2FA)
- Password resets
- Withdrawal confirmations
- Account recovery
Once the attacker controls your phone number, they can bypass these protections.
How SIM Swap Attacks Work
Step 1: Information Gathering
The attacker collects information about you:
- Full name
- Phone number
- Address
- Date of birth
- Last 4 digits of SSN (from data breaches)
- Email address
- Mother's maiden name
- Carrier name
Sources:
- Social media profiles
- Data breaches (credentials sold on dark web)
- Public records
- Phishing attacks
Step 2: Social Engineering the Carrier
The attacker contacts your mobile carrier's customer service:
Attacker: "Hi, I'm [your name]. I lost my phone and need to activate a new SIM card."
They provide the personal information they've gathered to verify identity.
Common tactics:
- Claims phone was lost or stolen
- Says SIM card is damaged
- Pretends to be at a carrier store
- May bribe or collude with carrier employee
- Uses urgency ("I need this for work emergency")
Step 3: Number Transfer
If successful, the carrier transfers your phone number to the attacker's SIM card.
You notice:
- Your phone suddenly shows "No Service"
- Calls and texts aren't coming through
- You can't make calls
Step 4: Account Takeover
The attacker now receives your text messages and calls:
They target crypto accounts:
- Go to exchange website (Coinbase, Kraken, Binance, etc.)
- Click "Forgot Password"
- Enter your email address
- Receive password reset code via SMS (to their phone now)
- Reset your password
- Log into your account
- Bypass SMS 2FA (they receive the code)
- Withdraw all funds to their wallet
They also target:
- Your email (to prevent you from getting alerts)
- Your bank accounts
- Other financial services
Step 5: Fund Theft
Once they control your accounts:
- Disable notifications
- Change passwords
- Add their withdrawal addresses to whitelist
- Withdraw maximum amounts
- Transfer funds through mixing services to hide trail
Timeline: This entire process can happen in under an hour.
Real Examples
Case 1: The Investor
A crypto investor had $100K on Coinbase with SMS 2FA enabled.
What happened:
- Attacker found investor's info from LinkedIn and data breach
- Called carrier pretending to be the investor
- Transferred phone number to their SIM
- Reset Coinbase password via SMS
- Bypassed SMS 2FA
- Withdrew all funds
Time elapsed: 45 minutes from SIM swap to funds gone.
Case 2: The Public Figure
A Twitter crypto influencer was SIM swapped.
What happened:
- Attacker gathered info from public Twitter profile
- Bribed carrier employee to perform swap
- Took over Twitter account and posted scam
- Accessed linked email and exchange accounts
- Stole funds and damaged reputation
Lesson: High profile = higher target risk.
Why SIM Swaps Work
Mobile Carrier Vulnerabilities
Weak verification:
- Customer service reps vary in diligence
- Easy-to-guess "security questions"
- Public information used for verification
- Remote procedures less secure than in-store
Insider threats:
- Carrier employees bribed to perform swaps
- Compromised accounts with access to systems
- Insufficient employee background checks
Process issues:
- Inconsistent security procedures
- Override mechanisms for "legitimate emergencies"
- Difficulty distinguishing real customers from imposters
SMS 2FA Weaknesses
SMS-based 2FA was never designed to be highly secure:
- SMS messages unencrypted
- Vulnerable to interception
- Relies on phone number remaining under your control
- Can't verify the message recipient's identity
It's better than no 2FA, but not by much for high-value accounts.
Account Takeover Beyond SIM Swaps
SIM swaps aren't the only way accounts get compromised:
Email Compromise
If attacker gains access to your email:
- Can reset passwords for linked accounts
- Receives security alerts and can delete them
- Can change account settings
How email gets compromised:
- Phishing
- Weak passwords
- Password reuse across sites
- Malware/keyloggers
Password Reuse
Many people use the same password across multiple sites:
- One site gets breached
- Credentials leaked and sold
- Attackers try those credentials on other sites (credential stuffing)
- Gain access to accounts
Malware
Malicious software on your device:
- Keyloggers recording passwords
- Clipboard hijackers changing wallet addresses
- Remote access tools (RATs)
- Fake wallet apps
Physical Access
Someone with physical access to your devices:
- Can view saved passwords
- Access logged-in sessions
- Install spyware
- Copy recovery information
⚠️The Weakest Link
Your account security is only as strong as its weakest protection layer. If you use app-based 2FA on exchanges but SMS 2FA for your email, the attacker will target your email first.
How to Protect Against SIM Swaps
1. Remove Phone Number from Accounts
Best practice: Don't link your phone number to accounts if possible.
On exchanges:
- Use authenticator app 2FA instead of SMS
- Remove phone number from account settings
- Use email for communications only
On email:
- Use authenticator app or hardware key 2FA
- Don't use phone number for recovery
Challenge: Some services require phone numbers. For these, use other protections below.
2. Set Up Carrier Security
Contact your mobile carrier and request:
Port protection:
- Add PIN or password required for any changes
- Require in-store visit for SIM changes
- Enable port freeze (prevents number transfers)
Account security:
- Create complex security questions (not guessable from social media)
- Require multi-step verification for changes
- Get alerts for any account changes
Carriers vary, but most offer some protections:
- Verizon: Number Lock, Account PIN
- AT&T: Extra Security, Passcode
- T-Mobile: Account Takeover Protection, Port Validation
Call your carrier and ask what's available.
3. Use Authenticator Apps, Not SMS
Replace SMS 2FA with authenticator apps:
Recommended apps:
- Google Authenticator
- Authy
- Microsoft Authenticator
- Duo Mobile
How they work:
- Generate time-based codes on your device
- Don't rely on phone number or carrier
- Work offline
- Not vulnerable to SIM swaps
Setup:
- Enable 2FA in account settings
- Choose "Authenticator app" option
- Scan QR code with app
- Save backup codes in secure location
- Verify it works before disabling SMS
More details: Two-Factor Authentication Guide
4. Use Hardware Security Keys
For maximum security on important accounts:
Hardware keys (YubiKey, Titan Security Key):
- Physical device required to log in
- Immune to phishing and remote attacks
- No codes to intercept
- Attacker needs physical access to key
Best for:
- Exchange accounts
- Email accounts
- Cryptocurrency wallets with key support
Drawback: Need backup key in case you lose primary key.
5. Create Separate Email for Crypto
Use a dedicated email address only for crypto:
- Don't share it publicly
- Don't use it for other services
- Enable strongest 2FA available
- Use unique, complex password
- Monitor for breach attempts
Benefits:
- Reduces attack surface
- Phishing less likely to target it
- Easier to monitor for suspicious activity
6. Limit Personal Information Online
Make it harder for attackers to gather info about you:
Reduce social media exposure:
- Don't post full name + phone number
- Limit date of birth visibility
- Don't share address or location
- Use privacy settings
- Don't post about crypto holdings
Remove from data broker sites:
- Use services like DeleteMe, PrivacyDuck
- Opt out of people search sites manually
- Google yourself regularly to see what's public
Don't overshare:
- Don't mention what exchanges you use
- Don't post about crypto success
- Don't link wallet addresses to identity
7. Monitor for Warning Signs
Watch for signs you're being targeted:
Phone indicators:
- Sudden loss of service
- Unusual carrier account login attempts
- Text messages about SIM changes you didn't make
- Calls from "carrier" asking for info (likely scammers)
Account indicators:
- Login attempts from unfamiliar locations
- Password reset requests you didn't initiate
- Changes to account settings you didn't make
- Unusual 2FA code requests
If you notice these, act immediately (see section below).
8. Use Google Voice or Alternative Number
For services that require a phone number:
Consider Google Voice:
- Free virtual phone number
- Linked to Google account (protect with hardware key)
- Not vulnerable to traditional SIM swaps
- Can be recovered through Google account
Other options:
- Skype number
- Burner app
- Secondary device with separate number
Important: Secure the underlying account (Google, etc.) with strong 2FA.
What to Do If You're SIM Swapped
If your phone suddenly shows "No Service" and you suspect SIM swap:
Act immediately:
1. Contact Your Carrier
- Call from another phone or use online chat
- Report unauthorized SIM change
- Request immediate number reversal
- Set up account PIN/password if not done already
- File formal complaint
2. Secure Your Accounts
Priority order:
- Email: Change password from computer, enable 2FA, review recent activity
- Crypto exchanges: Change passwords, enable app-based 2FA, check for withdrawals
- Bank accounts: Change passwords, freeze accounts if needed, contact bank
- Other financial services: Change passwords, review for suspicious activity
If you can't access accounts:
- Contact support immediately through official channels
- Request account freeze
- Provide any verification information you can
3. Check for Damage
- Review all transaction history
- Check for new withdrawal addresses
- Look for changed account settings
- See what information may have been accessed
4. Document Everything
- Screenshot timeline of events
- Save communication with carrier
- Record transaction IDs of stolen funds
- Note any suspicious emails or messages
5. Report the Crime
- File police report
- Report to FBI IC3 (ic3.gov)
- Report to FTC (reportfraud.ftc.gov)
- Report to exchange/service where funds stolen
- Consider consulting attorney
Reality: Recovery is unlikely, but reporting helps track patterns and may assist investigation.
More info: What to Do If You've Been Scammed
Account Security Checklist
Implement these protections on all crypto-related accounts:
- [ ] Remove phone number from accounts where possible
- [ ] Replace SMS 2FA with authenticator app or hardware key
- [ ] Enable port protection/PIN with mobile carrier
- [ ] Create dedicated email for crypto with strong 2FA
- [ ] Use unique, complex passwords (password manager)
- [ ] Enable withdrawal address whitelisting on exchanges
- [ ] Set up withdrawal delays (if available)
- [ ] Limit personal information on social media
- [ ] Monitor accounts regularly for suspicious activity
- [ ] Keep recovery codes in secure offline location
Prevention vs. Recovery
Harsh truth: Prevention is the only effective defense.
Why recovery fails:
- Crypto transactions are irreversible
- Attackers move funds quickly through mixers
- Cross-border jurisdictional issues
- Limited law enforcement resources for individual cases
- Funds often gone before you regain account control
Time matters: The window between attack and fund theft can be under an hour. By the time you realize what's happening, it's often too late.
Therefore: Invest time now in prevention rather than hoping for recovery later.
Common Mistakes
"I'm not a target"
Reality: Attackers target opportunity, not specific people. If you have funds and use SMS 2FA, you're a potential target.
"My carrier is secure"
Reality: Every major carrier has had customers SIM swapped. No carrier is immune.
"SMS 2FA is good enough"
Reality: SMS 2FA is better than nothing, but inadequate for accounts with significant funds or access.
"I'll switch to app-based 2FA eventually"
Reality: Procrastination is the attacker's best friend. Switch now while you still control your accounts.
"I'm careful about phishing"
Reality: SIM swaps don't require you to make a mistake. The attack targets the carrier, not you directly.
💡Do It Now
Right now, before finishing this article, open your exchange app and switch from SMS to authenticator app 2FA. It takes 2 minutes and could save your funds. Do it now.
Key Takeaways
- SIM swap attacks are real and increasingly common
- SMS 2FA is vulnerable and should not be used for crypto accounts
- Switch to authenticator apps or hardware keys
- Set up carrier security protections (PIN, port freeze)
- Remove phone numbers from accounts where possible
- Prevention is the only effective defense—recovery is rarely successful
- Don't wait until it's too late
The attacker only needs to succeed once. You need to be vigilant always.