SIM Swap Fraud: Protect Your Mobile Number

Prevent SIM-swap account takeovers by reducing reliance on SMS codes, tightening account recovery, and treating sudden loss of mobile service as an urgent security incident.

This guide explains how SIM swapping (number porting or hijacking) enables interception of one-time codes and account resets, and provides a UK-centric prevention and response checklist. It targets consumers and micro-business owners who rely on mobile numbers for banking, email, and social logins. The content emphasises safer authentication routes and rapid, structured response to minimise financial and identity harm.

Quick checklist

  1. Contact your mobile provider using a known number if your phone loses service.
  2. Secure your email first: change password and enable two-factor verification.
  3. Secure banking and key accounts: change passwords and review sign-in activity.
  4. Force log out other sessions and devices where possible.
  5. Replace SMS codes with app-based or stronger authentication where available.
  6. Report fraud if money is lost and monitor accounts.

What SIM swap fraud is

SIM swap fraud (also called number porting or SIM hijacking) is when a criminal persuades your mobile network provider to move your phone number to a SIM card they control. Once they have your number, they receive all calls and texts sent to it—including one-time codes, password reset links, and verification messages. This allows them to take over your email, banking, social media, and other accounts that use your mobile number for authentication or recovery.

Why SMS codes can be risky

SMS-based two-factor authentication sends a one-time code to your phone. If an attacker has redirected your number to their SIM, they receive that code instead of you. Industry standards such as NIST SP 800-63B note that attackers can redirect a victim's phone and receive SMS out-of-band secrets. NIST treats PSTN/SMS out-of-band authentication as restricted and highlights SIM change and number porting as risk signals. Where possible, prefer app-based or stronger multi-factor methods.

Warning signs to act on immediately

If any of these occur, treat them as urgent and follow the response steps below.

Prevention checklist

What to do if you suspect a SIM swap

Act quickly to limit harm. Follow this order:

  1. Contact your mobile provider using a number from their official website or your bill—not a number from a text or email. Explain you may have been SIM swapped and ask them to suspend or restore your number.
  2. Secure your email first: From a trusted device (e.g. a computer with internet), change your email password and enable two-step verification. Check for unfamiliar forwarding rules or connected apps.
  3. Secure banking and key accounts: Change passwords for banking, investment, and any high-value accounts. Review recent transactions and sign-in activity.
  4. Force log out other sessions: Use "sign out of all devices" or similar where available to invalidate existing sessions.
  5. Document evidence: Note dates, times, and what happened. Keep screenshots of unusual activity and provider communications.
  6. Report appropriately: If money has been lost, report to your bank and to Action Fraud (England, Wales and Northern Ireland) or Police Scotland.

After recovery

Once you have restored control:

Frequently asked questions

What is SIM swap fraud?
It's when a criminal convinces a provider to move your number to their SIM, letting them receive your calls and texts.
Can SIM swap bypass SMS two-factor codes?
Yes—if codes are delivered via SMS, a hijacked number can receive them.
What should I do if my phone suddenly loses service?
Treat it as urgent: contact your provider, secure your email and banking, and review sign-in activity.
Why focus on email security too?
Email is commonly used for password resets; losing it can cascade into other account takeovers.