What is SIM-jacking?
SIM hijacking, or SIM-jacking, is a new, dangerous way that scammers can steal information from people, by secretly controlling their phones.
Following a growing trend, thieves are exploiting the mobile service provider's ability to transfer phone numbers between different SIM cards.
Usually this is a useful function. If a customer loses or damages a phone, they can purchase a replacement device and ask the mobile service provider to move the original phone number to the new phone.
The provider will require some confidential information to ensure the caller is the owner, before transferring the phone number to the new SIM card.
But through a series of SIM-jacking scams, people have discovered how scammers can use phone number transfer to access personal information and steal thousands of pounds.

How does SIM-jacking work?
First, the scammers must collect the necessary security information to transfer the victim's phone number. They can do this by:
- Email phishing
- Bribing employees working at the mobile carrier's company that the victim has registered
- Persuade victims to give information directly to them by trusting them.
When necessary security information or passwords are available, the crooks will impersonate the victim with the mobile service provider and persuade the service provider to transfer the victim's phone number to the new SIM card.
After that, the victim's phone will lose its network connection, all messages and reserved calls will be transferred to the phishing phone.
Why do scammers do that?
Stealing a SIM card is the first step that scammers need to gain access to personal information and steal victims' money.
If you forget your password for your email or bank account, those companies will often send you a security code via text as part of the verification process to reset your password.
But once the crooks have usurped the SIM card, they can directly receive the security codes. This security code allows them to reset the victim's password and access their social networking accounts, banks and emails.
Then the crook can start withdrawing money and stealing personal information from the victim.

How do i prevent SIM-jacking from happening?
If you're worried about activating your SIM, you can call your mobile service provider and ask them to add an extra layer of security to your account - like asking for a PIN to change details.
Everyone should make sure that every account they have - email, banking, social networks, online shopping - has a strong and unique password. This will make it more difficult for scammers to access all of your other accounts, even if they can hack into one account.
You should avoid sharing too much personal details on social networks. Scammers can often find lots of security details, like their date of birth and address, by looking through the victim's social media.
You should read it
- Web13: Session Hijacking Hacking Techniques
- Analyze DLL hijacking attacks
- Learn about DNS Hijacking and how to prevent it!
- What is Browser Hijacking?
- What is Domain Hijacking? How dangerous is it?
- Secret chips can be hidden in the device to spy on and hijack smartphones
- Learn about Man-in-the-Middle attacks - ARP Cache spoofing
- Demo video VLC on Windows Phone
May be interested
- What is a RADIUS Server? How does RADIUS Server work?radius server is a background process that runs on unix or windows servers. it allows you to maintain user profiles in the central database.
- What is web scraping? What is Web Scraping used for?web scraping refers to extracting data from a website. this information is collected and then exported into a format that is more useful to users (be it spreadsheet or api).
- What is UI UX? Differences between UI and UX designux and ui complement each other. even the user interface (ui) should be considered part of the user experience (ux). let's see why through the following article offline!
- What is CHD file? How to use CHD file?if you're playing retro games, you may have come across files with the extension '.chd'. let tipsmake.com learn about chd file and how to use it through the following article!
- What is teraflop?if you're looking to buy a new xbox series x, you've probably come across the term tflop. it is abbreviated teraflop and has become an important measurement of graphics card performance.
- What is Ray Tracing?many rtx and gtx cards support ray tracing (ray tracing) technology, but do you really know what it is? let's find out what ray tracing is and decide whether it is worth upgrading or not through the following article!