Your phone number is more than a contact detail. For most people it is the master key to their digital life, the recovery method for email, the 2FA channel for banking, the identity anchor for every account that matters. SIM swapping attacks that single point of failure directly.
The mechanics are deceptively simple. A fraudster convinces, or pays, a mobile carrier employee to transfer your phone number to a SIM card they control. The moment that transfer completes, every SMS-based authentication code, every "forgot my password" reset, every verification text goes to the attacker. The victim's phone goes silent. The attack begins.
In 2023 alone, the FBI reported $72 million in US losses attributable to SIM swapping, and that figure captures only what was reported. The actual damage is substantially higher.
"The attack is elegant in its simplicity: it does not break encryption, exploit software vulnerabilities, or require technical skill. It exploits the human layer of telecom infrastructure, and that layer has proven extremely difficult to harden."
The Four-Step Attack Sequence
Unlike many fraud types, SIM swapping follows a tight, predictable operational sequence. Each step is observable, in theory. In practice, the entire attack can complete in under 15 minutes.
Four Attack Variants
SIM swapping is not a single technique. It is a threat category with distinct operational variants, each with different risk profiles and defensive countermeasures.
The Dark Web Service Economy
The evidence from dark web markets and Telegram channels (exhibits right) shows a fully stratified market. At the bottom, tutorial guides sell for $1.49 to $4.00, escrow-protected, auto-dispatched, globally available. The "Sim Swapping Method 2024 -- Make $100,000+" listing has 405 confirmed sales.
At the top, insider-facilitated swap services charge $1,200 to $2,000 per swap, with AT&T insiders advertising customer info lookup (ICCID, SSN, IMSI, IMEI, DOB), SMS history access, and call records as add-ons priced separately. Telegram channels advertise swaps across Verizon, AT&T, T-Mobile, O2 and "many more," active around the clock from accounts that are routinely deleted and recreated after being banned.
The barrier to entry is as low as $1.49 for the education and $2,000 for the execution. For anyone targeting a high-value crypto wallet, the economics are compelling.
SMS-based 2FA is the primary attack surface. Any account that uses a phone number as a recovery method or second factor is vulnerable. The most effective mitigations are authenticator apps (TOTP), hardware security keys, and carrier-level PINs with port-freeze requests. For high-value targets, number-porting locks and account takeover monitoring are increasingly essential. The carrier layer remains the weakest link, and the insider threat is the hardest to defend against at scale.