/SIM-Swapping-Educational-Guide

A detailed guide on SIM swapping techniques, covering methods used in authorized and unauthorized SIM swaps, associated risks, and preventative measures. This repository is designed to educate developers and cybersecurity professionals on SIM swap attacks and how to defend against them.

SIM Swapping with Physical Access

Warning: This README is provided for educational purposes only. Please ensure you have authorization and are following applicable laws and guidelines.

Overview

This guide outlines how to perform a SIM swap when you have physical access to a device. These steps can be helpful in cases such as assisting users in regaining access to their own phone number or in troubleshooting SIM-related issues with carrier support.


Steps for SIM Swapping with Physical Access

1. Identify the Carrier and Contact Them

  • Carrier Information: Determine the mobile carrier for the phone number, which is often listed in the phone's settings or on the SIM card.
  • Customer Service: Contact the carrier’s customer support department and explain the purpose of the SIM swap, confirming that you have authorization and the necessary device details.

2. Provide Necessary Identification and Account Information

Carriers typically require the following:

  • Account Holder ID: A government-issued ID or other verification from the account holder.
  • IMEI Number: The phone’s unique identifier, which can be found in the phone’s settings or by dialing *#06#.
  • Proof of Ownership: The account holder may also need to provide account PINs, passwords, or answer security questions.

3. Swap the SIM

After authorization, the carrier will assist in transferring the phone number to a new SIM card:

  • Carrier-Provided SIM Card: If needed, the carrier will provide a new SIM card and activate it remotely.
  • Insert New SIM: Place the activated SIM card into the device, which should connect to the network with the transferred number.

4. Test and Confirm Access

Ensure that the number transfer was successful:

  • Test Calls and SMS: Make a test call or send a test SMS to confirm connectivity.
  • Verify SMS-based Authentication: Ensure that SMS-based authentication codes (if applicable) can now reach the new SIM card.

SIM Swapping Methods

In addition to physical access, SIM swapping may be conducted through various other methods. Understanding these can be helpful for security professionals.

1. Information Gathering

Attackers often start by gathering information about a victim to impersonate them with the mobile carrier. Common information includes:

  • Full Name: Often available from social media or public records.
  • Phone Number: Listed on profiles or available through data breaches. Sometimes found on job sites like indeed or linkedin.
  • Address: Sourced from public records or online data.
  • Birth Date: Frequently accessible through social media.
  • Email Address: Located on profiles, forums, or public websites.

This information can also be obtained through phishing or data purchases on underground markets.

2. Social Engineering the Carrier

Once sufficient personal information is obtained, attackers contact the victim's carrier, often claiming the phone or SIM was lost, damaged, or stolen. The goal is to convince customer service to transfer the number to a new SIM. Common tactics include:

  • Impersonation: Posing as the victim and answering security questions with the gathered information.
  • Phishing Carrier Support: Tricking or hacking customer support representatives into granting access or revealing additional information.

3. SIM Card Activation

After successfully impersonating the victim, the attacker can convince the carrier to activate the phone number on their own SIM card. This process usually renders the victim’s original SIM inactive.

4. Account Takeover

With control over the victim's phone number, attackers can intercept SMS-based two-factor authentication codes for sensitive accounts, including:

  • Bank Accounts: Gaining access by resetting passwords through SMS-based verification.
  • Email Accounts: Accessing password reset links for additional accounts.
  • Social Media Accounts: Taking over profiles for further identity theft or phishing.
  • Cryptocurrency Accounts: Potentially draining funds from crypto wallets.

Risks of SIM Swapping

SIM swapping exposes victims to various risks:

  • Financial Loss: Unauthorized access to bank and investment accounts.
  • Data Theft: Access to sensitive information in email and social media.
  • Identity Theft: Potential impersonation and misuse of the victim's identity.
  • Loss of Cryptocurrency: Irreversible transfers of funds from crypto wallets.

Preventing SIM Swapping

To protect against SIM swapping, follow these recommended practices:

1. Use Strong, App-Based 2FA

Use app-based two-factor authentication (like Google Authenticator or Authy) instead of SMS. Alternatively, hardware security keys (such as YubiKey) provide strong, phishing-resistant authentication.

2. Add a PIN/Password to Your Carrier Account

Most carriers allow customers to set a unique PIN or password required for account changes. Contact your carrier to enable this option.

3. Minimize Public Sharing of Personal Information

Avoid sharing your phone number, birthday, or address publicly online to reduce exposure to attackers.

4. Enable Account Alerts

Set up notifications for login attempts, password resets, and 2FA changes, and act quickly if you notice any unusual activity.

5. Inform Your Carrier of Suspicious Activity

Many carriers have dedicated fraud teams. Notify your carrier if you suspect you’re at risk of SIM swapping to enable additional security measures on your account.


Additional Resources