Back to BlogsSocial Engineering

SIM Swapping Attack — Steal Someone's Phone Number

Anuj Singh (Admin) 31 March 2026 557 views

SIM Swap — The ₹1 Crore Attack

SIM swapping is a simple social engineering attack that can give hackers access to your bank accounts, crypto wallets, and all 2FA-protected accounts.

How It Works

  1. Attacker gathers your personal info (OSINT, data breaches)
  2. Calls your mobile carrier pretending to be you
  3. Claims "lost phone" or "need new SIM"
  4. Convinces support agent to transfer your number to attacker's SIM
  5. Receives ALL your SMS — including OTPs
  6. Resets passwords on bank, email, crypto accounts

Real Cases

  • 💰 $24 million stolen from crypto investor Michael Terpin
  • 💰 ₹1.86 crore stolen from Indian businessman via SIM swap
  • 💰 $100 million+ stolen across multiple SIM swap rings
  • 💰 Twitter CEO Jack Dorsey's Twitter hacked via SIM swap

Why India is Especially Vulnerable

  • Aadhaar-linked SIM makes social engineering easier
  • Telecom store employees can be bribed (₹500-2000)
  • SMS-based 2FA is used by most Indian banks
  • UPI transactions rely on phone number verification

Protection

  • 🔒 Use app-based 2FA (Google Authenticator) instead of SMS
  • 🔒 Set SIM lock PIN with your carrier
  • 🔒 Enable port-out protection
  • 🔒 Use hardware keys (YubiKey) for critical accounts
  • 🔒 Keep personal info off social media

🔥 Learn to protect against SIM swaps at ONLY4YOU →

Want to Learn This Practically?

Subscribe to ONLY4YOU and get hands-on access to 40+ premium courses — Ethical Hacking, Kali Linux, Metasploit, Network Hacking, Bug Bounty & more!