

In either case, the scammer can gain control over the victim's private texts and calls, and may then try to reset credentials for the victim's financial data and social media accounts. The scammer can then use the stolen SIM card in their own mobile device. If the scam is successful, the phone number will be ported to a different mobile device controlled by the scammer.Īnother way to perpetrate this scam is to physically steal the victim’s SIM card, a removable device in some mobile phones that carries a unique ID and stores the consumer’s personal data. When scammers initiate a porting request, they con the victim’s mobile phone company into believing the request is from the authorized account holder. But with enough of your personal information, scammers can have your number ported to a device they possess. Mobile phone numbers can legally be ported from one provider to another when you switch your mobile phone service, and can also be ported from one mobile phone to another when you upgrade or change devices. Text messages are often used by banks, businesses and payment services to verify your identity when you request updates to your account.

Your mobile phone number may be the key to your most important financial accounts. Types of cellular fraud include SIM swapping, cloning and subscriber fraud. SIM swapping is when someone hijacks your mobile phone number to gain access to your texts and calls.Ĭellular fraud is defined as the unauthorized use, tampering or manipulation of a cellular phone or service.
