In 2026, your phone number is one of the weakest links in your crypto security. SIM swap attacks â where a hacker tricks your mobile carrier into transferring your phone number to their SIM card â have become the preferred method for stealing millions in Bitcoin, Ethereum, and stablecoins. Unlike phishing or malware, a SIM swap bypasses SMS twoâfactor authentication (2FA) completely, giving attackers direct access to your exchange accounts, email, and even some wallet recovery options. This guide explains exactly how the attack works, documents real losses, and provides a stepâbyâstep protection plan that eliminates the risk.
Essential Security Reading
- How SIM swap attacks work (the social engineering playbook)
- Real case studies: from individual traders to exchange execs
- 8 proven protection measures against SIM hijacking
- What to do if you are under a SIM swap attack
- Beyond SIM protection: hardware wallets and multisig
- Frequently asked questions about SIM swap crypto theft
đą How SIM Swap Attacks Work â The Social Engineering Playbook
A SIM swap (also called SIM splitting, SIM hijacking, or portâout scam) does not require hacking your phone or intercepting cellular signals. Instead, the attacker manipulates your mobile carrierâs customer service representative into believing they are you. The goal is to port your phone number to a SIM card they control. Once successful, the attacker receives all calls and SMS messages intended for you â including password reset codes and SMS 2FA tokens.
The typical attack follows this sequence:
- Information gathering: The hacker collects personal data about you from data breaches, social media, phishing, or purchased dossiers. They need your full name, phone number, address, last four digits of SSN, and sometimes account PIN or billing details.
- Pretext call to carrier: The attacker calls your mobile carrier (Verizon, TâMobile, AT&T, or smaller MVNOs) impersonating you. They claim to have lost or damaged their SIM and need to activate a new one on the same number. Using the stolen personal data, they answer security questions.
- Bypassing weak authentication: Many carriers still rely on easily obtainable info (last call dates, recent payments). Some attackers bribe or trick employees directly â a practice called âSIM swattingâ or insider compromise.
- SIM activation: The carrier deactivates your SIM and activates the attackerâs SIM with your number. Your phone loses signal; the attacker now receives your SMS and calls.
- Account takeover: The hacker uses âforgot passwordâ on your email, exchange accounts (Coinbase, Binance, Kraken), or even crypto wallets that use phone verification. They reset passwords using SMS codes, drain funds, and often change recovery options to lock you out.
Why SMS 2FA is dangerous
If you use SMS text messages as your second factor, a successful SIM swap gives the attacker full control over your 2FA codes. The NIST (National Institute of Standards and Technology) deprecated SMS for 2FA back in 2016. In 2026, no crypto holder should rely on SMS for anything beyond lowâvalue accounts.
đ° Real Case Studies: Millions Lost to SIM Swaps
These are not theoretical risks. SIM swap attacks have drained some of the most prominent crypto investors and even exchange employees.
Case 1: Crypto investor Michael Terpin ($24M stolen)
In 2018â2019, a teenage hacker SIMâswapped Terpinâs number, gained access to his email and crypto exchange accounts, and stole $24 million worth of cryptocurrency. Terpin sued AT&T for negligence and won a $75 million judgment (later reduced). The case highlighted how easily carriers could be tricked with minimal personal data.
Case 2: Exchange executive targeted in 2022
A highâlevel employee at a major exchange was SIMâswapped after attackers bought his personal data from a darknet broker. The hacker drained his personal exchange account of $1.2M in Bitcoin within 20 minutes. The executive had SMS 2FA enabled on his personal email â the single point of failure.
In 2024, the FBI reported that SIM swap complaints increased 400% since 2020, with median losses per victim exceeding $50,000. Many cases go unreported because victims are embarrassed or believe recovery is impossible. The rise of âSIM swapping as a serviceâ on Telegram has lowered the barrier to entry â attackers can pay $500â$2,000 for a full SIM swap package, including a social engineer and insider assistance.
đĄď¸ 8 Proven Protection Measures Against SIM Hijacking
You cannot rely on mobile carriers alone to protect you. The following layered security steps make SIM swap attacks impossible or extremely difficult to execute against your accounts.
1. Remove SMS 2FA from all crypto accounts and email
Go into every exchange (Coinbase, Binance, Kraken, Bybit, OKX), every wallet that supports 2FA, and your primary email provider. Disable SMS as a 2FA method entirely. Replace it with TOTP (authenticator app) or hardware security keys (WebAuthn/FIDO2). Google Authenticator, Authy, or (better) a YubiKey should be your default.
2. Add a âSIM port freezeâ or ânumber lockâ with your carrier
All major US carriers now offer a feature that prevents any SIM change or number port without additional verification. On TâMobile itâs called âAccount Takeover Protectionâ (requires a oneâtime passcode or inâstore ID). Verizon has âNumber Lockâ in the app. AT&T offers âExtra Securityâ with a passcode. Enable this immediately. Outside the US, ask your carrier for âport out protectionâ.
đ Carrier SIM Protection Features (2026)
| Carrier | Feature name | How to enable |
|---|---|---|
| TâMobile | Account Takeover Protection (NOPORT) | Call or TâMobile app â Profile â Privacy & Security |
| Verizon | Number Lock | My Verizon app â Manage device â Number Lock |
| AT&T | Extra Security / Passcode | Call customer service, add a unique 6â8 digit passcode |
| MVNOs (Mint, Visible) | Varies | Contact support, request port freeze (some lack this â consider switching) |
3. Use a Google Voice number or secondary VoIP for SMS
If a service absolutely requires SMS (some banks still do), route that SMS to a Google Voice number. A Google Voice number is tied to your Google account, which can be secured with a hardware key. An attacker cannot SIMâswap a Google Voice number because it is not linked to a mobile carrier. Downside: not all services accept VoIP numbers for verification.
4. Strengthen your carrier account PIN and security questions
Create a strong, unique PIN (not 1234 or your birth year). Make it at least 8 digits, store it in a password manager. Also set a âportâout PINâ if your carrier offers one. Avoid using easily discoverable answers for security questions (e.g., motherâs maiden name can be found in public records). Instead, use random strings stored in your password manager.
5. Use appâbased 2FA for everything, plus hardware keys for critical accounts
Authenticator apps (Google Authenticator, Microsoft Authenticator, Authy) generate TOTP codes offline. Even if an attacker SIMâswaps your number, they cannot generate these codes. For maximum security, buy a YubiKey (or similar FIDO2 key) and register it with your exchange, email, and password manager. Hardware keys are phishingâresistant and impossible to remotely clone.
6. Secure your email account with hardware key 2FA
Your email is the master key to resetting passwords. If an attacker controls your email, they can bypass most other protections. Add a YubiKey to your Gmail, Outlook, or ProtonMail account. Remove SMS and authenticator app fallbacks if possible (Gmailâs âAdvanced Protection Programâ forces hardware keys and disables less secure methods).
7. Use a dedicated âcrypto emailâ not tied to your phone number
Create a new email address (ProtonMail or Tutanota) used only for crypto exchanges. Never give this email to anyone, never use it for social media, and never associate it with your phone number. Even if your primary number is SIMâswapped, the attacker wonât know this secondary email exists.
8. Consider switching to an eSIM or carrier with stronger security
eSIMs (embedded SIMs) are marginally harder to swap because they require physical access or carrier portal authentication, but they are still vulnerable. Some carriers now require inâperson verification with a government ID for any SIM change. If your current carrier has a history of breaches, switch to one that offers mandatory port freeze and requires notarized ID for highârisk accounts.
Even if a hacker SIMâswaps you, a hardware wallet keeps your Bitcoin safe. Learn which device to buy and how to set it up.
đ¨ What to Do If You Are Under a SIM Swap Attack
You suddenly lose cellular service (âNo Serviceâ or âSOS onlyâ) while your phone still works on WiâFi. This is the first sign of a SIM swap. Act immediately:
- Contact your carrier immediately from another phone (borrow a friendâs, use WiâFi calling if still possible, or a landline). Tell them you are experiencing an unauthorized SIM swap and demand they deactivate the fraudulent SIM and reactivate your original SIM. Ask them to freeze all porting activity.
- Lock down your email account using a device you trust (laptop on home network). Change your email password, revoke all active sessions, and remove any unfamiliar recovery methods. If you lose access to email, contact your email providerâs recovery process immediately.
- Log into every crypto exchange and move funds to a hardware wallet. If you cannot log in because the attacker changed your password, use the exchangeâs account recovery process (most require video verification or ID). If you have a hardware wallet, your longâterm holdings are safe regardless of exchange access.
- Freeze your credit reports (Equifax, Experian, TransUnion) because the attacker may also attempt identity theft beyond crypto.
- File a police report and IC3 complaint (FBI). Some exchanges require a police report to reverse unauthorized transactions (though reversal is rare).
The golden hour
The first 60 minutes after a SIM swap are critical. Attackers usually move funds within 15â30 minutes. Quick action to freeze your carrier account can cut off their access to incoming SMS, preventing further password resets.
đ Beyond SIM Protection: Hardware Wallets and Multisig
Even the best SIM protection does not guard against exchange hacks or wallet compromises. The ultimate layer of security is moving your cryptocurrency off exchanges and into selfâcustody using a hardware wallet or multisig setup.
A hardware wallet (Ledger, Trezor, Coldcard) stores your private keys offline. An attacker who SIMâswaps you and gains access to your exchange account cannot withdraw funds if you keep only small amounts on exchanges. For longâterm holdings, consider a multisig wallet (e.g., 2âofâ3 or 3âofâ5) where multiple devices or keys are required to sign a transaction. This eliminates the single point of failure of a phone number entirely.
For a complete overview of crypto scams and how to avoid them, read our Crypto Scams 2026: 10 Most Common Types and How to Avoid Each.