
With additional reporting by Palash Volviokar
Our phones are the key to our digital identity. So it's no wonder they have become increasingly attractive targets for cybercriminals, who have a fair number of ways to take control of your phone number. People tend to refer to account takeovers as phone cloning, but they are actually talking about one of three things: phone cloning, SIM card cloning, or SIM card swapping.
True phone cloning involves copying the device information – the IMEI or ESN (electronic serial number), along with the MIN (mobile identification number) – to another device. In the past, this information was used to identify a device on cellular networks. However, advances in cellular networks and technology have made true phone cloning extremely unlikely in most countries, including the US.
SIM card cloning is also extremely rare. Modern SIM cards don’t just store your identifying information like a memory stick – they contain a secure chip with a secret authentication key that cannot be read or copied, even if someone removes the card and places it in a SIM reader. And as phones increasingly rely on encrypted, carrier-provisioned eSIMs instead of removable cards, physical cloning becomes even less realistic.
The biggest threat, and what you usually hear about, is SIM swapping. This is where hackers either go into a carrier store or call a carrier's customer support and impersonate account holders to get a new SIM. This method often relies on social engineering tactics to find out personal information that carriers use to authenticate customer accounts. And with the rise of eSIMs, attackers don't even need a physical SIM anymore – if they can breach your carrier account (through stolen or brute-forced credentials), they can remotely generate an eSIM QR code, scan it on their own device, and take over your number from anywhere.
Once someone has control of your phone number, they can send messages and make calls using it. The biggest danger is that text messages and calls intended for the rightful owner of the phone number are intercepted – including two-factor authentication codes that allow access to critical accounts like email, social media, crypto wallets, and even banking.
If you think a SIM swap is happening right now
- Call your carrier from another phone and ask them to freeze or restore your line immediately.
- Change your passwords and remove SMS-based two-factor authentication from critical accounts as soon as possible.
- Check your financial and social accounts for password reset emails or unfamiliar logins.
Read more: How to Back up Everything on Your Android Phone
5 signs that you may be a victim of SIM swapping, cloning, or eSIM hijacking
SIM-swap attacks tend to show up in very specific, very noticeable ways, usually all at once. The key is that your phone number stops working on your device because it’s been moved to someone else’s SIM. Here are the most common signs, in the order people usually notice them.
1. You stop receiving calls and texts
The first and biggest red flag is sudden loss of cellular service. Your phone shows “No Service,” you can’t make calls, and you can’t send or receive texts, even though you’re in an area where you normally have signal, and your account is paid up. Wi-Fi still works, but anything tied to your carrier does not.
2. You receive unexpected notifications from your carrier
FCC rules that took effect in 2024 require carriers to authenticate the person who requests any SIM change or number port-out. However, carriers often use security questions or details like your billing address, which isn’t hard to find or phish. If your number has been activated on a new device, your carrier will send a text or email confirming your details have been updated to the main account holder. So if your spouse is the main account holder, you may not receive any notice.
3. Unexpected password reset notifications from online accounts
The second wave of signs hits your online accounts. You’ll see unexpected password reset emails or security alerts, especially for email, banking, and crypto accounts. Attackers use your stolen number to intercept one-time passcodes sent via SMS, so they immediately try to reset your passwords.
4. You lose access to online accounts
Very quickly after that, you may lose access to your accounts entirely. You enter the correct password, but the 2FA code is sent to a number you no longer control. In some cases, you’ll get alerts that your email password, recovery email, or security settings have been changed.
5. You see unauthorized transactions in your financial accounts
Financial accounts are often targeted next. Watch for unauthorized transactions or transfer alerts, especially from banks, payment apps, or crypto exchanges. SIM-swap attacks are frequently used to bypass SMS-based security and move money.
There are also a few secondary warning signs that don’t always show up but are worth noting. Friends or colleagues might say they received strange messages from you, because attackers sometimes use the hijacked number to phish your contacts. And if you log into your Apple ID or Google account, you might see new or unfamiliar devices signed in, indicating broader account takeover beyond the phone number.
How to prevent SIM cloning and swapping
The single most effective step you can take to prevent a SIM swap is to set up your carrier's SIM protection and number lock features. All three major US carriers now offer free tools specifically designed to block unauthorized SIM changes and port-outs. If you haven't already, turn these on right now. It only takes a minute.
- AT&T's Wireless Account Lock is a toggle in the myAT&T app that locks SIM swaps, number transfers, and device upgrades on your account.
- Verizon offers both Number Lock (blocks port-outs to other carriers) and SIM Protection (blocks internal SIM changes). You can enable both through the My Verizon app under Settings.
- T-Mobile's SIM Protection, managed through the T-Life app, requires in-store verification with a photo ID to remove, which makes it pretty difficult for a hacker to bypass remotely.
The other simple step you can take is to set a PIN code that you must provide whenever you want to make a change to your account or to others on your plan. It isn’t a failsafe, since it could be phished, but it’s an extra layer of security that I recommend.
Finally, switch away from text-messaging-based two-factor authentication whenever possible. It’s the least secure 2FA method of protecting your accounts. At Techlicious, we recommend using passkeys. They're faster than typing a code, can't be intercepted through a SIM swap, and they are supported by Google, Apple, Microsoft, Amazon, and a growing number of financial institutions.
Read more: 2FA Explained: The Safest Ways to Protect Your Accounts
Updated on 2/26/2026 with eSIM hijacking threats, FCC-mandated carrier notification rules, carrier-specific SIM protection features, and passkey recommendations.
[Image credit: phone hacking concept via BigStockPhoto]