The process of changing a SIM card is a common practice for consumers. However, when hackers fraudulently port phone numbers, this compromises the personal information and gives the thieves access to sensitive financial information. Understanding how SIM Swap Fraud works and being able to recognise what it looks like is the first step towards prevention.
In this guide, we run through the key timeline of events as a SIM Swap takes place. It counts from the time of the initial port to the point when the hacker gains access to the victim's financial resources.