0% found this document useful (0 votes)
62 views1 page

ENISA Leaflet - How To Avoid SIM Swapping

A SIM swapping attack involves a fraudster taking over a victim's mobile phone number by convincing the phone provider to transfer the number to a SIM card under the fraudster's control. This allows the fraudster to intercept calls and messages meant for the victim in order to access their online accounts and make fraudulent transactions. To prevent such attacks, users should avoid sharing personal details with unknown callers, use app-based two-factor authentication instead of SMS codes, and be cautious about information shared online. If a SIM swap occurs, victims should immediately contact their provider and banks to secure their accounts and report any fraudulent activity to the police.

Uploaded by

Terry Alberto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views1 page

ENISA Leaflet - How To Avoid SIM Swapping

A SIM swapping attack involves a fraudster taking over a victim's mobile phone number by convincing the phone provider to transfer the number to a SIM card under the fraudster's control. This allows the fraudster to intercept calls and messages meant for the victim in order to access their online accounts and make fraudulent transactions. To prevent such attacks, users should avoid sharing personal details with unknown callers, use app-based two-factor authentication instead of SMS codes, and be cautious about information shared online. If a SIM swap occurs, victims should immediately contact their provider and banks to secure their accounts and report any fraudulent activity to the police.

Uploaded by

Terry Alberto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

EUROPEAN UNION AGENCY

FOR CYBERSECURITY

How to avoid
MOBILE SIM
SWAPPING?
WHAT IS A SIM SWAPPING ATTACK?
In a SIM swapping attack, an attacker takes over your mobile
phone number by asking the mobile telecom provider to link
your number to a SIM card under the attacker’s control.

1 2 3
Collect victim’s personal data Carry out the fraudulent SIM swap Exploit the swapped SIM
Via phishing, data breaches, In-store, contacting company's The fraudster receives calls or messages
social media searches, malware representative over the phone or addressed to the legitimate user to make
online through the provider's app or bank transactions and accessing email
portal accounts, sites and social media

WHAT ARE THE WARNING SIGNS? HOW TO PREVENT THE ATTACK?


B
 efore the attack: You receive strange phone calls A
 void providing any personal information to
asking you to share codes or SMS messages that you have someone pretending to be representative of the
received from your mobile telecom provider. telecom provider.
D
 uring the attack: Your phone loses network connection N
 ever communicate, over the phone, the one-time
for a longer period, and you are not able to make or passwords you receive from your mobile operator.
receive phone calls.
C
 hoose app-based 2-factor authentication, instead
A
 fter the attack: You may see suspicious transactions in of two-factor via mobile phone or SMS.
your banking accounts, or lose access to your social media
B
 e cautious with the personal information that you
or email accounts, or see other activity you do not recognize.
share on websites and social media.
D
 o not open suspicious hyperlinks or attachments
received through email or SMS
WHAT TO DO IF YOU ARE A VICTIM?
If you experience any of the above signs, ccontact your
telecom provider as soon as possible.
If it confirms the SIM swap, immediately contact your
bank and change the passwords to your online accounts.
Furthermore, report the fraudulent activity to the police. European Union Agency for Cybersecurity
www.enisa.europa.eu

You might also like