Imagine this scenario: you’re going about your day and suddenly you can’t make calls or text. You didn’t know it, but you’ve become the latest victim of a ported phone number scam, a sneaky tactic where hackers hijack your phone number to assume your identity.
CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERT, QUICK VIDEO TIPS, TECHNICAL REVIEWS AND SIMPLE HOW-TO’S TO MAKE YOU SMARTER
A woman is talking on a cell phone (Kurt “CyberGuy” Knutsson)
What is a ported phone number scam?
A CyberGuy Report subscriber contacted us to say he was the victim of a ported phone number scam. Also known as Replacing the SIM card or port-out fraud, is when a hacker steals a victim’s phone number to take control of it. Once they gain control, they use that number to commit identity theft by gaining access to their other accounts.
A man is typing on a mobile phone (Kurt “CyberGuy” Knutsson)
MORE: TV PRESENT ANDY COHEN DUPLICATED IN EXPENSIVE BANK FRAUD: HOW TO AVOID BECOMING A VICTIM YOURSELF
How Hackers Hijack Your Identity Through the Ported Phone Number Scam
While there are several ways they can port a victim’s phone number, one of the most common ways is for them to use your stolen personal information to call their carrier, pass their security checks, and once they pass, demand that they port the number to a new carrier or transfer to a new the SIM card they sent them.
After the scammer successfully transfers the phone number, he receives all calls and messages intended for the victim. This approach allows them to bypass security measures such as two-factor authentication (2FA) which sends a code via text message to the phone number associated with the account.
With this power, a fraudster can use this method to crack passwords and gain unauthorized access to your personal accounts, whether it’s a social media account, an online bank account, or any other account. Once they continue to gain access to your other various accounts, there’s no telling what else they can do.
Image of bank cards (Kurt “CyberGuy” Knutsson)
MORE: WHAT TO DO WHEN YOUR OWN NUMBER RINGES ON YOUR HOME PHONE
How to protect yourself from ported number scams in the future
If you manage to get out of identity theft once, chances are you’ll do whatever it takes to avoid being in that position again. With all of this said, it’s important not to blame yourself. Scammers are very sophisticated and are always looking for ways to stay one step ahead of their victims. So do what you can to stay one step ahead of them:
1) Secure your phone number: If you can take any extra measures to protect your phone number, don’t think twice. For example, add a secondary security code or PIN to yours Android or iPhone.
2) Enable two-factor authentication (2FA): This adds an extra layer of security to all your accounts.
3) Secure your email account: Just like you would for your phone, add additional check methods when possible and notify you if someone logs into your account from another device.
4) Secure your other accounts: Take the same measures for your other accounts, such as your bank or accounts on social networks. For example, request to be notified every time there is activity on your account, so you can track it and quickly determine whether the activity was done by you or someone else.
5) Limit who you give your number to: Be careful who you share your phone number with.
6) Consider using a secondary or number of burners for online use: This can help protect your primary phone number.
7) Change the password: Use a strong password that has more than 12 characters (if applicable) and a combination of numbers and upper and lower case letters. Consider using a password manager for generating and storing complex passwords.
8) Be careful with email: Do not open attachments or click on links in emails unless you are sure they are safe. The best way to protect yourself from clicking on malicious links that install malware that could gain access to your personal information is to have antivirus protection installed on all your devices. This can also alert you to any phishing emails or ransomware scams. Choose the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.
How do you know if your identity has been stolen?
You can find out about ported phone number scams when your mobile service is unexpectedly interrupted because your number has been ported to another carrier’s SIM card. Such incidents can escalate into full-blown identity theft.
A fraudster could use one-time passwords (OTPs) – unique codes sent to your phone for security verification – to fraudulently access all the data on your device, including credit card information. This violation could result in your own accounts being banned.
When a fraudster successfully port your phone number to another carrier’s SIM card, they can receive these OTPs meant for you. This allows them to bypass security measures and gain unauthorized access to your accounts, such as email, banking and social media, potentially leading to identity theft.
Retaking control of your phone number and securing any accounts that were compromised is often a difficult and time-consuming process. This highlights the need to be proactive, protect your personal information and be alert for unusual activity on your accounts.
A woman is holding a bank card (Kurt “CyberGuy” Knutsson)
MORE: WHY YOU NEED AN IDENTITY PROTECTION PIN THIS TAX SEASON
What to do if a fraudster takes over your identity
If you discover that your identity has been stolen—whether through this phone line scam or another type of identity theft—there are a few steps you should take.
Report the theft to the local police station: Some companies may require a police report to remove fraudulent debts from your account.
To visit Identity theft.gov: This website helps you recover from identity theft. You can answer questions about what happened to you, get your identity theft report, and create a recovery plan just for you.
Contact your credit card companies: Notify them of the situation and follow their procedures for securing your accounts. You may need to close your current accounts and open new ones.
Check your credit reports: Look for any bills or expenses you haven’t incurred and report them.
Place a fraud alert on your credit reports: This makes it difficult for someone else to open new accounts in your name.
Use the identity theft protection service: Phishing companies can monitor personal information like your Social Security number, phone number, and email address and alert you if it’s being sold on the dark web or used to open an account. They can also help you freeze bank and credit card accounts to prevent further unauthorized use by criminals. One of the best parts about using some services is that they may include identity theft insurance up to $1 million to cover losses and legal fees and a white glove fraud resolution team where a A US-based case manager helps you recover any losses. Check out my tips and top picks on how to protect yourself from identity theft.
Smartphone with sim card (Kurt “CyberGuy” Knutsson)
MORE: HOW TO STOP SCORING PHONE NUMBERS AND PROTECT YOURSELF FROM SCAMMERS
Kurt’s outdoor essentials
Unfortunately, once a fraudster steals your identity, it can be very difficult to get it back. That being said, there are steps you can take to reclaim your identity while ensuring your number is not ported in the future.
What measures do you think mobile operators should implement to prevent ported phone number fraud? Let us know by writing to us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report newsletter by going to Cyberguy.com/Newsletter.
Ask Kurt a question or tell us what stories you want us to cover.
Answers to the most frequently asked CyberGuy questions:
Copyright 2024 CyberGuy.com. All rights reserved.
Kurt “CyberGuy” Knutsson is an award-winning technology journalist with a deep love for technology, gear and the gadgets that make life better in his contributions to Fox News & FOX Business since morning on “FOX & Friends.” Have a technical question? Get Kurt’s free CyberGuy newsletter, share your voice, story idea or comment on CyberGuy.com.