Previous All Posts Next

SIM Swap Attack Prevention: Why Celebrities Are the Number 1 Target

Posted: March 25, 2026 to Cybersecurity.

SIM Swap Attack Prevention: Why Celebrities Are the Number 1 Target

SIM swap attacks occur when an attacker convinces a mobile carrier to transfer a victim's phone number to a SIM card under the attacker's control, enabling interception of calls, text messages, and SMS-based two-factor authentication codes. Celebrities and high-profile individuals are the primary targets because their compromised accounts yield the highest financial returns and because their personal information is readily available through data brokers, public records, and social media, making the social engineering component easier to execute.

The FBI's Internet Crime Complaint Center reported 2,026 SIM swap complaints in 2025 with adjusted losses exceeding $72 million, a 74% increase from the prior year. Industry researchers estimate that reported cases represent fewer than 20% of actual incidents because many victims are unaware they have been targeted until significant damage has already occurred. A single SIM swap can compromise email, banking, cryptocurrency, social media, and cloud storage accounts within minutes.

Key Takeaways

  • FBI reported $72 million in SIM swap losses in 2025, a 74% year-over-year increase
  • Celebrities are targeted because their accounts have high monetary value and their personal data is widely available
  • SMS-based 2FA is the specific vulnerability that SIM swap attacks exploit
  • Hardware security keys (FIDO2) and authenticator apps are immune to SIM swap interception
  • Petronella Technology Group's account takeover protection includes SIM swap prevention as a core component

How SIM Swap Attacks Work

Step 1: Target Research

The attacker gathers the victim's personal information: full name, date of birth, home address, last four digits of their Social Security number, and mobile carrier account details. For celebrities and public figures, much of this information is available through data broker sites, public records, and social media profiles. Removing personal information from the internet reduces the data available for this phase.

Step 2: Carrier Contact

The attacker contacts the victim's mobile carrier, impersonating the account holder. They claim a lost or damaged phone and request that the phone number be transferred to a new SIM card. Methods include calling customer support, visiting a retail store with a fake ID, or using an online account management portal. In some cases, attackers bribe or coerce carrier employees directly. T-Mobile, AT&T, and Verizon have all been identified in DOJ prosecutions of SIM swap rings.

Step 3: Number Transfer

Once the carrier processes the transfer, the victim's phone loses service and all incoming calls and texts route to the attacker's device. This happens within seconds. The victim's phone may display "No Service" or "Emergency Calls Only."

Step 4: Account Takeover Cascade

With control of the phone number, the attacker resets passwords on email accounts that use SMS-based recovery. With email access, they reset passwords on banking, cryptocurrency, social media, and other accounts linked to that email. The entire cascade from SIM transfer to full account compromise can occur in under 15 minutes.

Why Celebrities Are Target Number 1

High-Value Social Media Accounts

A verified celebrity social media account with millions of followers is worth tens of thousands of dollars on underground markets. Compromised accounts are used to promote cryptocurrency scams, phishing links, and fraudulent product endorsements. The July 2020 Twitter hack that compromised accounts belonging to Barack Obama, Elon Musk, and Bill Gates generated $120,000 in Bitcoin within hours from a single scam post.

Cryptocurrency Holdings

Multiple high-profile SIM swap cases have targeted cryptocurrency investors and tech celebrities. In 2018, investor Michael Terpin lost $24 million in cryptocurrency through a SIM swap attack. In 2019, a SIM swap ring was convicted of stealing over $100 million from cryptocurrency holders, with several victims being publicly known figures in the crypto industry.

Accessible Personal Data

The social engineering required for a SIM swap is significantly easier when the target is a public figure. Home addresses, family members' names, birthdates, and even carrier account details can be assembled from publicly available sources. The more information an attacker has, the more convincingly they can impersonate the account holder to carrier support staff.

Insider Recruitment

Carrier employees have been prosecuted for accepting bribes to process fraudulent SIM swaps. A former T-Mobile employee was sentenced in 2023 for processing SIM swaps in exchange for $500 per transfer. The insider threat is particularly relevant for celebrity targets because the financial incentive for the bribed employee is directly proportional to the target's perceived wealth.

Prevention Measures

Carrier-Level Protections

All three major US carriers now offer SIM protection features, but they must be explicitly activated:

Carrier Protection Feature How to Enable Effectiveness
T-Mobile Account Takeover Protection + SIM Protection T-Mobile app or call 611 High (requires in-store ID verification for SIM changes)
AT&T Extra Security + Port Freeze MyAT&T app or call customer service Moderate to High (PIN required, but social engineering of support staff still possible)
Verizon Number Lock + Account PIN My Verizon app Moderate (Number Lock prevents port-out but not in-network SIM changes in all cases)

Move Critical Authentication Off SMS

The most effective protection is eliminating reliance on SMS for authentication entirely. Deploy hardware security keys (YubiKey, Google Titan, Feitian) on all critical accounts. For accounts that do not support hardware keys, use authenticator apps (Authy, Google Authenticator, Microsoft Authenticator) which store codes on the device rather than delivering them via SMS. Petronella Technology Group's cybersecurity team assists clients with this migration across all accounts.

Use a VoIP Number as Primary

Port your primary phone number to Google Voice, which is protected by your Google account security (including hardware key support) rather than carrier-level security. Use a separate physical SIM with a different number for cellular connectivity. This approach makes carrier-level SIM swaps irrelevant for authentication purposes because the number tied to your accounts is not controlled by a mobile carrier.

Reduce Data Broker Exposure

The personal information used to impersonate you to carrier support comes primarily from data brokers and public records. Systematic removal from data broker databases reduces the information available for social engineering. Petronella's VIP Security program includes data broker removal as a standard component.

Implement Account-Level Protections

  • Set a unique PIN on your carrier account that differs from other PINs
  • Remove your phone number as a recovery option on email and financial accounts
  • Enable login alerts on all critical accounts to detect unauthorized access immediately
  • Use unique email addresses for high-value accounts so the login email itself is not guessable

What to Do During an Active SIM Swap

If your phone suddenly shows "No Service" or "Emergency Calls Only" and you have not initiated a carrier change, assume a SIM swap is in progress and act immediately:

  1. Call your carrier from another phone: Report the unauthorized SIM change and request immediate reversal. Note the case number and representative's name.
  2. Change email passwords: Use a computer (not the affected phone) to change passwords on your primary email accounts before the attacker can.
  3. Lock financial accounts: Contact your bank and investment firms to freeze accounts and flag for fraud.
  4. Secure cryptocurrency: If you hold cryptocurrency, transfer to cold storage or a different wallet immediately.
  5. Document everything: Timestamp every action for potential law enforcement investigation and legal proceedings. Digital forensics teams can assist with formal evidence preservation.
  6. File reports: Report to local law enforcement and the FBI's IC3 (ic3.gov). File a complaint with the FCC if the carrier's negligence contributed to the attack.

Regulatory Landscape

The FCC adopted new rules effective November 2024 requiring carriers to implement more robust identity verification before processing SIM changes and port-out requests. These rules mandate that carriers offer customers the option to require in-person identification for any SIM transfer. Additionally, carriers must notify account holders at their existing contact information before completing any SIM change. Enforcement actions have included $20 million fines against carriers found negligent in SIM swap prevention.

Several states, including California and Arizona, have enacted additional consumer protection laws specific to SIM swap fraud. Class-action lawsuits against T-Mobile and AT&T for failing to prevent SIM swap attacks have resulted in settlements exceeding $350 million collectively through 2025.

Frequently Asked Questions

Can a SIM swap happen without any warning signs?

The primary warning sign is sudden loss of cellular service ("No Service" or "Emergency Calls Only" on your phone). However, some attackers execute SIM swaps during hours when the victim is likely asleep or otherwise unlikely to notice the service disruption immediately. International travelers whose phones are on airplane mode are particularly vulnerable because the service disruption is masked. Setting up secondary alerting mechanisms, such as email notifications for account login attempts, provides detection even when the primary phone is unavailable.

Does eSIM technology prevent SIM swap attacks?

eSIM technology makes SIM swaps more difficult but does not eliminate them entirely. Physical SIM cards can be swapped by inserting a new card, but eSIM transfers require carrier-side activation, which still involves the same customer service processes vulnerable to social engineering. However, eSIM does eliminate the risk of a stolen physical SIM card and makes in-store swaps harder because there is no physical card to hand to a retail employee. The most important protection remains moving authentication away from SMS entirely, regardless of SIM type. Petronella's account takeover protection service includes AI-enhanced monitoring that detects SIM swap indicators before account compromise occurs.

Your Phone Number Is the Keys to Your Kingdom. Lock It Down.

Petronella Technology Group's SIM swap prevention program hardens carrier accounts, migrates authentication away from SMS, and monitors for SIM swap indicators in real time. Protect yourself before you become a statistic.

Call 919-348-4912 for a SIM swap vulnerability assessment.

Petronella Technology Group, Inc. | 5540 Centerview Dr. Suite 200, Raleigh, NC 27606

Need help implementing these strategies? Our cybersecurity experts can assess your environment and build a tailored plan.
Get Free Assessment

About the Author

Craig Petronella, CEO and Founder of Petronella Technology Group
CEO, Founder & AI Architect, Petronella Technology Group

Craig Petronella founded Petronella Technology Group in 2002 and has spent more than 30 years working at the intersection of cybersecurity, AI, compliance, and digital forensics. He holds the CMMC Registered Practitioner credential (RP-1372) issued by the Cyber AB, is an NC Licensed Digital Forensics Examiner (License #604180-DFE), and completed MIT Professional Education programs in AI, Blockchain, and Cybersecurity. Craig also holds CompTIA Security+, CCNA, and Hyperledger certifications.

He is an Amazon #1 Best-Selling Author of 15+ books on cybersecurity and compliance, host of the Encrypted Ambition podcast (95+ episodes on Apple Podcasts, Spotify, and Amazon), and a cybersecurity keynote speaker with 200+ engagements at conferences, law firms, and corporate boardrooms. Craig serves as Contributing Editor for Cybersecurity at NC Triangle Attorney at Law Magazine and is a guest lecturer at NCCU School of Law. He has served as a digital forensics expert witness in federal and state court cases involving cybercrime, cryptocurrency fraud, SIM-swap attacks, and data breaches.

Under his leadership, Petronella Technology Group has served 2,500+ clients, maintained a zero-breach record among compliant clients, earned a BBB A+ rating every year since 2003, and been featured as a cybersecurity authority on CBS, ABC, NBC, FOX, and WRAL. The company leverages SOC 2 Type II certified platforms and specializes in AI implementation, managed cybersecurity, CMMC/HIPAA/SOC 2 compliance, and digital forensics for businesses across the United States.

CMMC-RP NC Licensed DFE MIT Certified CompTIA Security+ Expert Witness 15+ Books
Related Service
Protect Your Business with Our Cybersecurity Services

Our proprietary 39-layer ZeroHack cybersecurity stack defends your organization 24/7.

Explore Cybersecurity Services
Previous All Posts Next
Free cybersecurity consultation available Schedule Now