A SIM swap attack is an advanced attack method that specifically targets phone-based verification security. Attackers use social engineering techniques to trick mobile carriers into transferring your phone number to a SIM card they control, thereby receiving all SMS verification codes sent to your number. This type of attack has caused numerous cryptocurrency theft cases worldwide. This article provides a detailed analysis of the attack mechanism and a comprehensive set of prevention strategies.
What Is a SIM Swap Attack
Attack Mechanism
The core of a SIM swap attack is getting the carrier to transfer your phone number from your SIM card to a SIM card held by the attacker. Once the transfer succeeds:
- Your phone loses signal (because the number is no longer on your SIM card).
- The attacker's phone can receive all SMS messages and calls sent to your number.
- The attacker can use the received SMS verification codes to:
- Reset your Binance password
- Log into your account via SMS verification
- Confirm withdrawal operations
- Modify account security settings
Attack Process
A typical SIM swap attack usually involves the following steps:
Information gathering phase: The attacker first collects your personal information -- name, phone number, ID number, address, etc. This information may come from:
- Publicly available information on social media
- Personal data from data breach incidents
- Social engineering (e.g., posing as customer service to extract information)
- Personal information purchased on the dark web
Attack execution phase: The attacker uses the collected personal information to deceive the carrier through the following methods:
- Impersonating you at a carrier store to request a SIM card replacement (claiming the original card was lost)
- Impersonating you by calling the carrier's customer service and answering security questions to verify "identity"
- In some cases, bribing carrier internal employees to complete the operation
Exploitation phase: After the SIM card transfer succeeds, the attacker quickly:
- Logs into various platforms using your phone number
- Resets passwords
- Completes various operations via SMS verification codes
- Transfers your crypto assets before you discover the attack
Real Cases
Numerous large-scale crypto asset theft cases caused by SIM swap attacks have occurred globally:
- An investor in the United States lost over $24 million in crypto assets due to a SIM swap
- Multiple well-known figures in the crypto industry had their social media accounts hijacked through SIM swap
- Some victims had SMS 2FA enabled but lost protection due to SIM swap
Register through the Binance exclusive link to learn more about security protection.
SIM Swap Risks for Mainland Users
Chinese Carrier Security Measures
Compared to some countries, Chinese telecommunications carriers have certain security advantages in SIM card management:
- Real-name registration requirement: All phone numbers require real-name authentication. SIM card replacement typically requires the account holder to visit a carrier store in person with their ID card.
- Facial recognition: Some carriers require facial recognition when replacing a SIM card.
- SMS notifications: SIM card-related operations usually trigger SMS notifications.
But the Risk Is Not Zero
Despite these protective measures, mainland users still face SIM swap risks:
- Internal employee risk: Carrier employees may be bribed to bypass normal procedures.
- Forged ID cards: Fake identity documents can be used to process SIM card replacements.
- Agent location vulnerabilities: Some small agent locations may have less strict verification than official carrier stores.
- Online service vulnerabilities: Carrier online service channels may have security vulnerabilities.
- eSIM technology: As eSIM becomes more widespread, remote SIM transfers become easier, increasing the attack surface.
Comprehensive Prevention of SIM Swap Attacks
Core Prevention Strategies
Strategy 1: Do Not Rely on SMS Verification as Your Primary 2FA
This is the most fundamental prevention measure. Even if your SIM card is swapped, if your Binance account primarily relies on Google Authenticator or a hardware security key for 2FA, attackers still cannot breach your account defenses.
Recommended verification method priority:
- Hardware security key (YubiKey, etc.) -- Most secure
- Google Authenticator -- Recommended
- Passkey -- Newer but secure
- SMS verification -- Use only as a supplement
Strategy 2: Protect Your Personal Information
Reduce the channels through which attackers can collect your personal information:
- Do not publicly share your phone number on social media
- Do not publicly share ID card information or photos on social media
- Handle documents containing personal information carefully (such as courier labels)
- Do not enter your phone number on untrustworthy websites
Strategy 3: Strengthen Carrier Account Security
Contact your mobile carrier and take the following measures:
- Set an additional verification password for SIM card operations (some carriers support this)
- Request a note be added to your account requiring all SIM card operations to be handled in person at a designated carrier store
- Disable online self-service functions for your phone number (if not frequently used)
- Periodically review the services enabled on your phone number and remove unnecessary value-added services
Technical Protection Measures
On the Binance side:
- Set Google Authenticator as your primary 2FA method.
- Enable all available security features (withdrawal address whitelist, anti-phishing code, etc.).
- In security settings, if you can choose verification method priority, set Google Authenticator as the highest priority.
On the phone side:
- Set a PIN code for your SIM card. The SIM card PIN code is required each time the phone restarts or the SIM card is reinserted. Even if an attacker obtains your SIM card, they cannot use it without knowing the PIN code.
- Enable the "SIM card lock" feature on your phone.
SIM card PIN code setup method:
- iOS: Settings, Cellular, SIM PIN, enable and set PIN code
- Android: Settings, Security, More Security Settings, SIM Card Lock, Lock SIM Card
The default PIN code is usually 1234 or 0000. When setting up for the first time, you need to enter the default PIN code, then set your own. Note: Entering the wrong PIN code 3 consecutive times will lock the SIM card, requiring a PUK code to unlock.
Use the Binance app for a more secure verification experience: Android APK download
Monitoring and Early Warning
Set up signal loss alerts: If your phone suddenly loses signal (in a location where it normally has signal), this could be a sign that your SIM card has been swapped. Do not simply assume it is a network issue -- immediately check:
- Try calling your own phone number to see if someone answers
- Use WiFi to check your email and Binance account
- Contact your carrier to confirm SIM card status
Set up multi-channel notifications: Ensure Binance security notifications are delivered through multiple channels (email, app push notifications), not just SMS. This way, even if your SIM card is swapped, you can still receive security alerts through other channels.
Emergency Response After SIM Card Is Swapped
If you confirm or strongly suspect your SIM card has been swapped:
Immediate Actions
-
Contact your carrier: Immediately call the carrier's customer service hotline (using someone else's phone), report the illegal SIM transfer, and request an immediate freeze on the number.
- China Mobile: 10086
- China Unicom: 10010
- China Telecom: 10000
-
Freeze your Binance account: Freeze your account via the Binance app (using WiFi) or web version. If you cannot log into the app, send an email to Binance's official customer support email.
-
Change your associated email password: Immediately change the password of the email used to register your Binance account.
-
Check account status: Check your Binance account for abnormal operations through other devices and methods (such as WiFi + computer).
Follow-Up Actions
- Visit a carrier store in person to replace the SIM card and restore your phone number.
- After your phone number is restored, comprehensively check the security status of all associated accounts.
- Change the passwords for all accounts that use this phone number as a verification method.
- File a report with the police.
- After confirming account security on Binance, apply to unfreeze.
Security Alternatives to Phone Verification
Virtual Carrier Numbers
Using a virtual carrier number (such as an Alibaba virtual number, Google Voice, etc.) as the verification number for your crypto accounts can reduce SIM swap risk to some extent, as the replacement process for virtual numbers differs from physical SIM cards.
However, this method has limitations:
- The security of the virtual number depends on the security of its linked primary account
- Some platforms may not support virtual carrier numbers
Dedicated Security Phone
Prepare a dedicated phone for crypto-related operations:
- This phone is used only for cryptocurrency-related verification operations
- Do not install social media and other unnecessary apps
- The phone number is not disclosed publicly
- The phone can be powered off and stored in a secure location when not in use
Frequently Asked Questions
Q1: Is the SIM swap risk significant for mainland China users?
A: Compared to countries like the United States, China's real-name registration and facial recognition requirements make SIM swaps more difficult. However, the risk is not zero, especially considering internal employee risks and the possibility of forged documents. For users holding large amounts of crypto assets, serious prevention is still worthwhile.
Q2: If I have enabled Google Authenticator, can a SIM swap still breach my account?
A: If your Google Authenticator is still functioning normally, a simple SIM swap alone cannot break through Google Authenticator's protection. This is why it is strongly recommended to use Google Authenticator rather than SMS as your primary 2FA method.
Q3: What are the risks of setting a SIM card PIN code?
A: The main risk is forgetting the PIN code. Entering the wrong code 3 consecutive times will lock the SIM card. You will then need a PUK code to unlock it. The PUK code can be obtained from your carrier. However, if the PUK code is entered incorrectly 10 times, the SIM card will be permanently locked. It is recommended to record your PIN code and PUK code in a secure location.
Q4: Is eSIM more secure than a physical SIM card?
A: eSIM is more secure in some aspects (the SIM card cannot be physically stolen), but may be more vulnerable to remote attacks in other aspects (attackers may remotely transfer the eSIM configuration through the carrier account). Overall, each has its pros and cons, and the most important thing is not to rely entirely on SMS verification.
Summary
SIM swap attacks are highly targeted and severely damaging security threats. The core prevention strategy is to reduce dependence on SMS verification -- use Google Authenticator or a hardware security key as your primary two-factor authentication method. Additionally, strengthening personal information protection, setting SIM card PIN codes, and communicating with your carrier to enhance SIM card management security can further reduce risk. In the field of crypto asset security, staying informed about and guarding against every type of attack is the only way to truly protect your digital assets.