Links to non-Sierra Central websites are provided solely as pointers to information that may be useful to SierraCentral.com users. Sierra Central has no control over the content on such websites.
Sierra Central makes no warranties, either express or implied, concerning the content of such linked sites, including the accuracy, completeness, reliability or suitability thereof for any particular purpose, nor does Sierra Central warrant that such site or content is free from any claims of copyright, trademark or other infringement of the rights of third parties or that such site or content is devoid of viruses or other contamination.
Sierra Central does not guarantee the authenticity of documents on the Internet. Links to non-Sierra Central sites do not imply any endorsement of or responsibility for the opinions, ideas, products, information or services offered at such sites, or any representation regarding the content at such sites. The privacy policies of Sierra Central Credit Union do not apply to linked Websites. Please consult the privacy disclosures on such sites for further information.

You rely on your mobile phone for far more than just calls and texts. It's often the gateway to your email, social media, bank accounts, and even your identity. That's why SIM swap fraud, also known as SIM hijacking, has become one of the more dangerous forms of identity theft in recent years.
Understanding how SIM swap fraud works and knowing the warning signs can help you protect yourself before serious damage is done.
SIM swap fraud occurs when a criminal takes control of your mobile phone number without your permission. Instead of stealing your phone, they manipulate your mobile carrier into transferring your number to a SIM card they control.
Once that happens your phone essentially goes dark, while the attacker receives your calls, texts, and one-time authentication codes instead.
Although it can feel alarming, SIM swap fraud usually follows a predictable pattern:
- The attacker gathers personal information: This may come from phishing emails, data breaches, social media profiles, or public records.
- They impersonate you with your mobile carrier: Using the stolen information, the attacker contacts your carrier and claims they need a new SIM card. Often saying their phone was lost or damaged.
- Your number is transferred: If the carrier is convinced, your phone number is moved to a SIM card controlled by the attacker.
- You lose service: Your phone suddenly shows "No Service," while the attacker receives your calls and text messages.
At this point, the attacker doesn't need your phone. They are your phone number.
Many online accounts still rely on SMS text messages for password resets and two-factor authentication (2FA). When an attacker controls your phone number, those security measures stop working in your favor.
With access to SMS codes, criminals can:
Because everything happens quickly, victims often don't realize what's happening until real damage has already occurred.
SIM swap fraud often provides a few warning signs. Taking action immediately can make a big difference.
Be alert if you notice:
If multiple signs appear at once, treat it as an emergency,
If your phone unexpectedly loses service and suspicious activity begins:
While no system is perfect, these steps can significantly reduce your risk.
SIM swap fraud is a reminder that convenience can sometimes come at the cost of security. By understanding how this type of fraud works and taking a few proactive steps, you can greatly reduce our risk and protect your digital life.
Stay informed and prepared is one of the strongest defenses you have.


