In recent months, SIM swapping has emerged as an increasingly present threat in Spain, according to repeated alerts from the National Police. This technique, used by cybercriminals, allows access to personal information stored on mobile phones, from bank passwords to sensitive data. With cases such as that of Melilla, where a 20-year-old young man managed to defraud nearly 72,000 euros, and other incidents reported in Valladolid and Barcelona, ??the growing sophistication of this practice is evident.
The process to duplicate a SIM card is simpler than many might think. Scammers pose as the owners of the cards, requesting duplicates from telephone operators, either online or through calls. To carry out this scam, it is crucial that fraudsters have prior access to personal data, such as the victim’s ID or card PIN.
SIM swapping, also known as SIM card duplication, is a tactic used by cybercriminals to gain unauthorized access to a person’s information. It involves impersonating the victim to request a duplicate SIM card from the telephone company. Once obtained, fraudsters can receive two-factor verification messages, allowing them to access bank accounts and perform various malicious activities.
The evolution of this technique has led scammers to refine their strategy, starting with phishing campaigns to obtain personal data before requesting a duplicate SIM card. This sophistication has generated less obvious signs for victims, such as lack of coverage in areas with good signal without apparent breakdown, difficulties connecting to known WiFi networks, SMS that are mysteriously deleted, and unauthorized sending of text messages.
In recent cases, cybercriminals have managed to access bank accounts and make purchases using the information obtained. Therefore, the National Police advises being alert for these signs, contacting the operator to deactivate the card, changing the number if necessary and filing a complaint with the authorities. Banks must also be informed so that they can take immediate action. Collaboration with security forces is vital to track cybercriminals and prevent future cases of this dangerous scam.
To protect yourself, it is recommended not to share sensitive information, properly configure privacy on social networks and use more secure authentication methods. Spotting signs like unexplained loss of coverage can help prevent this scam. In case of suspicion, it is advisable to contact the operator, change credentials and, if necessary, report to the authorities.