Your cell phone number is valuable to a hacker, especially for a cyberattack known as a port-out scam. Here’s how they work and how you can protect yourself.
The bad news: Our phone numbers are out in the world—tied to various accounts and apps—and bad actors have ways of getting their hands on them. The good news: When someone asks for your phone number at a bar, you have another legitimate reason to decline. (Simply not wanting to is also a legitimate reason.)
Though our phone numbers seem like an innocuous piece of information about us, they can be dangerous when in the wrong hands. Here’s what hackers can do with your number, how they find it, and what you can do to stop them.
When you create a profile for a new social app, you’re often asked to provide a phone number—think: Clubhouse, Hinge, etc. Should you forget your passwords, phone numbers are also often used as a backup to access your online accounts, including your email. Various online purchases require a phone number, and many of us use our phone numbers for multifactor authentication.
So how does your phone number end up in the wrong hands?
Unfortunately, just telling a hacker they can’t have your phone number isn’t an option. Here are two ways one might siphon your info, one more likely these days than the other:
Little did we know those spam calls telling us our car was past its warranty were just the beginning. There are actually more damaging things a hacker can do with your cell phone number, including:
Also known as “porting,” this is when a hacker transfers your number to a new carrier. Using phishing or other methods, a bad actor gains enough personal information on you that they can contact your cell phone provider and “port out” your number to their own SIM card, then proceed to make calls and text as if they’re you, including taking over the accounts where you use your phone number as a backup for password resets.
More elaborate and less common, if a hacker has the right technology, they can scan your SIM card’s ID number if it’s nearby. Most phones have built-in security to prevent this, so the attacker would likely need a physical SIM card to pull this off.
As Hackernoon put it, with your phone number, a hacker becomes you. They can now:
Cyberattackers and port-out scams may be clever, but it’s possible to stay a step ahead. Here are ways to protect your number and your identity: