We have decided to explain a bit more about SimSwap and how you can SimSwap.

The joke that someone needs to have a mobile phone “surgically removed” is not too far from the mark. Mobile phones have become ubiquitous and intrinsically linked to people’s digital identities.

This connection to online life has made the mobile device a target for many types of cybercrime exploits. One of those exploits is known as SIM swapping.

Mobile devices offer a great way to connect a user to an account via out-of-band authentication, e.g., SMS text PIN. But the same ubiquitous nature of mobile devices and the strong connection between the device and personal online accounts and data make them a target for hustlers like us.


SIMswap can result in a large financial payout for the hustlers. The activity has many faces, but all revolve around the takeover of our victim’s mobile device. From there, the device is used by us for purposes of extortion, data theft, and bank account takeover.

The opportunity of swapping SIM cards ultimately stems from poor levels of identity verification by the mobile operator. SIM swapping is a form of social engineering as it relies on certain criteria for success:


First of all, you will need to work on selecting the right target because this will make all the difference in you getting a payout VS all your effort going down the drain. Your ideal target should have a specific profile, such as the crypto investors, individuals with an attractive bank balance.


Once your target is selected as described above then it’s important for you to have all the details of the identity of your target such as:

  • Phone Number (obvious)
  • Phone Carrier
  • Full Name
  • Date of Birth
  • Primary Email
  • Primary Address

You have to have the above info, the best way to go about it is to get the sim with the same mobile carrier as your victim, lets say your victim is with AT&T get a sim with AT&T and then do a simswap on yourself so this will tell you all the information you will need to do this job successfully.


Once you have all the information then you need to grow a pair and calls the operator using the target’s identity claims, such as name, address, and so on to convince the operator to move and activate the existing phone number to a SIM card number of your choice.


You now control your target’s phone number and ready to make your money! Let’s log into their crypto and bank account to transfer funds into yours!

SIDE NOTE: Once you have control over your victim’s phone number, you will receive all of the communications that the phone normally receives including SMS texts and voicemails. This will give you access to SMS PIN second-factor authentication (2FA) and potentially sensitive information from callers. Once you have this level of detail about a person’s identity, as well as potentially their second factor for logging into accounts (including some financial institution accounts), then you can start your work as soon as conveniently possible. DO NOT FORGET that your victim WILL receive a switch over text from the carrier notifying them of the switch!


If you don’t already have your target’s information then phishing emails can be used to steal their operator login credentials.

Furthermore, malware can then also installed giving you remote access to the operator’s system and any SIM card data and process.

There is rarely, if ever, a “silver bullet” when it comes to security. Usually, you have to use a multi-pronged approach to committing to this type of work. Identity theft is certainly a good start to make a SIMswap process more effective:


We are going to outline some important tips for you to protect your identity as a spoofer hustler. If your plan involves email spoofing or online work being carried out then the first thing you’ll need to do is start with having a multi-hop VPN.

Once you are in control of your victim’s phone number do NOT connect that phone to your local WIFI, do NOT make phone calls to your personal contacts, remember the SIMSWAP is temporary and it’s generally a race against time as your victim might already be taking active steps to shut it down and to restore access to their number back to their cellphone so stay focus and act quickly towards your goals.

Leave a Reply

Your email address will not be published.