How To Reverse Phone Cloning & SIM Swap Attacks - WikiHow

Skip to ContentQuizzes
  • Home
  • Random
  • Browse Articles
  • Quizzes & Games
  • All QuizzesHot
  • Love Quizzes
  • Personality Quizzes
  • Fun Games
  • Dating Simulator
  • Learn Something New
  • Forums
  • Courses
  • Happiness Hub
  • Explore More
  • Support wikiHow
  • About wikiHow
  • Log in / Sign up
Terms of Use wikiHow is where trusted research and expert knowledge come together. Learn why people trust wikiHow What To Do If Your Phone or SIM Card is Cloned PDF download Download Article Co-authored by Nicole Levine, MFA Reviewed by Luigi Oppido

Last Updated: May 9, 2025 Fact Checked

PDF download Download Article
  • Signs Your Phone or SIM is Cloned
  • |
  • How to Unclone Your Phone
  • |
  • Types of Phone Cloning & Attacks
  • |
  • Prevent Phone Cloning
|Show more |Show less X

This article was reviewed by Luigi Oppido and by wikiHow staff writer, Nicole Levine, MFA. Luigi Oppido is the Owner and Operator of Pleasure Point Computers in Santa Cruz, California. Luigi has over 25 years of experience in general computer repair, data recovery, virus removal, and upgrades. He is also the host of the Computer Man Show! broadcasted on KSQD covering central California for over 7 years. There are 8 references cited in this article, which can be found at the bottom of the page. This article has been fact-checked, ensuring the accuracy of any cited facts and confirming the authority of its sources. This article has been viewed 219,011 times.

Were you the target of a phone number cloning or SIM swapping scam? You're not alone—phone cloning and other violating forms of phone hacking is far too common. But don't worry—we're here to help you regain control of your phone. This wikiHow article will show you signs that your phone or SIM card is cloned, help you reverse the damage, and teach you how to stay safe from the most common forms of cellular fraud.

Reversing a Phone Cloning

  • Contact your mobile carrier to report your phone being cloned. Ask them to disconnect your current phone number and SIM card and do a factory reset of your phone.
  • Change all of your passwords and check your phone bill and bank account for any unauthorized charges.
  • Report the phone cloning to your local police department and the federal fraud bureau, and place a fraud alert with Experian, TransUnion, or Equifax.

Steps

Section 1 of 4:

Signs Your Phone or SIM is Cloned

PDF download Download Article
  1. Step 1 You suddenly can't use your phone. 1 You suddenly can't use your phone. If someone cloned your SIM card or swapped it to their own phone, you often won't be able to make or receive calls or texts (other than calling 911 or SOS) because the hacker has control of your phone number.
  2. Step 2 Your phone appears to be somewhere else. 2 Your phone appears to be somewhere else. If you've set up Find My iPhone on your iPhone or Find My Device on your Android, your phone might be showing up in a very different location.
    • You can check the location of your phone using a web browser on any computer:
      • Android: https://www.google.com/android/find
      • iPhone: https://www.icloud.com/find
    Advertisement
  3. Step 3 You see unauthorized calls or activity on your phone bill. 3 You see unauthorized calls or activity on your phone bill. If someone cloned your phone number or SIM card, they could be using your phone number to make calls and run up your phone bill in the process.[1]
  4. Step 4 Your provider contacts you about recent changes. 4 Your provider contacts you about recent changes. If someone conned your carrier into porting your number to a different SIM card, you might receive an email or text confirmation that says your SIM was updated. They may also contact you to ask if you've been traveling abroad.
  5. Step 5 You received a text asking you to restart your phone. 5 You received a text asking you to restart your phone. This might happen if someone cloned your SIM card—once your device is off, the hacker would be able to steal your phone number.
  6. Step 6 Your voicemails are disappearing. 6 Your voicemails are disappearing. If you knew you had voicemail but the messages are no longer available, someone else might be checking your voicemail.
  7. Advertisement
Section 2 of 4:

How to Unclone Your Phone

PDF download Download Article
  1. Step 1 Contact your mobile carrier. 1 Contact your mobile carrier. Before you do anything else, contact your mobile phone provider to report that your phone number is compromised.[2] Let them know what happened, and ask them to immediately disconnect your current phone number and SIM card and issue you a new one.
  2. Step 2 Change your passwords. 2 Change your passwords. Don't use your cloned phone to do this, just in case there's spyware on your phone. Log in to your computer, and reset the passwords for your bank, Apple ID, Google account, email address, and social media services.
  3. Step 3 Check your phone... 3 Check your phone bill and bank account for unauthorized charges. If someone cloned your phone number and/or SIM card, they may have been able to run up your phone bill or make purchases with your account information. Contact the fraud department at your bank or phone company to dispute unauthorized charges as soon as possible.[3]
  4. Step 4 File a police report. 4 File a police report. Contact your local police department to file an official report. Not only does this prompt an investigation, but your bank or mobile phone provider might need a police report to refund you for unauthorized charges.[4]
  5. Step 5 Place a fraud alert on one of the three major credit reporting bureaus. 5 Place a fraud alert on one of the three major credit reporting bureaus. If you believe someone might have access to your personal information, create a fraud alert with Experian, TransUnion, or Equifax to make it more difficult for anyone to open new accounts in your name.[5]
  6. Step 6 Report identity theft to your federal fraud bureau. 6 Report identity theft to your federal fraud bureau. If your country has an official identity theft and fraud department, you can report the incident by phone or on the web. Some nations that have official reporting bureaus:
    • Australia & New Zealand: Visit https://www.idcare.org or call ID Care at 1800 595 160 (Australia) / 0800 121 068 (New Zealand).
    • Canada: Report online at https://antifraudcentre-centreantifraude.ca/ or by phone at 1-888-495-8501.
    • UK: Visit https://www.actionfraud.police.uk/ or call 0300 123 2040. If abroad, dial +44 300 123 2040.
    • United States: File a report online at https://www.identitytheft.gov or call 1-877-438-4338.
  7. Step 7 Do a factory reset of your phone. 7 Do a factory reset of your phone. Whether you have an iPhone or Android phone, you'll want to erase everything on your phone and restore it to its original factory settings in case the perpetrator installed spyware on your phone. Once you do this, you can place your new SIM card into the phone and set it up as new.
  8. Advertisement
Section 3 of 4:

Types of Phone Cloning & Attacks

PDF download Download Article
  1. Step 1 SIM swapping. 1 SIM swapping. SIM swapping, also known as SIM jacking, occurs when an unauthorized person convinces your mobile carrier's support team to transfer your phone number to their phone and SIM card.[6] This disconnects your phone number from your own phone and allows the hacker to receive your phone calls and text messages, as well as make calls and send texts as you.
    • If a hacker successfully gets a hold of your phone number, they can then reset your passwords and access any of your accounts that require two-factor authentication, including your online banking service.
  2. Step 2 SIM cloning. 2 SIM cloning. The goal of SIM cloning is mostly the same as SIM swapping (gaining control of your phone number and accounts) but requires the hacker to have physical access to your phone. If the hacker can remove your SIM card, they don't have to contact your carrier to gain control of your phone number—they can just insert your SIM card into a card reader that makes an exact clone.[7] What happens next depends on the hacker's motives:
    • The hacker can put the cloned SIM into their own phone, restart your phone, and then take control of your phone number the moment your phone turns off. The hacker can then receive your phone calls and texts, just as they would with a SIM swap.
    • The hacker also has access to all data on the card, including your call history and saved contacts (if you save this information to your SIM card).
    • Depending on the software the hacker is using, they may skip stealing your phone number and instead use the cloned SIM to spy on your future text messages, voice calls, and location without you knowing.
  3. Step 3 Spyware monitoring apps. 3 Spyware monitoring apps. If a hacker installs spyware on your phone, they can use it to monitor everything you do. Hackers can trick you into installing spyware on your own phone in many ways, including by getting a hold of your phone when you're not looking, contacting you pretending to be technical support, or by sending you a phishing text or email that tricks you into sharing your password.[8]
  4. Step 4 Phone cloning. 4 Phone cloning. The purpose of phone cloning is usually to commit fraud from your phone number, whether it be to make free phone calls or cover their own tracks to commit crimes. Hackers can clone phones without hacking into them or gaining physical access—they'll just need to be close enough to the phone to use a radio wave monitoring device that can intercept its ESN and MIN number.
    • Now that most cell phone providers run on digital networks, it's much more difficult for people to clone phones than it used to be.
  5. Advertisement
Section 4 of 4:

Prevent Phone Cloning

PDF download Download Article
  1. Step 1 Set up a PIN with your mobile phone provider. 1 Set up a PIN with your mobile phone provider. When you set up a difficult-to-guess verbal PIN with your provider, you'll be required to say or enter the PIN each time you call for assistance. This can prevent someone who doesn't know your PIN from gaining access to your account over the phone.[9]
    • Don't use a password like your birthdate, social security number, or address. This information often appears in data breaches and is easy to guess.
  2. Step 2 Keep your phone's IMEI private. 2 Keep your phone's IMEI private. Be skeptical of services that asks you to enter your IMEI number through a web form—if someone has your IMEI, they might be able to use that information to convince your provider to give them your phone number.
  3. Step 3 Watch out for phishing attempts and scams. 3 Watch out for phishing attempts and scams. People can gain access to your phone by tricking you into divulging personal information over the phone, via text or email, or by getting you to sign in to fake websites with your account information. Avoid clicking suspicious links or giving personal information to people who contact you randomly—they might not be who they say they are.[10]
  4. Step 4 Set up two-factor authentication using an app, not SMS. 4 Set up two-factor authentication using an app, not SMS. If you use two-factor authentication when signing into your accounts (and you should), opt to use an authentication app like Google Authenticator, Authy, Duo, or Microsoft Authenticator instead of receiving a code via SMS.[11]
  5. Step 5 Put a password on your SIM card. 5 Put a password on your SIM card. Whether you're using an Android or iPhone, you can add a password to your SIM card that makes it more difficult for people to clone your SIM card, even if they have physical access to your phone.[12]
  6. Advertisement

Expert Q&A

Search Add New Question Ask a Question 200 characters left Include your email address to get a message when this question is answered. Submit Advertisement

Tips

Submit a Tip All tip submissions are carefully reviewed before being published Name Please provide your name and last initial Submit Thanks for submitting a tip for review!

You Might Also Like

Tell if Your iPhone Is HackedIs Your iPhone Hacked? How to Tell and What to Do Block a Stolen PhoneHow toBlock a Stolen Phone Remove a Hacker from Your iPhoneIs Your iPhone Hacked? Here's What to Do About It Untap Your PhoneGet Rid of Hackers on Your Phone & Protect Yourself Online Tell if Someone Is Accessing Your iPhone Remotely10 Signs Your iPhone is Being Accessed Remotely & How to Fix It Can Someone Hack My iPhoneCan Someone Hack Your iPhone? Signs, Fixes, & Safety Tips Can Someone Hack Your Zelle with Your Phone NumberHow Someone Can Hack Zelle with Your Phone Number & Other Scams Snapchat HackedHow to Tell If Your Snapchat Has Been Hacked and What to Do Fix a Hacked Android PhoneHow toFix a Hacked Android Phone Protect a Mobile Phone from Being StolenHow toProtect a Mobile Phone from Being Stolen Recover a Hacked Yahoo AccountYahoo Account Hacked? Here’s What to Do Stop Someone from Mirroring Your PhoneWhat to Do If Someone Is Mirroring Your Phone Report HackersHow toReport Hackers Scam Likely"Scam Likely" on Caller ID: Meaning, Safety Tips, and More Advertisement

References

  1. https://www.fcc.gov/consumers/guides/cell-phone-fraud
  2. https://www.acma.gov.au/what-do-if-your-mobile-number-has-been-stolen
  3. https://www.identitytheft.gov/Steps
  4. https://www.fcc.gov/consumers/guides/cell-phone-fraud
  5. https://www.identitytheft.gov/Steps
  6. https://www.fcc.gov/consumers/guides/cell-phone-fraud
  7. https://www.fcc.gov/consumers/guides/cell-phone-fraud
  8. https://consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams
  9. https://www.fcc.gov/port-out-fraud-targets-your-private-accounts
More References (3)
  1. https://www.fbi.gov/how-we-can-help-you/scams-and-safety/common-frauds-and-scams/spoofing-and-phishing
  2. https://support.google.com/accounts/answer/185839
  3. https://support.apple.com/en-us/118228

About This Article

Luigi Oppido Reviewed by: Luigi Oppido Computer & Tech Specialist This article was reviewed by Luigi Oppido and by wikiHow staff writer, Nicole Levine, MFA. Luigi Oppido is the Owner and Operator of Pleasure Point Computers in Santa Cruz, California. Luigi has over 25 years of experience in general computer repair, data recovery, virus removal, and upgrades. He is also the host of the Computer Man Show! broadcasted on KSQD covering central California for over 7 years. This article has been viewed 219,011 times. How helpful is this? Co-authors: 6 Updated: May 9, 2025 Views: 219,011 Categories: Cell Phone Maintenance In other languages Spanish Czech Japanese
  • Print
  • Send fan mail to authors
Thanks to all authors for creating a page that has been read 219,011 times.

Is this article up to date?

Yes No Advertisement Cookies make wikiHow better. By continuing to use our site, you agree to our cookie policy. Luigi Oppido Reviewed by: Luigi Oppido Computer & Tech Specialist Click a star to vote Co-authors: 6 Updated: May 9, 2025 Views: 219,011

Quizzes & Games

Scam DetectorScam DetectorAnalyzeAm I Being Gaslighted QuizAm I Being Gaslighted QuizTake QuizEmotional Abuse TestEmotional Abuse TestTake QuizWhat's Your Red Flag QuizWhat's Your Red Flag QuizTake QuizImposter Syndrome TestImposter Syndrome TestTake QuizApology Language QuizApology Language QuizTake Quiz

You Might Also Like

Tell if Your iPhone Is HackedIs Your iPhone Hacked? How to Tell and What to DoBlock a Stolen PhoneHow toBlock a Stolen PhoneRemove a Hacker from Your iPhoneIs Your iPhone Hacked? Here's What to Do About ItUntap Your PhoneGet Rid of Hackers on Your Phone & Protect Yourself Online

Featured Articles

What 16 of the Most Common Hugs MeanWhat 16 of the Most Common Hugs MeanJuicy, Deep, & Hot-Seat Questions to Get to Know Your Friends BetterJuicy, Deep, & Hot-Seat Questions to Get to Know Your Friends Better40+ Talking Games to Play with Friends, Partners & More40+ Talking Games to Play with Friends, Partners & MoreMake FriendsHow toMake Friends

Trending Articles

What JJK Character Am I QuizWhat JJK Character Am I QuizWhat Emojis Mean Sex?What Emojis Mean Sex?What Pokémon Am I QuizWhat Pokémon Am I QuizDo I Have Brainrot QuizDo I Have Brainrot QuizSigns a Woman is Sexually Attracted to YouSigns a Woman is Sexually Attracted to YouDo You Agree with These Hygiene Hot Takes?Do You Agree with These Hygiene Hot Takes?

Featured Articles

The Different Types of People You Can Find in a Friend GroupThe Different Types of People You Can Find in a Friend GroupAn Introduction to Kibbe Body Types (with Styling Tips!)An Introduction to Kibbe Body Types (with Styling Tips!)Being the Little Spoon While Cuddling: Is It Better Than the Big Spoon?Being the Little Spoon While Cuddling: Is It Better Than the Big Spoon?From Alpha to Omega: A Guide to the 7 Male PersonalitiesFrom Alpha to Omega: A Guide to the 7 Male Personalities

Featured Articles

7 Easy Card Magic Tricks You Can Master in Minutes7 Easy Card Magic Tricks You Can Master in Minutes Perform Magic: 8 Tricks for BeginnersHow to Perform Magic: 8 Tricks for BeginnersHypnotize SomeoneHow toHypnotize SomeoneThe Easiest Guinness World Records to Break: Which Will You Try?The Easiest Guinness World Records to Break: Which Will You Try? Solve a Rubik's Cube in 20 MovesHow to Solve a Rubik's Cube in 20 MovesWhistle with Two FingersHow toWhistle with Two Fingers

Watch Articles

Grow Out Your BangsHow toGrow Out Your BangsDress PunkHow toDress PunkEnd a Long Distance RelationshipHow toEnd a Long Distance RelationshipDo E Girl EyelinerHow toDo E Girl EyelinerRespond to the Fire EmojiHow toRespond to the Fire Emoji Stop Your Glasses from Making Your Eyes Look SmallHow to Stop Your Glasses from Making Your Eyes Look Small

Trending Articles

Do You Agree with These "Hear Me Out" Character Hot Takes?Do You Agree with These "Hear Me Out" Character Hot Takes?Introvert or Extrovert QuizIntrovert or Extrovert QuizWhat Color Am I QuizWhat Color Am I Quiz24 Different Types of Bras Explained24 Different Types of Bras ExplainedWhat Is My Animagus Form?What Is My Animagus Form?Can Your Finger Length Tell Your Personality?Can Your Finger Length Tell Your Personality?

Quizzes & Games

Am I Manipulative QuizAm I Manipulative QuizTake QuizWhich Cell Phone Plan Is Best For Me QuizWhich Cell Phone Plan Is Best For Me QuizTake QuizCan You Pass Our Lie Detector Test?Can You Pass Our Lie Detector Test?Take QuizAm I Toxic QuizAm I Toxic QuizTake QuizAm I Chronically Online QuizAm I Chronically Online QuizTake QuizWould I Be a Good Super Spy QuizWould I Be a Good Super Spy QuizTake Quiz wikiHow
  • Categories
  • Computers and Electronics
  • Telephones
  • Cell Phones
  • Cell Phone Maintenance
wikiHow Newsletter You're all set! Helpful how-tos delivered toyour inbox every week! Sign me up! By signing up you are agreeing to receive emails according to our privacy policy.
  • Home
  • About wikiHow
  • Experts
  • Jobs
  • Contact Us
  • Site Map
  • Terms of Use
  • Privacy Policy
  • Do Not Sell or Share My Info
  • Not Selling Info
  • Contribute

Follow Us

×

wikiHow Tech Help Pro:

Level up your tech skills and stay ahead of the curve

Let's go! X --655

Tag » How To Unclone A Sim Card