Identity Protection & SIM Swap · Complete Guide

Identity Theft & SIM Swap: Prevention and Recovery Guide

A complete guide to preventing and recovering from identity theft and SIM swap fraud — credit freezes, carrier PINs, dark web monitoring, and recovery steps.

ATM Fortify Security Team Payment fraud & ATM security specialists — Updated February 2026

Last Updated: February 2026

Disclaimer: If you believe you are a victim of identity theft, act immediately: contact your bank, place a credit freeze, and report to your national fraud authority. This article is for educational purposes.


Quick Definition: Identity theft is the use of your personal information — name, date of birth, address, financial account details — without your consent, typically to open fraudulent accounts, make purchases, or access your existing accounts. SIM swap fraud is a specific and growing form of identity theft that hijacks your phone number to bypass two-factor authentication.


What Is Identity Theft?

Identity theft is broader than most people assume. It is not only someone using your credit card. It encompasses any misuse of your personal information — from fraudulently applying for a mortgage in your name, to redirecting your mail, to taking over your phone number.

The defining characteristic of identity theft is that it often goes undetected for months or years. A fraudulently opened credit account may not show up on your credit file immediately, and by the time you notice, the criminal has long since extracted value and disappeared.

Prevention and early detection are therefore more valuable than reactive measures — though this guide covers both.


The Identity Theft Threat Landscape

Data Breaches

A data breach occurs when personal data held by an organisation is accessed or exfiltrated without authorisation. Breaches expose emails, passwords, names, addresses, dates of birth, and in some cases financial details or national identification numbers to criminal markets.

The practical impact for you: Data from breaches ends up in "combo lists" that criminals use for credential stuffing, targeted phishing, and identity verification attacks. You cannot control whether an organisation you use is breached — but you can limit the damage by using unique passwords, monitoring your credit, and enabling fraud alerts.

Phishing and Social Engineering

A significant portion of identity theft begins with phishing — a fraudulent communication that tricks you into providing personal information or credentials. Targeted phishing using your real name, employer, and partial account details is increasingly common.

Bank Phishing Emails: How to Spot a Fake and What to Do and Social Engineering & Banking Scams: How to Spot and Stop Them

Mail Theft

Mail theft is a low-tech but effective identity theft vector. Bank statements, credit card offers, HMRC/IRS correspondence, and utility bills contain enough information to impersonate you with financial institutions.

Pre-approved credit offers are particularly valuable to mail thieves — an offer addressed to you can be completed and returned with a change of address.

Consumer Fraud Response Checklist: Card or Account Compromised

SIM Swap Fraud

SIM swap fraud — also called SIM hijacking or port-out fraud — is the takeover of your phone number by transferring it to a SIM card the criminal controls. With your phone number, they receive:

  • SMS one-time passwords for banking and other accounts
  • Password reset codes
  • Account verification messages

This makes SIM swap the key that unlocks SMS-based two-factor authentication — turning a relatively strong security control into a liability.


SIM Swap Fraud: A Closer Look

How It Happens (High-Level)

A SIM swap is initiated through your mobile carrier — either through their customer service channel or their online portal. The criminal convinces your carrier that they are you and requests that your number be transferred to a new SIM they control.

What enables it: Mobile carriers verify identity through a combination of account details (name, address, account number, partial date of birth) and sometimes a security PIN. Criminals obtain account details through phishing, data breaches, or social engineering other sources to build a convincing case.

In some cases, criminals may also target carrier employees directly through bribery or social engineering.

Warning Signs Your Number Has Been Swapped

  • Your phone suddenly loses signal and shows "No service" or "SOS only"
  • You stop receiving calls and texts
  • You receive an unexpected message from your carrier about a SIM change you did not initiate
  • You cannot log into your banking, email, or other accounts — because OTPs are going to the criminal
  • You receive alerts from your carrier about account activity you did not authorise

What to Do Immediately if Swapped

  1. Call your mobile carrier from a different phone or landline — immediately
  2. Tell them you believe your number has been hijacked — request an emergency lock on your account
  3. Once your number is restored, change passwords on your email, banking, and all accounts using that number for 2FA
  4. Contact your bank — an in-progress account takeover may already be underway
  5. File a report with your national fraud authority

SIM Swap Fraud Explained: What It Is and How to Stop It


Common Myths About Identity Theft

MythReality
"I don't have anything worth stealing."Identity thieves are often not after your current assets — they want to create fraudulent ones in your name. A good credit history is valuable.
"I'll know immediately if my identity is stolen."Identity theft often goes undetected for months or years, particularly when new fraudulent accounts are opened.
"Only people who shop online get their identity stolen."Offline sources — mail theft, overheard conversations, discarded documents — still fuel a significant proportion of identity theft.
"A credit freeze is too complicated or damages my credit score."Credit freezes are free, do not affect your credit score, and can be lifted temporarily when you genuinely apply for credit.
"My data was already breached — there's nothing I can do."Post-breach actions (new passwords, fraud alerts, credit monitoring) significantly reduce downstream impact.
"Using a credit card instead of a debit card protects against identity theft."Credit cards have better fraud protection for transactions — but identity theft goes beyond card transactions.

Warning Signs You May Be a Victim

Financial signals:

  • Accounts or credit products appearing on your credit report that you did not open
  • Debt collection letters for debts you do not recognise
  • Bills for services you have not used
  • Credit applications declined despite good history — there may be fraudulent accounts damaging your score
  • Unfamiliar transactions in your accounts

Non-financial signals:

  • Mail you were expecting does not arrive (could indicate mail forwarding fraud)
  • Tax authority writes to you about income you did not earn (could indicate someone using your identity for employment)
  • You receive a notice about benefits you did not apply for
  • Medical providers bill you for services you did not receive (medical identity theft)
  • You cannot log into an account because the email address has been changed

If you see these signs: Do not wait. Act immediately — the steps below apply.


Identity Theft Prevention Checklist

Your personal information:

  • ✅ Use strong, unique passwords for all accounts — especially banking and email Online Banking Security: How to Protect Your Accounts
  • ✅ Enable two-factor authentication on email, banking, and any account that offers it
  • ✅ Shred financial documents, pre-approved offers, and anything with your full name and address before disposal
  • ✅ Opt for paperless statements to reduce mail-based risk
  • ✅ Do not carry your national insurance/social security card in your wallet

Monitoring:

  • ✅ Check your credit report at least once per year — in the UK via statutory free reports; in the US via annualcreditreport.com
  • ✅ Consider a credit monitoring service — particularly after a data breach notification
  • ✅ Enable banking transaction alerts Online Banking Security: How to Protect Your Accounts
  • ✅ Check whether your email appears in known breach databases (haveibeenpwned.com is a free resource)

Online hygiene:

  • ✅ Use a password manager for unique, complex credentials
  • ✅ Be thoughtful about what personal information you share on social media — date of birth, hometown, mother's maiden name are common security question answers
  • ✅ Be cautious about phishing and social engineering attempts Social Engineering & Banking Scams: How to Spot and Stop Them

Credit Freezes and Fraud Alerts

Credit Freeze

A credit freeze (also called a security freeze) prevents lenders from accessing your credit report to process new credit applications. It does not affect your existing accounts, and your credit score is unaffected. It is free to place and lift.

When to freeze: After a data breach, after a lost or stolen wallet, or as a proactive permanent measure if you are not actively applying for credit.

How to freeze: You must contact each major credit bureau separately. How to Place a Credit Freeze: A Step-by-Step Guide provides a step-by-step guide.

When applying for credit: You can temporarily unfreeze for the period of your application, then re-freeze. This takes minutes online.

Fraud Alert

A fraud alert is less restrictive than a freeze. It flags your file and instructs lenders to take additional steps to verify identity before extending credit. Initial fraud alerts typically last 1 year; extended alerts (for confirmed identity theft victims) last 7 years in the US.

ToolEffectDurationBest For
Fraud AlertFlags file for extra verification1 year (initial)Suspected risk; pre-emptive
Extended Fraud AlertStricter verification required7 yearsConfirmed identity theft victim
Credit FreezeBlocks all new credit accessIndefinite until liftedStrongest protection; not actively applying

Carrier PINs and SIM Swap Defences

Setting a carrier account PIN or password is the single most effective individual defence against SIM swap fraud. It adds a verification step that must be completed before any changes can be made to your account — including SIM transfers.

How to set one: Contact your mobile carrier and request a "port-out PIN," "account PIN," or "SIM swap PIN" — the terminology varies by carrier. Identity Theft & SIM Swap: Prevention and Recovery Guide has a guide for major carriers.

Additional defences:

  • Where available, enable "number lock" or "line freeze" on your carrier account — this prevents any port requests without additional in-person verification
  • Consider whether your banking 2FA relies on SMS — if it does, upgrading to an authenticator app removes SIM swap as a relevant attack vector

What Criminals Try and How to Disrupt It

ApproachDisruption
Data breach credentials used for account accessUnique passwords per account; password manager
Phishing to harvest personal dataRecognise and report phishing; do not click unexpected links
Mail theft for account dataOpt for paperless; shred sensitive documents; use a locked or PO box
SIM swap to bypass 2FACarrier PIN; authenticator app instead of SMS 2FA
New credit accounts opened in your nameCredit freeze; regular credit report checks
Child or elderly relative's identity usedMonitor their credit; consider freezes for non-active credit users

If You're a Victim — Recovery Steps

Immediate (within 24 hours):

  1. Contact your bank and all financial institutions — freeze accounts, report fraud
  2. Place a fraud alert or credit freeze at major credit bureaus
  3. Change passwords on all compromised accounts — from a clean device
  4. Contact your mobile carrier if SIM swap is involved — restore your number
  5. File a report with your national fraud authority Payment Fraud Incident Response: A Step-by-Step Guide

Short term (within 1 week):

  1. Request a copy of your credit report from all bureaus and identify all fraudulent accounts
  2. Contact each lender or company where fraudulent accounts were opened — ask for their fraud investigation process
  3. Document everything — dates, reference numbers, names of representatives spoken to

Ongoing:

  1. Continue monitoring your credit and bank accounts
  2. Follow up with lenders until fraudulent accounts are fully closed and removed from your credit file
  3. Consider an extended fraud alert if confirmed as an identity theft victim

Payment Fraud Incident Response: A Step-by-Step Guide Consumer Fraud Response Checklist: Card or Account Compromised


Frequently Asked Questions

Q: How do I know if my identity has already been stolen? A: Check your credit report for accounts you didn't open. Check haveibeenpwned.com for email breaches. Look for warning signs listed above. Many people discover identity theft through a declined credit application or an unexpected debt collection letter.

Q: Does a credit freeze hurt my credit score? A: No. A credit freeze does not affect your credit score in any way. It only prevents new lenders from accessing your report to process applications.

Q: How long does it take to recover from identity theft? A: Recovery time varies significantly depending on how much was done in your name and how quickly it was detected. Some cases resolve in weeks with active effort; complex cases involving multiple fraudulent accounts and employment records can take months or longer.

Q: Can someone steal my identity with just my name and address? A: Your name and address alone have limited utility but contribute to a broader profile. With name, address, date of birth, and national ID number, criminals can impersonate you to financial institutions. Protecting all of these — not just obvious financial data — matters.

Q: My child received a credit card offer in the mail. Could their identity already be in use? A: It is possible but not conclusive — pre-approved offers are sometimes sent to minors. Check your child's credit report. In the US, you can request a manual check by contacting the major bureaus. If a credit file exists in your minor child's name, it may indicate identity theft.

Q: What is the difference between identity theft and account takeover? A: Account takeover is access to an existing account. Identity theft often involves creating new fraudulent accounts or commitments. Both may occur together — an account takeover can provide data for subsequent identity theft.


Additional Resources


CTA

Identity theft and SIM swap fraud can be prevented with the right controls.

For organisations managing customer security, speak to our team about fraud prevention solutions.


Last Updated: February 2026

If you are a victim of identity theft, act immediately. This article is for educational purposes.

Need Professional ATM Security Support?

ATM Fortify provides anti-skimming hardware, security assessments, and fraud prevention consulting for ATM operators and financial institutions across 30+ countries.

Request a Security Assessment Explore Services