What is Sim Cloning?
SIM cloning replicates the identity of a mobile SIM to a second card or emulator. This allows an attacker to receive calls and SMS intended for the victim. All of a sudden OTPs are showing up on a different phone, and recovery flows are now a red carpet. The user still has signal and nothing seems amiss until accounts start switching hands.
Defense starts with not relying on SMS alone. Use phishing‑resistant methods by default for actions that are worth stealing, be aware of SIM changes, and delay high‑risk events after a carrier update. Consider a new device plus recent SIM activity as a high‑risk pairing that can be treated as an earned step‑up.