security

Bitcoin SIM Swap Attacks: How to Protect Your Bitcoin in 2026

SIM swap attacks have stolen millions in Bitcoin. Learn exactly how they work and the specific steps to make yourself immune — from removing SMS 2FA to carrier-level locks.

bitcoin securitysim swaptwo factor authenticationbitcoin theft preventionexchange security

SIM swap attacks have drained millions in Bitcoin from people who thought they were secure. Your phone number is the weakest link in your Bitcoin security chain — and attackers know it. Here is exactly what a SIM swap is, how it works, and the specific steps to make yourself immune.

What Is a SIM Swap Attack?

A SIM swap is when an attacker convinces your mobile carrier to transfer your phone number to a SIM card they control. Once they have your number, every SMS-based two-factor authentication code goes to them — not you. They reset your exchange password, drain your account, and disappear in minutes.

The average SIM swap takes under 10 minutes to execute. Attackers often use social engineering (calling your carrier pretending to be you), bribing carrier employees, or exploiting weak identity verification at carrier stores.

Why Bitcoin Holders Are Prime Targets

Bitcoin is irreversible. There is no dispute process, no chargebacks, no "call your bank." This makes Bitcoin holders uniquely valuable targets compared to traditional bank account holders. An attacker who SIM swaps a Coinbase user can steal $500,000 in Bitcoin in the time it takes you to notice your phone lost service.

High-profile SIM swap victims include:Michael Terpin, who lost $24 million in crypto in 2018. Joel Ortiz stole $7.5 million from crypto investors via SIM swaps. Dozens of exchange accounts are compromised this way every month.

How a SIM Swap Attack Unfolds

Step 1 — Reconnaissance: Attackers find your name, phone number, email, and carrier from data breaches, social media, or dark web databases.

Step 2 — Social engineering: They call your carrier, claim to be you, say they got a new phone, and ask to transfer your number. Many carriers have terrible identity verification — just a billing address and last 4 of your SSN is enough.

Step 3 — Takeover: Your phone shows "No Service." Their phone now receives your SMS messages.

Step 4 — Password reset: They go to your exchange, click "Forgot Password," receive the SMS code, and reset your password.

Step 5 — Drain: They withdraw everything, move funds through mixers, game over.

The Vulnerability Hierarchy

Authentication MethodSIM Swap Vulnerable?Security Level
SMS 2FAYes — codes go to attackerVery weak
Email 2FA (if email uses SMS recovery)Yes — indirectWeak
TOTP (Google Authenticator, Authy)NoGood
Hardware security key (YubiKey)NoExcellent
Passkey (biometric)NoExcellent
No 2FAN/ATerrible

The core lesson: Never use SMS for 2FA on any account connected to Bitcoin.

Step-by-Step: SIM Swap Defense

1. Remove SMS 2FA From All Crypto Accounts

Log into every exchange and wallet service you use. Find the 2FA settings. Switch from SMS to an authenticator app (Google Authenticator, Aegis on Android) or hardware key. Do this today — it takes five minutes and eliminates the primary attack vector.

Exchanges supporting hardware keys: Coinbase (YubiKey), Kraken (YubiKey), Gemini (YubiKey). Use them if you have significant balances.

2. Add a SIM Lock / Port-Out PIN to Your Carrier Account

Every major US carrier allows you to add a port-out PIN or SIM lock that requires in-person ID verification to transfer your number:

  • AT&T: Add "Extra Security" in myAT&T account settings
  • T-Mobile: Enable "Account Takeover Protection" in your account
  • Verizon: Add a port-out PIN via the My Verizon app or in-store
  • Google Fi: Enable two-step verification with a security key

After setting this, call your carrier to confirm it is active. Some carriers have bugs where online settings do not propagate correctly.

3. Switch to a Non-SMS-Recoverable Email

Your email is only as secure as its recovery method. If your Gmail account can be recovered via SMS, a SIM swap also compromises your email.

Recommended: Create a dedicated email for crypto using ProtonMail with no SMS recovery. Use a hardware key or TOTP-only recovery. Never share this email address publicly.

4. Use a Dedicated Phone Number for Crypto (or No Phone Number)

Ideal: Do not associate any phone number with your exchange accounts at all. When forced to provide one, use a Google Voice number or a burner SIM that has no connection to your identity and is never used for anything else.

5. Consider a Privacy-First Carrier

Some MVNO carriers offer better protection:

  • Efani: Security-focused carrier that claims to be "SIM swap-proof" with background checks on employees
  • Google Fi: Requires 2-step verification to port out
  • Silent Link: eSIM-only, designed for privacy

These cost more but add meaningful friction for attackers.

Exchange-Level Protections

Coinbase

  • Disable SMS 2FA — use TOTP or YubiKey
  • Enable withdrawal address whitelisting (24-48 hour delay for new addresses)
  • Set up a vault account with time-delayed withdrawals
  • Use a unique email not used anywhere else

Kraken

  • Use YubiKey or TOTP
  • Enable "Global Settings Lock" — requires email + 2FA to change any security settings
  • Set withdrawal address whitelisting

Gemini

  • Enable hardware key 2FA
  • Withdrawal address whitelisting is available on all accounts
  • Consider Gemini Custody for large balances

The Nuclear Option: Self-Custody

The ultimate SIM swap defense is removing Bitcoin from exchanges entirely. You cannot SIM swap a hardware wallet.

If you hold more than $10,000 in Bitcoin, it should be in self-custody:

With self-custody, SIM swaps become irrelevant for your primary holdings. Only funds you actively trade need to stay on exchanges.

Signs You Are Being SIM Swapped Right Now

If you notice any of these, act immediately:

  • Your phone suddenly shows "No Service" or "SOS Only"
  • You receive texts about a number transfer you did not initiate
  • You cannot make calls or receive SMS
  • You get emails about password changes you did not make

Immediate response: Call your carrier from a different phone. Ask them to lock your account and reverse any unauthorized SIM transfer. Then change all exchange passwords from a secure device.

Advanced OPSEC: What High-Net-Worth Holders Do

For Bitcoin holders with significant holdings (above $100,000), the security posture needs to be more aggressive:

Separate identities: Use a dedicated device (old phone or tablet) with a fresh Google account and a new phone number only for crypto. Never browse social media or general web on this device.

No exchange leakage: Do not mention on social media that you own Bitcoin, what exchanges you use, or how much you hold. Attackers troll Twitter, Reddit, and Discord to identify targets.

Address privacy: Never post a Bitcoin receiving address publicly that can be linked to your identity. Chain analysis firms can estimate your holdings from your address.

Hardware key for everything: YubiKey on your exchange accounts, your email, your password manager, and your VPN.

Common Mistakes to Avoid

Using Authy with multi-device enabled: If Authy multi-device is on, an attacker with your phone number can clone your TOTP codes by registering a new device. Disable multi-device in Authy settings immediately.

Reusing email addresses: If you use the same email for crypto and everything else, a data breach on any service leaks your crypto email.

Storing seed phrases in cloud storage: iCloud, Google Drive, and Dropbox are not secure. Your seed phrase belongs on steel or paper, offline.

Weak carrier PIN: "1234" or your birthday defeats the purpose. Use a random 10-digit number and store it in your password manager.

The Bottom Line

SIM swap attacks are entirely preventable. The fixes are not complicated — remove SMS 2FA, add a carrier SIM lock, use TOTP or hardware keys, and move your Bitcoin to self-custody. An attacker who tries to SIM swap you should hit nothing but dead ends.

Your phone number was never meant to be an authentication factor. Treat it as the public identifier it is, and put your real security elsewhere.

Related posts:

Stay Up to Date on Bitcoin

Get our free Beginners Guide to Buying Bitcoin plus weekly insights for long-term holders.

Related Posts