Imagine you’re at home, casually scrolling through your phone. Then, suddenly, everything goes silent—texts stop, calls fail, notifications vanish. This was the unsettling reality for Patricia Escriva from Florida, who experienced an alarming loss of control over her phone number.
She soon discovered that, within minutes, someone else had taken over her number, leading to a breach of her accounts. “I realized I didn’t have anything,” Escriva shares, describing the silence as her first warning sign. No messages, no calls—just nothing.
How an ordinary night turned into chaos
Escriva discussed this harrowing experience in a podcast, illustrating just how rapidly things fell apart. While babysitting, she suddenly found her phone useless. Alarm bells ringing, she connected to Wi-Fi to figure out what was wrong. Almost instantly, she got notifications about a new device being added to her account, followed by a password change.
Then came the financial alerts: “$1,500, $800,” she recalls with a shudder. “My heart stopped.” In mere moments, her account was compromised, and money started disappearing. The speed of these attacks is what makes them especially perilous.
What is SIM exchange fraud?
What happened to Patricia is a form of identity theft called SIM swap fraud. This fraud primarily targets phone numbers rather than the physical devices themselves, affecting both traditional SIM cards and eSIMs.
Here’s a typical sequence of events:
- Scammers gather personal data online
- They impersonate you to your mobile carrier
- They convince the carrier to transfer your number to a different device
- Once transferred, they receive your security codes
The last step is crucial; many accounts use text message codes for authentication. Once hackers gain control of your number, they can quickly reset your passwords and seize your account. In some cases, they can drain your account in just a few hours.
Why does SIM swap fraud happen so quickly?
If a hacker gets your number, everything linked to it, including email, bank accounts, and payment apps, becomes vulnerable. They act fast—before you even realize what’s happening.
For Escriva, the chaos unfolded swiftly. “They were using my checking account funds to pay off credit card balances so they could keep using them,” she recounts. Even after reporting the incident, it took several days to regain control of her number. “It took them three days to get it back,” she added.
SIM Swap Scam Warning Signs You Should Never Ignore
The initial signs of SIM swap fraud can be subtle. For example:
- Your phone suddenly stops functioning
- You’re unable to send or receive calls or texts
- You receive odd alerts about new devices or password changes
- You’re no longer getting verification codes
Escriva now advises people to take action ASAP if they notice something off. “If you see nothing happening on your phone, call someone,” she warns. “If that phone isn’t working… you’ve likely been hacked.”
Though Patricia lost a significant amount of money, her bank ultimately refunded her.
What to do if you fall victim to a SIM swap scam
If your phone unexpectedly stops working, take immediate action:
- Call your mobile carrier from a different phone and lock your number.
- Request a SIM lock or port-out freeze.
- Inform your bank to halt any transactions.
- Change passwords for your email and financial accounts.
- Set up alerts for suspicious activity.
- Report the incident to your carrier and local police.
How to protect yourself from SIM exchange scams
You can’t prevent every data breach, but you can make it harder for someone to hijack your number.
1) Lock down your mobile account
Contact your carrier to request a SIM lock or port-out PIN for added security before any number transfer happens.
2) Stop relying on text codes
Use an authentication app or security key instead; text messages are a weak point.
3) Use strong, unique passwords
Each account should have its own password. Password managers can help generate and store them securely.
4) Turn on account alerts
Enable notifications for logins, password changes, and transactions. The sooner you catch any suspicious activity, the better.
5) Limit data exposure
Your personal information can be easily accessible online. Use data deletion services to minimize this risk.
6) Beware of phishing and malicious links
Scammers often collect information via fake emails or texts. Reliable antivirus software can help detect and block these threats.
7) Consider identity theft prevention services
These services monitor your data and alert you to unusual activity to help you recover quickly if needed.
8) Act immediately if your phone goes silent
Don’t hesitate. Use another phone to reach out to your carrier and bank without delay.
Conclusion
Patricia Escriva’s experience serves as a stark reminder of how quickly things can spiral out of control. One moment, everything feels normal, and the next, your digital life could be completely compromised. The key takeaway? Speed and awareness are crucial. The sooner you act, the less damage you may face. Protecting your phone number has, in many ways, become as important as safeguarding your passwords.

