What happens when fraudsters steal your mobile identity by committing Porting or SIM swap fraud?  The following is a true real-life example of SIM swap fraud.  This attack happened to “Bob”, a key employee of a security and risk prevention company.   

The Fraudster Attacks

The Fraud is Discovered

Bob realizes he has been attacked when he can’t use his phone to make a call.  Then he realizes he can’t access his email.

How does he recover? 

Read our next blog “Mobile Identity Nightmare – Response”