How a Hacker Hijacked My Number and Everything Else
I used to think losing my phone would be a minor inconvenience. Not anymore. One Tuesday morning, I woke up to a world that felt upside down: texts weren’t arriving, calls went straight to voicemail, and my email kept asking for verification codes I never received. I would soon learn that my phone number—the thing I trusted to secure my life—had been quietly stolen.
It started with a notification from my bank about a login attempt I didn’t make. At first, I shrugged. Maybe I typed my password wrong somewhere. Then my crypto wallet app locked me out, and my heart sank. Every account linked to my phone number was suddenly exposed. Two-factor authentication, my supposed safeguard, had become my Achilles’ heel.
I remember pacing my apartment, the phone in my hand, wondering how someone could infiltrate my life so seamlessly. The hacker didn’t need to break into my accounts individually—they simply hijacked my number. With that, they could reset passwords, approve logins, and siphon access to wallets, email, and even social media. It felt like watching a stranger walk through a door I never realized I’d left open.
The pivot moment came when I realized panic wasn’t going to fix anything. I started documenting everything: which accounts were affected, the timeline, what notifications I received, and the steps I was taking to regain control. I called my mobile provider, explained the situation, and requested a SIM freeze while reporting the incident. I contacted my crypto exchanges and wallet providers, alerting them to the breach and temporarily locking accounts. I changed passwords and moved assets to cold storage wherever possible.
From this experience, I learned that the real threat isn’t just a clever hacker—it’s unpreparedness. No matter how cautious you think you are, any gap in security can be exploited if you rely solely on SMS-based verification.
Here are some takeaways to protect yourself:
Use an authenticator app or hardware token instead of SMS for two-factor authentication. Apps like Authy or Google Authenticator create codes on your device, independent of your phone number.
Separate your recovery methods. Don’t rely on a single phone number for email, banking, and crypto accounts. Multiple layers of recovery reduce the risk of total account compromise.
Monitor your accounts closely. Unusual login attempts, unknown devices, or verification requests you didn’t initiate are red flags. Act immediately when you notice them.
Freeze your SIM if you suspect any compromise. Contact your mobile provider to prevent unauthorized transfers or porting of your number.
Stay aware of social engineering tactics. Hackers often gather information from social media or data breaches to impersonate you. Limit what you share publicly and strengthen account security questions.
I still remember the relief I felt once the immediate threat passed. It wasn’t perfect—there were hours of frustration, account freezes, and password resets—but the sense of reclaiming control was tangible. Losing a number might feel like losing part of your identity, but the real power lies in how you respond. A clear head, quick action, and layered security can stop a hacker from turning your digital life into a playground.
If you’ve experienced or suspect a similar SIM swap attack or crypto hack, reporting it promptly is crucial. Guidance and assistance are available at Service Complaint Alert.